[Bug 262894] Kernel Panic (page fault) with 13.1-BETA2 in g_eli & httpd

From: <bugzilla-noreply_at_freebsd.org>
Date: Fri, 08 Apr 2022 15:49:09 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262894

--- Comment #16 from Krautmaster <mathias.kraut@gmx.de> ---
by fault  booted the wrong Kernel (nightly update) yesterday again, and just
now O got the same geli issue with the same faulty address.

Fatal trap 12: page fault while in kernel mode
cpuid = 4; apic id = 04
fault virtual address   = 0xfffff80e00000004
fault code              = supervisor read data, page not present
instruction pointer     = 0x20:0xffffffff80f1cd7d
stack pointer           = 0x28:0xfffffe014e59ec00
frame pointer           = 0x28:0xfffffe014e59eca0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 2705 (g_eli[4] gptid/e567)
trap number             = 12
panic: page fault
cpuid = 4
time = 1649430252
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe014e59e9c0
vpanic() at vpanic+0x17f/frame 0xfffffe014e59ea10
panic() at panic+0x43/frame 0xfffffe014e59ea70
trap_fatal() at trap_fatal+0x385/frame 0xfffffe014e59ead0
trap_pfault() at trap_pfault+0x4f/frame 0xfffffe014e59eb30
calltrap() at calltrap+0x8/frame 0xfffffe014e59eb30
--- trap 0xc, rip = 0xffffffff80f1cd7d, rsp = 0xfffffe014e59ec00, rbp =
0xfffffe014e59eca0 ---
aesni_crypt_xts() at aesni_crypt_xts+0x17d/frame 0xfffffe014e59eca0
aesni_decrypt_xts() at aesni_decrypt_xts+0xe/frame 0xfffffe014e59ecc0
aesni_cipher_crypt() at aesni_cipher_crypt+0x2f1/frame 0xfffffe014e59ed70
aesni_process() at aesni_process+0x159/frame 0xfffffe014e59edc0
crypto_dispatch() at crypto_dispatch+0x118/frame 0xfffffe014e59edf0
g_eli_crypto_run() at g_eli_crypto_run+0x178/frame 0xfffffe014e59ee90
g_eli_worker() at g_eli_worker+0x328/frame 0xfffffe014e59eef0
fork_exit() at fork_exit+0x7e/frame 0xfffffe014e59ef30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe014e59ef30
--- trap 0x80af60b4, rip = 0, rsp = 0, rbp = 0 ---
KDB: enter: panic

-- 
You are receiving this mail because:
You are the assignee for the bug.