[Bug 280427] Kernel panic after upgrading to FreeBSD 14
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 280427] Kernel panic after upgrading to FreeBSD 14"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 01 Aug 2024 19:14:03 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=280427 --- Comment #4 from Kirill <kirill@varnakov.com> --- Same server, but fresh dump: Fatal trap 12: page fault while in kernel mode cpuid = 10; apic id = 10 fault virtual address = 0x0 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80ff0066 stack pointer = 0x28:0xfffffe00fd3e9540 frame pointer = 0x28:0xfffffe00fd3e9590 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 17 (dom1) rdi: 0000000000000000 rsi: 0000000000000000 rdx: 0000000000000001 rcx: 0000000000000002 r8: 0000000000000f10 r9: fffff80000000000 rax: 0000000000000000 rbx: fffffe0011734f20 rbp: fffffe00fd3e9590 r10: fffff80009b49740 r11: fffff80000000000 r12: 0000000000000042 r13: fffff802876023b0 r14: fffff803e06e0508 r15: fffff80287602398 trap number = 12 panic: page fault cpuid = 10 time = 1722494601 KDB: stack backtrace: #0 0xffffffff80b7fbfd at kdb_backtrace+0x5d #1 0xffffffff80b32961 at vpanic+0x131 #2 0xffffffff80b32823 at panic+0x43 #3 0xffffffff80fff91b at trap_fatal+0x40b #4 0xffffffff80fff966 at trap_pfault+0x46 #5 0xffffffff80fd6a48 at calltrap+0x8 #6 0xffffffff80ec3a94 at vm_page_test_dirty+0x14 #7 0xffffffff80ec7718 at vm_pageout_scan_inactive+0x498 #8 0xffffffff80ec58c4 at vm_pageout_worker+0x574 #9 0xffffffff80aecd1f at fork_exit+0x7f #10 0xffffffff80fd7aae at fork_trampoline+0xe Uptime: 22d18h25m39s Dumping 3549 out of 16250 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% Reading symbols from /boot/kernel/accf_dns.ko... Reading symbols from /usr/lib/debug//boot/kernel/accf_dns.ko.debug... Reading symbols from /boot/kernel/accf_data.ko... Reading symbols from /usr/lib/debug//boot/kernel/accf_data.ko.debug... Reading symbols from /boot/kernel/zfs.ko... Reading symbols from /usr/lib/debug//boot/kernel/zfs.ko.debug... Reading symbols from /boot/kernel/accf_http.ko... Reading symbols from /usr/lib/debug//boot/kernel/accf_http.ko.debug... Reading symbols from /boot/kernel/acpi_wmi.ko... Reading symbols from /usr/lib/debug//boot/kernel/acpi_wmi.ko.debug... Reading symbols from /boot/kernel/ipfw.ko... Reading symbols from /usr/lib/debug//boot/kernel/ipfw.ko.debug... __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57 warning: Source file is more recent than executable. 57 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, (kgdb) list *0xffffffff80ff0066 0xffffffff80ff0066 is in pmap_page_test_mappings (/usr/src/sys/amd64/amd64/pmap.c:8734). warning: Source file is more recent than executable. 8729 mask |= PG_RW | PG_M; 8730 } 8731 if (accessed) { 8732 PG_A = pmap_accessed_bit(pmap); 8733 PG_V = pmap_valid_bit(pmap); 8734 mask |= PG_V | PG_A; 8735 } 8736 rv = (*pte & mask) == mask; 8737 PMAP_UNLOCK(pmap); 8738 if (rv) (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57 #1 doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:405 #2 0xffffffff80b324f7 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:523 #3 0xffffffff80b329ce in vpanic (fmt=0xffffffff8115edb8 "%s", ap=ap@entry=0xfffffe00fd3e93a0) at /usr/src/sys/kern/kern_shutdown.c:967 #4 0xffffffff80b32823 in panic (fmt=<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:891 #5 0xffffffff80fff91b in trap_fatal (frame=0xfffffe00fd3e9480, eva=0) at /usr/src/sys/amd64/amd64/trap.c:952 #6 0xffffffff80fff966 in trap_pfault (frame=<unavailable>, usermode=false, signo=<optimized out>, ucode=<optimized out>) at /usr/src/sys/amd64/amd64/trap.c:760 #7 <signal handler called> #8 0xffffffff80ff0066 in pmap_page_test_mappings (m=0xfffffe0011734f20, accessed=accessed@entry=0, modified=modified@entry=1) at /usr/src/sys/amd64/amd64/pmap.c:8734 #9 0xffffffff80fefda8 in pmap_is_modified (m=0x0) at /usr/src/sys/amd64/amd64/pmap.c:8798 #10 0xffffffff80ec3a94 in vm_page_test_dirty (m=0x0, m@entry=0xfffffe0011734f20) at /usr/src/sys/vm/vm_page.c:5516 #11 0xffffffff80ec7718 in vm_pageout_scan_inactive (vmd=vmd@entry=0xffffffff81c04300 <vm_dom+1664>, page_shortage=250) at /usr/src/sys/vm/vm_pageout.c:1583 #12 0xffffffff80ec58c4 in vm_pageout_inactive_dispatch (vmd=0xffffffff81c04300 <vm_dom+1664>, shortage=818) at /usr/src/sys/vm/vm_pageout.c:1673 #13 vm_pageout_inactive (vmd=0xffffffff81c04300 <vm_dom+1664>, shortage=<optimized out>, addl_shortage=<optimized out>) at /usr/src/sys/vm/vm_pageout.c:1722 #14 vm_pageout_worker (arg=arg@entry=0x1) at /usr/src/sys/vm/vm_pageout.c:2162 #15 0xffffffff80aecd1f in fork_exit (callout=0xffffffff80ec5350 <vm_pageout_worker>, arg=0x1, frame=0xfffffe00fd3e9f40) at /usr/src/sys/kern/kern_fork.c:1164 #16 <signal handler called> #17 0xd4368bd7293a5080 in ?? () Backtrace stopped: Cannot access memory at address 0x11a719707dac43cc -- You are receiving this mail because: You are the assignee for the bug.