[Bug 261233] Frequent kernel panics during disk access after upgrading from 12.2-RELEASE-p7 to 12.2-p12 or 12.3 on i386
Date: Thu, 20 Jan 2022 11:06:52 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=261233 Richard Frewin <Richard@FrewinIT.uk> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |Richard@FrewinIT.uk --- Comment #8 from Richard Frewin <Richard@FrewinIT.uk> --- Just a +1 for this. Upgraded from kernel 12.2-RELEASE-p7 to 12.2-RELEASE-p12 with freebsd-update on several systems both amd64 and i386. Some of the i386 systems now panic under disk load (backups!). These are otherwise very lightly loaded web servers or firewalls. Is this related to Bug 261338 ? Example panics from three systems (cut-and-paste from dmesg) below: Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x0 fault code = supervisor read, page not present instruction pointer = 0x20:0x0 stack pointer = 0x28:0x1b2de880 frame pointer = 0x28:0x1b2de8bc code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 836 (bacula-fd) trap number = 12 panic: page fault cpuid = 0 time = 1642636089 KDB: stack backtrace: #0 0x10327ae at kdb_backtrace+0x4e #1 0xfed128 at vpanic+0x118 #2 0xfed004 at panic+0x14 #3 0x154bfd5 at trap_fatal+0x335 #4 0x154c013 at trap_pfault+0x33 #5 0x154b71f at trap+0x36f #6 0xffc0319d at PTDpde+0x41a5 #7 0x1534905 at copyout+0xa5 #8 0x154d0f9 at uiomove_fromphys+0x159 #9 0x12c3483 at ffs_read+0x3d3 #10 0x157b77d at VOP_READ_APV+0x5d #11 0x10b980a at vn_read+0x18a #12 0x10b95da at vn_io_fault_doio+0x3a #13 0x10b7232 at vn_io_fault1+0x162 #14 0x10b548b at vn_io_fault+0x1cb #15 0x104c580 at dofileread+0x70 #16 0x104c1d8 at sys_read+0x78 #17 0x154c7b9 at syscall+0x3e9 Uptime: 23h37m45s Physical memory: 2009 MB Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x0 fault code = supervisor read, page not present instruction pointer = 0x20:0x0 stack pointer = 0x28:0x1afd6880 frame pointer = 0x28:0x1afd68bc code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 2134 (bacula-fd) trap number = 12 panic: page fault cpuid = 0 time = 1642547014 KDB: stack backtrace: #0 0x10327ae at kdb_backtrace+0x4e #1 0xfed128 at vpanic+0x118 #2 0xfed004 at panic+0x14 #3 0x154bfd5 at trap_fatal+0x335 #4 0x154c013 at trap_pfault+0x33 #5 0x154b71f at trap+0x36f #6 0xffc0319d at PTDpde+0x41a5 #7 0x1534905 at copyout+0xa5 #8 0x154d0f9 at uiomove_fromphys+0x159 #9 0x12c3483 at ffs_read+0x3d3 #10 0x157b77d at VOP_READ_APV+0x5d #11 0x10b980a at vn_read+0x18a #12 0x10b95da at vn_io_fault_doio+0x3a #13 0x10b7232 at vn_io_fault1+0x162 #14 0x10b548b at vn_io_fault+0x1cb #15 0x104c580 at dofileread+0x70 #16 0x104c1d8 at sys_read+0x78 #17 0x154c7b9 at syscall+0x3e9 Uptime: 1d2h4m47s Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x0 fault code = supervisor read, page not present instruction pointer = 0x20:0x0 stack pointer = 0x28:0x1df3a8d4 frame pointer = 0x28:0x1df3a90c code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 932 (bacula-fd) trap number = 12 panic: page fault cpuid = 0 time = 1642636048 KDB: stack backtrace: #0 0x10327ae at kdb_backtrace+0x4e #1 0xfed128 at vpanic+0x118 #2 0xfed004 at panic+0x14 #3 0x154bfd5 at trap_fatal+0x335 #4 0x154c013 at trap_pfault+0x33 #5 0x154b71f at trap+0x36f #6 0xffc0319d at PTDpde+0x41a5 #7 0x12c33ce at ffs_read+0x31e #8 0x157b77d at VOP_READ_APV+0x5d #9 0x10b980a at vn_read+0x18a #10 0x10b95da at vn_io_fault_doio+0x3a #11 0x10b7232 at vn_io_fault1+0x162 #12 0x10b548b at vn_io_fault+0x1cb #13 0x104c580 at dofileread+0x70 #14 0x104c1d8 at sys_read+0x78 #15 0x154c7b9 at syscall+0x3e9 #16 0xffc033e7 at PTDpde+0x43ef Uptime: 23h37m42s Physical memory: 3026 MB -- You are receiving this mail because: You are the assignee for the bug.