From nobody Thu Oct 17 12:12:34 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XTmtV5S7lz5YwX7 for ; Thu, 17 Oct 2024 12:12:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XTmtV3fY4z4cDl for ; Thu, 17 Oct 2024 12:12:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1729167154; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=wRGI/se3I/5ZH/ahWDM1b5ZIA9PuQgkkCpXMCDr2efA=; b=JQqCVawUzC2IbhB9WpfD3i8ZHoug3TX9vHPh+ugNcJA+9mWulXb2Y8TNt5Ak/ogogX3+kI H7bjVL0fvyAmmS4wk6MB5F9SJinfDMPlFfnpxuw4mxDamLMaW0Z0/qrnk0ppLDGZpgXRio 6K4kcKB7kqbz27IwnheFD6NtO3P08/7EM12hhcY5sDMHLZSa1FNIS5PbLLpoRsSmKMsyCg WSh55BoKXjfQQEjsMsZBrxEqC/JWABB4dRkLk89oSK1Rm4jtPUhamOo3bc97+2GMD6cCN+ SDnrqGe2K9W1G4hjUu0+6GtoPIgQwNd1Sg098LRxSBunw8WoANNm+RTSfu/Crw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1729167154; a=rsa-sha256; cv=none; b=jKPi3kH7Gn+sPMk4TGGL6D11SY1cC+OPK9gbNAyabgoiPZW94ASK9tB8t6+G0EPnj6aGA4 MavRTo+jhOtNZHyO9Oh2y/z/Vx5D+Nud/9IwVokUS4XCFo+gHCUDNY6wYdry7Pls6DFh46 Pa+RfFKzT2/fW5NrEKKcfRj7PYNqLMMhZRaWIykir4UUe+ytfqiSG59b6Al7omlP6Snxm6 kQxiK+KZLRejxZJtPIqOE6IXpBh3yKMQTa9nCGELjDLKAfDTNPm1ANkffzI77cpTY+1fnV a1BV49kepJmoSruiN9GWsBq0OCgNOlnsAmv3g6iU2MPoupH2WvMRm5UrBq/4Ig== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XTmtV2xKFzpjr for ; Thu, 17 Oct 2024 12:12:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 49HCCYYm052583 for ; Thu, 17 Oct 2024 12:12:34 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 49HCCYD4052582 for bugs@FreeBSD.org; Thu, 17 Oct 2024 12:12:34 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 282156] page fault while in kernel mode after 14.0-Release to 14.1-Release upgrade Date: Thu, 17 Oct 2024 12:12:34 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: tfagart@brozs.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282156 Bug ID: 282156 Summary: page fault while in kernel mode after 14.0-Release to 14.1-Release upgrade Product: Base System Version: 14.1-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: tfagart@brozs.net Hello, After a classical upgrade using freebsd-update, my two Freebsd nodes begins= to get unstable. (unwanted reboot) I've downgrade one of them and this one is now ok in terms of stability. For the one which is still in 14.1, i'm able to reproduce the reboot by try= ing to copy small files over nfs. Here is the output : Hardware CPU: AMD GX-412TC SOC RAM : 4G Trace ############# Code: Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0xd0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80e1cd1b stack pointer =3D 0x28:0xfffffe0084b92a90 frame pointer =3D 0x28:0xfffffe0084b92bc0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 1203 (nfscbd: master) rdi: 0000000000000000 rsi: fffff80045961828 rdx: 0000000000000001 rcx: fffffe0084b92b00 r8: 0000000000000090 r9: 0000000031302d34 rax: 0000000000000000 rbx: fffff80129262000 rbp: fffffe0084b92bc0 r10: 0000000000000000 r11: fffffe0008b28b20 r12: fffff80045961800 r13: fffff80045961880 r14: fffff80006036000 r15: fffff80006036100 trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1720334146 KDB: stack backtrace: #0 0xffffffff80b7fbfd at kdb_backtrace+0x5d #1 0xffffffff80b32961 at vpanic+0x131 #2 0xffffffff80b32823 at panic+0x43 #3 0xffffffff80fff91b at trap_fatal+0x40b #4 0xffffffff80fff966 at trap_pfault+0x46 #5 0xffffffff80fd6a48 at calltrap+0x8 #6 0xffffffff80e1c558 at svc_run+0x1a8 #7 0xffffffff809f3933 at nfscbd_nfsd+0x113 #8 0xffffffff80a1e8fd at nfssvc_nfscl+0x27d #9 0xffffffff80d83158 at sys_nfssvc+0x98 #10 0xffffffff810001c0 at amd64_syscall+0x100 #11 0xffffffff80fd735b at fast_syscall_common+0xf8 Uptime: 9h22m40s Dumping 947 out of 4036 MB:..2% Dump aborted ##### I can collect more information if needed. Thanks for your help Best Regards Thomas --=20 You are receiving this mail because: You are the assignee for the bug.=