[Bug 259164] FreeBSD 13.0-STABLE mpd5-5.9 panic
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 259164] FreeBSD 13.0-STABLE mpd5-5.9 panic"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 17 Oct 2021 07:18:02 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259164 --- Comment #1 from Anatoliy Nebrat <tolich.net@gmail.com> --- Next panic Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 02 fault virtual address = 0x29 fault code = supervisor write data, page not present instruction pointer = 0x20:0xffffffff82b9f58d stack pointer = 0x28:0xfffffe00eec64710 frame pointer = 0x28:0xfffffe00eec64740 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 22206 (mpd5) trap number = 12 panic: page fault cpuid = 1 time = 1634454545 KDB: stack backtrace: #0 0xffffffff80c73ec5 at kdb_backtrace+0x65 #1 0xffffffff80c26017 at vpanic+0x187 #2 0xffffffff80c25e83 at panic+0x43 #3 0xffffffff810af587 at trap_fatal+0x387 #4 0xffffffff810af5df at trap_pfault+0x4f #5 0xffffffff810aec5a at trap+0x26a #6 0xffffffff810859c8 at calltrap+0x8 #7 0xffffffff82b8497d at ng_apply_item+0x2bd #8 0xffffffff82b844e6 at ng_snd_item+0x1c6 #9 0xffffffff82b7f63f at ngd_send+0x10f #10 0xffffffff80cc6383 at sosend_generic+0x623 #11 0xffffffff80cc67f0 at sosend+0x50 #12 0xffffffff80ccd41e at kern_sendit+0x20e #13 0xffffffff80ccd827 at sendit+0x1e7 #14 0xffffffff80ccd62d at sys_sendto+0x4d #15 0xffffffff810afe7c at amd64_syscall+0x10c #16 0xffffffff810862db at fast_syscall_common+0xf8 Uptime: 3d11h49m11s Dumping 1787 out of 8123 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, (kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:399 #2 0xffffffff80c25c16 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:487 #3 0xffffffff80c26086 in vpanic (fmt=0xffffffff811aa502 "%s", ap=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:920 #4 0xffffffff80c25e83 in panic (fmt=<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:844 #5 0xffffffff810af587 in trap_fatal (frame=0xfffffe00eec64650, eva=41) at /usr/src/sys/amd64/amd64/trap.c:941 #6 0xffffffff810af5df in trap_pfault (frame=frame@entry=0xfffffe00eec64650, usermode=false, signo=<optimized out>, signo@entry=0x0, ucode=<optimized out>, ucode@entry=0x0) at /usr/src/sys/amd64/amd64/trap.c:760 #7 0xffffffff810aec5a in trap (frame=0xfffffe00eec64650) at /usr/src/sys/amd64/amd64/trap.c:438 #8 <signal handler called> #9 0xffffffff82b9f58d in ng_tee_rcvdata (hook=<optimized out>, item=0xfffff8002dc95600) at /usr/src/sys/netgraph/ng_tee.c:322 #10 0xffffffff82b8497d in ng_apply_item (node=node@entry=0xfffff80187205e00, item=item@entry=0xfffff8002dc95600, rw=0) at /usr/src/sys/netgraph/ng_base.c:2407 #11 0xffffffff82b844e6 in ng_snd_item (item=item@entry=0xfffff8002dc95600, flags=flags@entry=0) at /usr/src/sys/netgraph/ng_base.c:2324 #12 0xffffffff82b7f63f in ngd_send (so=<optimized out>, flags=<optimized out>, m=0x0, addr=<optimized out>, control=0x0, td=<optimized out>) at /usr/src/sys/netgraph/ng_socket.c:480 #13 0xffffffff80cc6383 in sosend_generic (so=0xfffff80009b53760, addr=0xfffff8001e388200, uio=<optimized out>, top=0xfffff800c7e05300, control=0x0, flags=0, td=0xfffffe00d1e2c740) at /usr/src/sys/kern/uipc_socket.c:1753 #14 0xffffffff80cc67f0 in sosend (so=0xfffff8001af0c300, so@entry=0xfffff80009b53760, addr=0xfffff8002dc95600, uio=0x0, uio@entry=0xfffffe00eec64998, top=0x23, top@entry=0x0, control=control@entry=0x0, flags=451986176, flags@entry=0, td=0xfffffe00d1e2c740) at /usr/src/sys/kern/uipc_socket.c:1803 #15 0xffffffff80ccd41e in kern_sendit (td=<optimized out>, td@entry=0xfffffe00d1e2c740, s=6, mp=<optimized out>, mp@entry=0xfffffe00eec64a80, flags=0, control=0x0, segflg=segflg@entry=UIO_USERSPACE) at /usr/src/sys/kern/uipc_syscalls.c:795 #16 0xffffffff80ccd827 in sendit (td=0xfffffe00d1e2c740, s=768169472, mp=mp@entry=0xfffffe00eec64a80, flags=35) at /usr/src/sys/kern/uipc_syscalls.c:720 #17 0xffffffff80ccd62d in sys_sendto (td=0xfffff8001af0c300, uap=<optimized out>) at /usr/src/sys/kern/uipc_syscalls.c:838 #18 0xffffffff810afe7c in syscallenter (td=0xfffffe00d1e2c740) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:189 #19 amd64_syscall (td=0xfffffe00d1e2c740, traced=0) at /usr/src/sys/amd64/amd64/trap.c:1182 #20 <signal handler called> #21 0x00000008008c037a in ?? () Backtrace stopped: Cannot access memory at address 0x7fffdf9fabf8 (kgdb) -- You are receiving this mail because: You are the assignee for the bug.