[Bug 260393] Page Fault tcp_output/tcp_input

From: <bugzilla-noreply_at_freebsd.org>
Date: Mon, 13 Dec 2021 17:49:20 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260393

            Bug ID: 260393
           Summary: Page Fault tcp_output/tcp_input
           Product: Base System
           Version: 13.0-STABLE
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: ddobrev85@gmail.com

I'm running 2 servers:
Ryzen 7 3800X with Intel(R) X550-T2 - stable/13-n248216-f1d2f22b34a
Xeon E5-1650 v4 with Intel(R) I350 (Copper) - stable/13-n248512-155748c1e75

Both crash with a "Page Fault" messasge, here is output from kgdb:


# kgdb /boot/kernel/kernel /var/crash/vmcore.0
GNU gdb (GDB) 11.1 [GDB v11.1 for FreeBSD]
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-portbld-freebsd13.0".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /boot/kernel/kernel...
Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug...

Unread portion of the kernel message buffer:
[193803] 
[193803] 
[193803] Fatal trap 12: page fault while in kernel mode
[193803] cpuid = 0; apic id = 00
[193803] fault virtual address  = 0x8
[193803] fault code             = supervisor read data, page not present
[193803] instruction pointer    = 0x20:0xffffffff80caf078
[193803] stack pointer          = 0x28:0xfffffe017e330850
[193803] frame pointer          = 0x28:0xfffffe017e330890
[193803] code segment           = base 0x0, limit 0xfffff, type 0x1b
[193803]                        = DPL 0, pres 1, long 1, def32 0, gran 1
[193803] processor eflags       = interrupt enabled, resume, IOPL = 0
[193803] current process                = 0 (if_io_tqg_0)
[193803] trap number            = 12
[193803] panic: page fault
[193803] cpuid = 0
[193803] time = 1639284248
[193803] KDB: stack backtrace:
[193803] #0 0xffffffff80c60485 at kdb_backtrace+0x65
[193803] #1 0xffffffff80c12cdf at vpanic+0x17f
[193803] #2 0xffffffff80c12b53 at panic+0x43
[193803] #3 0xffffffff810982d5 at trap_fatal+0x385
[193803] #4 0xffffffff8109832f at trap_pfault+0x4f
[193803] #5 0xffffffff8106fae8 at calltrap+0x8
[193803] #6 0xffffffff80caf287 at sbdrop+0x37
[193803] #7 0xffffffff80dcce83 at tcp_do_segment+0x2d93
[193803] #8 0xffffffff80dc93b1 at tcp_input_with_port+0xb61
[193803] #9 0xffffffff80dca05b at tcp_input+0xb
[193803] #10 0xffffffff80dbb82f at ip_input+0x11f
[193803] #11 0xffffffff80d48849 at netisr_dispatch_src+0xb9
[193803] #12 0xffffffff80d2c7d8 at ether_demux+0x138
[193803] #13 0xffffffff80d2db65 at ether_nh_input+0x355
[193803] #14 0xffffffff80d48849 at netisr_dispatch_src+0xb9
[193803] #15 0xffffffff80d2cc09 at ether_input+0x69
[193803] #16 0xffffffff80d44cb7 at iflib_rxeof+0xc27
[193803] #17 0xffffffff80d3f302 at _task_fn_rx+0x72
[193803] Uptime: 2d5h50m3s
[193803] Dumping 5207 out of 130927
MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%

__curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
55              __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
pcpu,
(kgdb)



And the 2nd one:

# kgdb /boot/kernel/kernel /var/crash/vmcore.3
GNU gdb (GDB) 11.1 [GDB v11.1 for FreeBSD]
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-portbld-freebsd13.0".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /boot/kernel/kernel...
Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug...

Unread portion of the kernel message buffer:
IOPL = 0
[149983] current process                = 0 (if_io_tqg_6)
[149983] trap number            = 12
[149983] panic: page fault
[149983] cpuid = 6
[149983] time = 1639293246
[149983] KDB: stack backtrace:
[149983] #0 0xffffffff80c78ac5 at kdb_backtrace+0x65
[149983] #1 0xffffffff80c2a207 at vpanic+0x187
[149983] #2 0xffffffff80c2a073 at panic+0x43
[149983] #3 0xffffffff810b71c7 at trap_fatal+0x387
[149983] #4 0xffffffff810b721f at trap_pfault+0x4f
[149983] #5 0xffffffff810b689a at trap+0x26a
[149983] #6 0xffffffff8108e1b8 at calltrap+0x8
[149983] #7 0xffffffff80deee44 at tcp_output+0x11d4
[149983] #8 0xffffffff80de5fd0 at tcp_do_segment+0x2c00
[149983] #9 0xffffffff80de2702 at tcp_input_with_port+0xb82
[149983] #10 0xffffffff80de333b at tcp_input+0xb
[149983] #11 0xffffffff80dd4bf1 at ip_input+0x121
[149983] #12 0xffffffff80d6276a at netisr_dispatch_src+0xca
[149983] #13 0xffffffff80d467a8 at ether_demux+0x138
[149983] #14 0xffffffff80d47b4e at ether_nh_input+0x34e
[149983] #15 0xffffffff80d6276a at netisr_dispatch_src+0xca
[149983] #16 0xffffffff80d46bf9 at ether_input+0x69
[149983] #17 0xffffffff80d5eea3 at iflib_rxeof+0xc63
[149983] Uptime: 1d17h39m43s
[149983] Dumping 3384 out of 65425
MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%

__curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
55              __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
pcpu,
(kgdb)

-- 
You are receiving this mail because:
You are the assignee for the bug.