From nobody Tue Feb 01 19:12:29 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id BEEC01981F6D for ; Tue, 1 Feb 2022 19:12:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JpF1T0cnrz4k1G for ; Tue, 1 Feb 2022 19:12:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D4BF91698A for ; Tue, 1 Feb 2022 19:12:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 211JCSIj024127 for ; Tue, 1 Feb 2022 19:12:28 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 211JCSYP024126 for bugs@FreeBSD.org; Tue, 1 Feb 2022 19:12:28 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 261338] [PATCH] kernel panic "bad pte" under heavy CPU load on 12.2 and 12.3 (i386) Date: Tue, 01 Feb 2022 19:12:29 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.3-RELEASE X-Bugzilla-Keywords: panic, patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1643742749; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=lCfttOLhQAZLKbKulTMxy2PixoypgcS9g2u68BrcT04=; b=uCkpw3+yDwwRP1S8azCVcdivfBTvTcXEKZTVG3MQNNAHVbyAhgyYHzbGz49kRYxEkqq+6+ pLAvzaZq+qDX6ca8IjtGKeXD/BeDfJls3MeFYXXTY1TTJhNgW79OQocF/qYYgmF20Eb6eh TDfLw7iGVBPhY/UpwS+82wjkqCRfyz8AK+yjIHt/7rzUVwngmt+guXJd62rhdDYOTIqi2W 7rFC9ZjAFVVy2mDwKn+iM7YMRibm2ANeYLIidBpXhlrtvGjsqt0E2Htv2eCgzMOQ6inVtf OLKUpnUp/l6bwRlfRhPfVHXaGXm3L4NDlqu0u7ZsAlztOEnw9YkECRglQ3QxzA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1643742749; a=rsa-sha256; cv=none; b=ilXOdbWX5Fvw04thzA/EJXW/q+YKF95J7LJrwxos0pU0Yn8ctR5sKQYATFW0x3+vvPNQv/ 3pHmcjLtg3l6wtSojPp4yjX7HvHdYmsqmukNtG9y8Y6xJ9chxKgY5GGVqRB0lufHbUTFZE KdVcreKwTxO25NSebxU30lOYN8opT8nMKK8AB5cHdx92rvB78urNGvwDAiXF5phxBESLGB njpUbtf45GWBsxRMMxacF8d2bgsxSSHDEs9TZMTEMddxM3PF/zhFQQd0VOBiYzxqK4Xti5 WSsk/mExLNw/ISsIbDGhq5zPW9zuT2ImjnWxuCQD66BJX2eXywmeVRP5ULqibg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261338 --- Comment #33 from commit-hook@FreeBSD.org --- A commit in branch releng/12.3 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3Dfeac4f1bdf22742885fcc94aad5b96e05= 3e93fa9 commit feac4f1bdf22742885fcc94aad5b96e053e93fa9 Author: Andriy Gapon AuthorDate: 2022-01-25 10:34:08 +0000 Commit: Gordon Tetlow CommitDate: 2022-02-01 17:54:53 +0000 smp_targeted_tlb_shootdown has to pin the CPU on i386 This should fix a regression in 1820ca215461 which happened because pmap -> shootdown contracts on amd64 and i386 diverged. On amd64 the pmap code always pins the CPU before calling the shootdown code and expects it to unpin on return. On i386 the pmap code either has pins and unpins around the shootdown calls or does not pin at all. This change should account for that difference. In main and stable/13 the contracts are also different, but the shootdown code is split into the i386 and amd64 variants and each variant is tailored towards the platform's pmap. PR: 261338 Reported by: Dmitry K. Debugged by: Dmitry K. Tested by: Dmitry K. Fixes: 1820ca215461 MFC r368649 / 3fd989da by kib: amd64 pmap: fix PCID mode invalidations Reviewed by: kib X-Pointyhat to: avg Differential Revision: https://reviews.freebsd.org/D33980 (cherry picked from commit e0cc1ce7c0866d6a5c42ef09cfca9582c4a8343c) Approved by: so Security: FreeBSD-EN-22:08.i386 sys/x86/x86/mp_x86.c | 4 ++++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=