[Bug 264038] bhyve panic possibly on bhyve/uart_emul.c, line 290
Date: Tue, 17 May 2022 07:24:52 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264038 Bug ID: 264038 Summary: bhyve panic possibly on bhyve/uart_emul.c, line 290 Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: bhyve Assignee: virtualization@FreeBSD.org Reporter: editor@callfortesting.org Testing on 14-CURRENT from 2011-04-21 but will try on 13.1. To induce: background the bhyve(8) process with an ampersand vmrun.sh with this modification will induce it: 371c371 < ${vmname} --- > ${vmname} & Some runs will produce a panic: Assertion failed: (sc->mev != NULL), function uart_opentty, file /usr/src/usr.sbin/bhyve/uart_emul.c, line 290. Others will produce: Fatal trap 9: general protection fault while in kernel mode cpuid = 3; apic id = 03 instruction pointer = 0x20:0xffffffff810edf98 stack pointer = 0x28:0xfffffe0149bb9830 frame pointer = 0x28:0xfffffe0149bb9830 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = resume, IOPL = 0 current process = 1242 (bhyve) trap number = 9 panic: general protection fault cpuid = 3 time = 1652767842 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0149bb9650 vpanic() at vpanic+0x17f/frame 0xfffffe0149bb96a0 panic() at panic+0x43/frame 0xfffffe0149bb9700 trap_fatal() at trap_fatal+0x385/frame 0xfffffe0149bb9760 calltrap() at calltrap+0x8/frame 0xfffffe0149bb9760 --- trap 0x9, rip = 0xffffffff810edf98, rsp = 0xfffffe0149bb9830, rbp = 0xfffffe0149bb9830 --- strlen() at strlen+0x28/frame 0xfffffe0149bb9830 kvprintf() at kvprintf+0xf6c/frame 0xfffffe0149bb9950 vsnprintf() at vsnprintf+0x2e/frame 0xfffffe0149bb9970 vpanic() at vpanic+0xde/frame 0xfffffe0149bb99c0 panic() at panic+0x43/frame 0xfffffe0149bb9a20 __mtx_lock_spin_flags() at __mtx_lock_spin_flags+0x11d/frame 0xfffffe0149bb9a60 vatpic_set_irq_trigger() at vatpic_set_irq_trigger+0x5b/frame 0xfffffe0149bb9aa0 vmmdev_ioctl() at vmmdev_ioctl+0xea3/frame 0xfffffe0149bb9b40 devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe0149bb9b90 vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe0149bb9ca0 devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe0149bb9cc0 kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe0149bb9d30 sys_ioctl() at sys_ioctl+0x126/frame 0xfffffe0149bb9e00 amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe0149bb9f30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0149bb9f30 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x1eab7eb25b6a, rsp = 0x1eab76a9c9f8, rbp = 0x1eab76a9ca20 --- KDB: enter: panic [ thread pid 1242 tid 100292 ] Stopped at kdb_enter+0x32: movq $0,0x127cfe3(%rip) db> bt Tracing pid 1242 tid 100292 td 0xfffffe01496f1560 kdb_enter() at kdb_enter+0x32/frame 0xfffffe0149bb9650 vpanic() at vpanic+0x1b0/frame 0xfffffe0149bb96a0 panic() at panic+0x43/frame 0xfffffe0149bb9700 trap_fatal() at trap_fatal+0x385/frame 0xfffffe0149bb9760 calltrap() at calltrap+0x8/frame 0xfffffe0149bb9760 --- trap 0x9, rip = 0xffffffff810edf98, rsp = 0xfffffe0149bb9830, rbp = 0xfffffe0149bb9830 --- strlen() at strlen+0x28/frame 0xfffffe0149bb9830 kvprintf() at kvprintf+0xf6c/frame 0xfffffe0149bb9950 vsnprintf() at vsnprintf+0x2e/frame 0xfffffe0149bb9970 vpanic() at vpanic+0xde/frame 0xfffffe0149bb99c0 panic() at panic+0x43/frame 0xfffffe0149bb9a20 __mtx_lock_spin_flags() at __mtx_lock_spin_flags+0x11d/frame 0xfffffe0149bb9a60 vatpic_set_irq_trigger() at vatpic_set_irq_trigger+0x5b/frame 0xfffffe0149bb9aa0 vmmdev_ioctl() at vmmdev_ioctl+0xea3/frame 0xfffffe0149bb9b40 devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe0149bb9b90 vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe0149bb9ca0 devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe0149bb9cc0 kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe0149bb9d30 sys_ioctl() at sys_ioctl+0x126/frame 0xfffffe0149bb9e00 amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe0149bb9f30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0149bb9f30 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x1eab7eb25b6a, rsp = 0x1eab76a9c9f8, rbp = 0x1eab76a9ca20 --- -- You are receiving this mail because: You are the assignee for the bug.