From nobody Tue Jan 25 10:39:26 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id D763C197806E for ; Tue, 25 Jan 2022 10:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Jjjyk4VHqz3rB7 for ; Tue, 25 Jan 2022 10:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 73C7027ECF for ; Tue, 25 Jan 2022 10:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 20PAdQGn056045 for ; Tue, 25 Jan 2022 10:39:26 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 20PAdQsK056044 for bugs@FreeBSD.org; Tue, 25 Jan 2022 10:39:26 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 261338] [PATCH] kernel panic "bad pte" under heavy CPU load on 12.2 and 12.3 (i386) Date: Tue, 25 Jan 2022 10:39:26 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.3-RELEASE X-Bugzilla-Keywords: panic, patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1643107166; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xTtL8rtYg1KypO1iV+aUc/uf2BkrjSXB57GVlWx16kA=; b=SANSx1i/IvyP+P9vwTIXgGMkeUHrx35/yvhIDBrb66CnbFKof17VfUITiXyK8HdLRhsFt1 NTareWnwB/QAk7VrvvX6R9yWtUlgXVb9iqttQVBhFdgVTMClsrSWCooZpmPoAJjTyGPwXu 1OlAq7DZ0B8QLdDRGxOUJaJ7y3PrSOmoOUoMx6jNMnOTJEEb9sp9zpUuziJ3gbBIHDKVDb 9/sAj66VqqW5y8bnPsI5V0I97drqqrij/rdovSbw7J7J2zWosR+Pvu0IAEyzmd4y/yTtaY ekRnwVXDpRslVy45s7syFS79uhBX/uQG3/rqKa4pKWyEhlgwr+fnD7eIx5WGAw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1643107166; a=rsa-sha256; cv=none; b=Zx3pVXp+smDyL0i1q7jI0co7zE8AObclwopoSoeuMTyAKnloKipjDJi9pBibK8dS3Ua0nC wK26aShfZPpNxc57uwKFpmOnPA+Uftq/EOzij59MWOnJ9UHmjT8Ed6Fiy1YW5ZYmOWPIMY NzxgWTKJkHgif33Ox3oRQvpizD8ybodEl9d4AY+A3+AE+yhxYJGthTiew9XxXFdDa65VMi 6jsIexoJlWEx/WjrdoKO7LnCYARqrGZDv6R5ZAVlDE9vlLgzAw7O6yos3wgkEkgsqHnBr5 otjre+CMSYR751NXfqlY1JLrvjlnIq95MKVXdhUiATzYm3nCTm6HQUJ/JBdwOA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261338 --- Comment #28 from commit-hook@FreeBSD.org --- A commit in branch stable/12 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3De0cc1ce7c0866d6a5c42ef09cfca9582c= 4a8343c commit e0cc1ce7c0866d6a5c42ef09cfca9582c4a8343c Author: Andriy Gapon AuthorDate: 2022-01-25 10:34:08 +0000 Commit: Andriy Gapon CommitDate: 2022-01-25 10:34:08 +0000 smp_targeted_tlb_shootdown has to pin the CPU on i386 This should fix a regression in 1820ca215461 which happened because pmap -> shootdown contracts on amd64 and i386 diverged. On amd64 the pmap code always pins the CPU before calling the shootdown code and expects it to unpin on return. On i386 the pmap code either has pins and unpins around the shootdown calls or does not pin at all. This change should account for that difference. In main and stable/13 the contracts are also different, but the shootdown code is split into the i386 and amd64 variants and each variant is tailored towards the platform's pmap. PR: 261338 Reported by: Dmitry K. Debugged by: Dmitry K. Tested by: Dmitry K. Fixes: 1820ca215461 MFC r368649 / 3fd989da by kib: amd64 pmap: fix PCID mode invalidations Reviewed by: kib X-Pointyhat to: avg Differential Revision: https://reviews.freebsd.org/D33980 sys/x86/x86/mp_x86.c | 4 ++++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=