[Bug 259164] FreeBSD 13.0-STABLE mpd5-5.9 panic

From: <bugzilla-noreply_at_freebsd.org>
Date: Sun, 17 Oct 2021 07:18:02 UTC

--- Comment #1 from Anatoliy Nebrat <tolich.net@gmail.com> ---
Next panic

Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 02
fault virtual address   = 0x29
fault code              = supervisor write data, page not present
instruction pointer     = 0x20:0xffffffff82b9f58d
stack pointer           = 0x28:0xfffffe00eec64710
frame pointer           = 0x28:0xfffffe00eec64740
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 22206 (mpd5)
trap number             = 12
panic: page fault
cpuid = 1
time = 1634454545
KDB: stack backtrace:
#0 0xffffffff80c73ec5 at kdb_backtrace+0x65
#1 0xffffffff80c26017 at vpanic+0x187
#2 0xffffffff80c25e83 at panic+0x43
#3 0xffffffff810af587 at trap_fatal+0x387
#4 0xffffffff810af5df at trap_pfault+0x4f
#5 0xffffffff810aec5a at trap+0x26a
#6 0xffffffff810859c8 at calltrap+0x8
#7 0xffffffff82b8497d at ng_apply_item+0x2bd
#8 0xffffffff82b844e6 at ng_snd_item+0x1c6
#9 0xffffffff82b7f63f at ngd_send+0x10f
#10 0xffffffff80cc6383 at sosend_generic+0x623
#11 0xffffffff80cc67f0 at sosend+0x50
#12 0xffffffff80ccd41e at kern_sendit+0x20e
#13 0xffffffff80ccd827 at sendit+0x1e7
#14 0xffffffff80ccd62d at sys_sendto+0x4d
#15 0xffffffff810afe7c at amd64_syscall+0x10c
#16 0xffffffff810862db at fast_syscall_common+0xf8
Uptime: 3d11h49m11s
Dumping 1787 out of 8123 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%

__curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
55              __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
(kgdb) #0  __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
#1  doadump (textdump=<optimized out>)
    at /usr/src/sys/kern/kern_shutdown.c:399
#2  0xffffffff80c25c16 in kern_reboot (howto=260)
    at /usr/src/sys/kern/kern_shutdown.c:487
#3  0xffffffff80c26086 in vpanic (fmt=0xffffffff811aa502 "%s",
    ap=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:920
#4  0xffffffff80c25e83 in panic (fmt=<unavailable>)
    at /usr/src/sys/kern/kern_shutdown.c:844
#5  0xffffffff810af587 in trap_fatal (frame=0xfffffe00eec64650, eva=41)
    at /usr/src/sys/amd64/amd64/trap.c:941
#6  0xffffffff810af5df in trap_pfault (frame=frame@entry=0xfffffe00eec64650,
    usermode=false, signo=<optimized out>, signo@entry=0x0,
    ucode=<optimized out>, ucode@entry=0x0)
    at /usr/src/sys/amd64/amd64/trap.c:760
#7  0xffffffff810aec5a in trap (frame=0xfffffe00eec64650)
    at /usr/src/sys/amd64/amd64/trap.c:438
#8  <signal handler called>
#9  0xffffffff82b9f58d in ng_tee_rcvdata (hook=<optimized out>,
    item=0xfffff8002dc95600) at /usr/src/sys/netgraph/ng_tee.c:322
#10 0xffffffff82b8497d in ng_apply_item (node=node@entry=0xfffff80187205e00,
    item=item@entry=0xfffff8002dc95600, rw=0)
    at /usr/src/sys/netgraph/ng_base.c:2407
#11 0xffffffff82b844e6 in ng_snd_item (item=item@entry=0xfffff8002dc95600,
    flags=flags@entry=0) at /usr/src/sys/netgraph/ng_base.c:2324
#12 0xffffffff82b7f63f in ngd_send (so=<optimized out>,
    flags=<optimized out>, m=0x0, addr=<optimized out>, control=0x0,
    td=<optimized out>) at /usr/src/sys/netgraph/ng_socket.c:480
#13 0xffffffff80cc6383 in sosend_generic (so=0xfffff80009b53760,
    addr=0xfffff8001e388200, uio=<optimized out>, top=0xfffff800c7e05300,
    control=0x0, flags=0, td=0xfffffe00d1e2c740)
    at /usr/src/sys/kern/uipc_socket.c:1753
#14 0xffffffff80cc67f0 in sosend (so=0xfffff8001af0c300,
    so@entry=0xfffff80009b53760, addr=0xfffff8002dc95600, uio=0x0,
    uio@entry=0xfffffe00eec64998, top=0x23, top@entry=0x0,
    control=control@entry=0x0, flags=451986176, flags@entry=0,
    td=0xfffffe00d1e2c740) at /usr/src/sys/kern/uipc_socket.c:1803
#15 0xffffffff80ccd41e in kern_sendit (td=<optimized out>,
    td@entry=0xfffffe00d1e2c740, s=6, mp=<optimized out>,
    mp@entry=0xfffffe00eec64a80, flags=0, control=0x0,
    at /usr/src/sys/kern/uipc_syscalls.c:795
#16 0xffffffff80ccd827 in sendit (td=0xfffffe00d1e2c740, s=768169472,
    mp=mp@entry=0xfffffe00eec64a80, flags=35)
    at /usr/src/sys/kern/uipc_syscalls.c:720
#17 0xffffffff80ccd62d in sys_sendto (td=0xfffff8001af0c300,
    uap=<optimized out>) at /usr/src/sys/kern/uipc_syscalls.c:838
#18 0xffffffff810afe7c in syscallenter (td=0xfffffe00d1e2c740)
    at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:189
#19 amd64_syscall (td=0xfffffe00d1e2c740, traced=0)
    at /usr/src/sys/amd64/amd64/trap.c:1182
#20 <signal handler called>
#21 0x00000008008c037a in ?? ()
Backtrace stopped: Cannot access memory at address 0x7fffdf9fabf8

You are receiving this mail because:
You are the assignee for the bug.