[Bug 262894] Kernel Panic (page fault) with 13.1-BETA2 in g_eli & httpd

From: <bugzilla-noreply_at_freebsd.org>
Date: Sun, 10 Apr 2022 11:54:54 UTC

--- Comment #20 from Krautmaster <mathias.kraut@gmx.de> ---
(In reply to Mark Johnston from comment #17)

next crash. So far the dumpdev drive seem not to work using "rc" tunables in
Truenas. But I can offer direct device access to configure whatever needed

Fatal trap 12: page fault while in kernel mode
cpuid = 7; apic id = 07
fault virtual address   = 0xfffff80b00000004
fault code              = supervisor read data, page not present
instruction pointer     = 0x20:0xffffffff80f1cdcd
stack pointer           = 0x28:0xfffffe014e5fbc00
frame pointer           = 0x28:0xfffffe014e5fbca0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 3648 (g_eli[7] gptid/e539)
trap number             = 12
panic: page fault
cpuid = 7
time = 1649591029
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe014e5fb9c0
vpanic() at vpanic+0x17f/frame 0xfffffe014e5fba10
panic() at panic+0x43/frame 0xfffffe014e5fba70
trap_fatal() at trap_fatal+0x385/frame 0xfffffe014e5fbad0
trap_pfault() at trap_pfault+0x4f/frame 0xfffffe014e5fbb30
calltrap() at calltrap+0x8/frame 0xfffffe014e5fbb30
--- trap 0xc, rip = 0xffffffff80f1cdcd, rsp = 0xfffffe014e5fbc00, rbp =
0xfffffe014e5fbca0 ---
aesni_crypt_xts() at aesni_crypt_xts+0x17d/frame 0xfffffe014e5fbca0
aesni_decrypt_xts() at aesni_decrypt_xts+0xe/frame 0xfffffe014e5fbcc0
aesni_cipher_crypt() at aesni_cipher_crypt+0x2f1/frame 0xfffffe014e5fbd70
aesni_process() at aesni_process+0x159/frame 0xfffffe014e5fbdc0
crypto_dispatch() at crypto_dispatch+0x118/frame 0xfffffe014e5fbdf0
g_eli_crypto_run() at g_eli_crypto_run+0x178/frame 0xfffffe014e5fbe90
g_eli_worker() at g_eli_worker+0x328/frame 0xfffffe014e5fbef0
fork_exit() at fork_exit+0x7e/frame 0xfffffe014e5fbf30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe014e5fbf30
--- trap 0x80af60b4, rip = 0, rsp = 0, rbp = 0 ---
KDB: enter: panic

You are receiving this mail because:
You are the assignee for the bug.