[Bug 264038] bhyve panic possibly on bhyve/uart_emul.c, line 290

From: <bugzilla-noreply_at_freebsd.org>
Date: Tue, 17 May 2022 07:24:52 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264038

            Bug ID: 264038
           Summary: bhyve panic possibly on bhyve/uart_emul.c, line 290
           Product: Base System
           Version: CURRENT
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: bhyve
          Assignee: virtualization@FreeBSD.org
          Reporter: editor@callfortesting.org

Testing on 14-CURRENT from 2011-04-21 but will try on 13.1.

To induce: background the bhyve(8) process with an ampersand

vmrun.sh with this modification will induce it:

371c371
<               ${vmname}
---
>               ${vmname} &

Some runs will produce a panic:

Assertion failed: (sc->mev != NULL), function uart_opentty, file
/usr/src/usr.sbin/bhyve/uart_emul.c, line 290.

Others will produce:

Fatal trap 9: general protection fault while in kernel mode
cpuid = 3; apic id = 03
instruction pointer     = 0x20:0xffffffff810edf98
stack pointer           = 0x28:0xfffffe0149bb9830
frame pointer           = 0x28:0xfffffe0149bb9830
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = resume, IOPL = 0
current process         = 1242 (bhyve)
trap number             = 9
panic: general protection fault
cpuid = 3
time = 1652767842
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0149bb9650
vpanic() at vpanic+0x17f/frame 0xfffffe0149bb96a0
panic() at panic+0x43/frame 0xfffffe0149bb9700
trap_fatal() at trap_fatal+0x385/frame 0xfffffe0149bb9760
calltrap() at calltrap+0x8/frame 0xfffffe0149bb9760
--- trap 0x9, rip = 0xffffffff810edf98, rsp = 0xfffffe0149bb9830, rbp =
0xfffffe0149bb9830 ---
strlen() at strlen+0x28/frame 0xfffffe0149bb9830
kvprintf() at kvprintf+0xf6c/frame 0xfffffe0149bb9950
vsnprintf() at vsnprintf+0x2e/frame 0xfffffe0149bb9970
vpanic() at vpanic+0xde/frame 0xfffffe0149bb99c0
panic() at panic+0x43/frame 0xfffffe0149bb9a20
__mtx_lock_spin_flags() at __mtx_lock_spin_flags+0x11d/frame 0xfffffe0149bb9a60
vatpic_set_irq_trigger() at vatpic_set_irq_trigger+0x5b/frame
0xfffffe0149bb9aa0
vmmdev_ioctl() at vmmdev_ioctl+0xea3/frame 0xfffffe0149bb9b40
devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe0149bb9b90
vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe0149bb9ca0
devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe0149bb9cc0
kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe0149bb9d30
sys_ioctl() at sys_ioctl+0x126/frame 0xfffffe0149bb9e00
amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe0149bb9f30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0149bb9f30
--- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x1eab7eb25b6a, rsp =
0x1eab76a9c9f8, rbp = 0x1eab76a9ca20 ---
KDB: enter: panic
[ thread pid 1242 tid 100292 ]
Stopped at      kdb_enter+0x32: movq    $0,0x127cfe3(%rip)
db> bt 
Tracing pid 1242 tid 100292 td 0xfffffe01496f1560
kdb_enter() at kdb_enter+0x32/frame 0xfffffe0149bb9650
vpanic() at vpanic+0x1b0/frame 0xfffffe0149bb96a0
panic() at panic+0x43/frame 0xfffffe0149bb9700
trap_fatal() at trap_fatal+0x385/frame 0xfffffe0149bb9760
calltrap() at calltrap+0x8/frame 0xfffffe0149bb9760
--- trap 0x9, rip = 0xffffffff810edf98, rsp = 0xfffffe0149bb9830, rbp =
0xfffffe0149bb9830 ---
strlen() at strlen+0x28/frame 0xfffffe0149bb9830
kvprintf() at kvprintf+0xf6c/frame 0xfffffe0149bb9950
vsnprintf() at vsnprintf+0x2e/frame 0xfffffe0149bb9970
vpanic() at vpanic+0xde/frame 0xfffffe0149bb99c0
panic() at panic+0x43/frame 0xfffffe0149bb9a20
__mtx_lock_spin_flags() at __mtx_lock_spin_flags+0x11d/frame 0xfffffe0149bb9a60
vatpic_set_irq_trigger() at vatpic_set_irq_trigger+0x5b/frame
0xfffffe0149bb9aa0
vmmdev_ioctl() at vmmdev_ioctl+0xea3/frame 0xfffffe0149bb9b40
devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe0149bb9b90
vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe0149bb9ca0
devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe0149bb9cc0
kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe0149bb9d30
sys_ioctl() at sys_ioctl+0x126/frame 0xfffffe0149bb9e00
amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe0149bb9f30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0149bb9f30
--- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x1eab7eb25b6a, rsp =
0x1eab76a9c9f8, rbp = 0x1eab76a9ca20 ---

-- 
You are receiving this mail because:
You are the assignee for the bug.