[Bug 259039] kernel panic in if_io_tqg_4
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 259039] kernel panic in if_io_tqg_4"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 10 Oct 2021 11:56:47 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259039 Bug ID: 259039 Summary: kernel panic in if_io_tqg_4 Product: Base System Version: 13.0-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: iron.udjin@gmail.com OS: stable/13-n247434-bcff2fdf8ee4 Fatal trap 12: page fault while in kernel mode cpuid = 4; apic id = 04 fault virtual address = 0x8 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80646df8 stack pointer = 0x0:0xfffffe0201c61d10 frame pointer = 0x0:0xfffffe0201c61d50 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 0 (if_io_tqg_4) trap number = 12 panic: page fault cpuid = 4 time = 1633865509 KDB: stack backtrace: #0 0xffffffff805fa385 at kdb_backtrace+0x65 #1 0xffffffff805af417 at vpanic+0x187 #2 0xffffffff805af283 at panic+0x43 #3 0xffffffff8085c187 at trap_fatal+0x387 #4 0xffffffff8085c1df at trap_pfault+0x4f #5 0xffffffff8085b87a at trap+0x25a #6 0xffffffff808342d8 at calltrap+0x8 #7 0xffffffff80647007 at sbdrop+0x37 #8 0xffffffff80713946 at tcp_do_segment+0x2f86 #9 0xffffffff8070fdad at tcp_input_with_port+0x91d #10 0xffffffff8071092b at tcp_input+0xb #11 0xffffffff807042a4 at ip_input+0xc4 #12 0xffffffff806dc2ce at netisr_dispatch_src+0x9e #13 0xffffffff806c1088 at ether_demux+0x118 #14 0xffffffff806c22ee at ether_nh_input+0x30e #15 0xffffffff806dc2ce at netisr_dispatch_src+0x9e #16 0xffffffff806c1459 at ether_input+0x39 #17 0xffffffff80719341 at tcp_lro_flush+0x321 Uptime: 13d12h0m25s Dumping 23901 out of 196241 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:399 #2 0xffffffff805af015 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:486 #3 0xffffffff805af486 in vpanic (fmt=0xffffffff808bd1a3 "%s", ap=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:919 #4 0xffffffff805af283 in panic (fmt=<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:843 #5 0xffffffff8085c187 in trap_fatal (frame=0xfffffe0201c61c50, eva=8) at /usr/src/sys/amd64/amd64/trap.c:941 #6 0xffffffff8085c1df in trap_pfault (frame=frame@entry=0xfffffe0201c61c50, usermode=false, signo=<optimized out>, signo@entry=0x0, ucode=<optimized out>, ucode@entry=0x0) at /usr/src/sys/amd64/amd64/trap.c:760 #7 0xffffffff8085b87a in trap (frame=0xfffffe0201c61c50) at /usr/src/sys/amd64/amd64/trap.c:438 #8 <signal handler called> #9 sbcut_internal (sb=sb@entry=0xfffff812a9e02260, len=len@entry=794) at /usr/src/sys/kern/uipc_sockbuf.c:1515 #10 0xffffffff80647007 in sbdrop (sb=sb@entry=0xfffff812a9e02260, len=794) at /usr/src/sys/kern/uipc_sockbuf.c:1624 #11 0xffffffff80713946 in tcp_do_segment (m=0xfffff808ffa67300, th=<optimized out>, so=<optimized out>, tp=0xfffffe04453ce950, drop_hdrlen=<optimized out>, tlen=<optimized out>, iptos=0 '\000') at /usr/src/sys/netinet/tcp_input.c:1852 #12 0xffffffff8070fdad in tcp_input_with_port (mp=<optimized out>, offp=<optimized out>, proto=<optimized out>, port=<optimized out>, port@entry=0) at /usr/src/sys/netinet/tcp_input.c:1400 #13 0xffffffff8071092b in tcp_input (mp=0xfffff812a9e02260, offp=0x31a, proto=30) at /usr/src/sys/netinet/tcp_input.c:1496 #14 0xffffffff807042a4 in ip_input (m=0x0) at /usr/src/sys/netinet/ip_input.c:834 #15 0xffffffff806dc2ce in netisr_dispatch_src (proto=1, source=<optimized out>, source@entry=0, m=0x0) at /usr/src/sys/net/netisr.c:1143 #16 0xffffffff806dc5bf in netisr_dispatch (proto=2850038368, m=0x1e) at /usr/src/sys/net/netisr.c:1234 #17 0xffffffff806c1088 in ether_demux (ifp=ifp@entry=0xfffff801062c5000, m=0x31a) at /usr/src/sys/net/if_ethersubr.c:921 #18 0xffffffff806c22ee in ether_input_internal (ifp=0xfffff801062c5000, m=0x31a) at /usr/src/sys/net/if_ethersubr.c:707 #19 ether_nh_input (m=<optimized out>) at /usr/src/sys/net/if_ethersubr.c:737 #20 0xffffffff806dc2ce in netisr_dispatch_src (proto=proto@entry=5, source=<optimized out>, source@entry=0, m=0x0, m@entry=0xfffff808ffa67300) at /usr/src/sys/net/netisr.c:1143 #21 0xffffffff806dc5bf in netisr_dispatch (proto=2850038368, proto@entry=5, m=0x1e, m@entry=0xfffff808ffa67300) at /usr/src/sys/net/netisr.c:1234 #22 0xffffffff806c1459 in ether_input (ifp=<optimized out>, m=0xfffff808ffa67300) at /usr/src/sys/net/if_ethersubr.c:828 #23 0xffffffff80719341 in tcp_lro_flush (lc=lc@entry=0xfffffe014d16a6b0, le=0xfffffe015050e690) at /usr/src/sys/netinet/tcp_lro.c:1350 #24 0xffffffff80719e7b in tcp_lro_rx_done (lc=0xfffffe014d16a6b0) at /usr/src/sys/netinet/tcp_lro.c:562 #25 tcp_lro_flush_all (lc=lc@entry=0xfffffe014d16a6b0) at /usr/src/sys/netinet/tcp_lro.c:1506 #26 0xffffffff806d42a2 in iflib_rxeof (rxq=<optimized out>, budget=<optimized out>) at /usr/src/sys/net/iflib.c:3056 #27 _task_fn_rx (context=<optimized out>) at /usr/src/sys/net/iflib.c:3988 #28 0xffffffff805f8dfd in gtaskqueue_run_locked (queue=queue@entry=0xfffff80104cf8300) at /usr/src/sys/kern/subr_gtaskqueue.c:371 #29 0xffffffff805f8a63 in gtaskqueue_thread_loop (arg=<optimized out>, arg@entry=0xfffffe014d880068) at /usr/src/sys/kern/subr_gtaskqueue.c:547 #30 0xffffffff8056f269 in fork_exit (callout=0xffffffff805f89a0 <gtaskqueue_thread_loop>, arg=0xfffffe014d880068, frame=0xfffffe0201c62480) at /usr/src/sys/kern/kern_fork.c:1084 #31 <signal handler called> I don't know how to reproduce this panic. -- You are receiving this mail because: You are the assignee for the bug.