[Bug 273581] Panic (general protection fault) after keying Control-Q to quit Chromium www/chromium
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 273581] Panic (general protection fault) after keying Control-Q to quit www/chromium Chromium"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 273581] Panic (general protection fault) after keying Control-Q to quit www/chromium Chromium"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 273581] Panic (general protection fault) after keying Control-Q to quit www/chromium Chromium"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 273581] Panic (general protection fault) after keying Control-Q to quit www/chromium Chromium"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 273581] Panic (general protection fault) after keying Control-Q to quit www/chromium Chromium"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 05 Sep 2023 15:41:01 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=273581
Bug ID: 273581
Summary: Panic (general protection fault) after keying
Control-Q to quit Chromium www/chromium
Product: Base System
Version: CURRENT
Hardware: Any
OS: Any
Status: New
Keywords: crash
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: bugs@FreeBSD.org
Reporter: grahamperrin@gmail.com
CC: chromium@FreeBSD.org
Dump header from device: /dev/ada0p2
Architecture: amd64
Architecture Version: 2
Dump Length: 2269585408
Blocksize: 512
Compression: none
Dumptime: 2023-09-05 13:09:49 +0100
Hostname: mowa219-gjp4-8570p-freebsd
Magic: FreeBSD Kernel Dump
Version String: FreeBSD 15.0-CURRENT amd64 1500000 #10
main-n265135-07bc20e4740d-dirty: Sat Sep 2 17:36:59 BST 2023
grahamperrin@mowa219-gjp4-8570p-freebsd:/usr/obj/usr/src/amd64.amd64/sys/GENERIC
Panic String: general protection fault
Dump Parity: 3731071829
Bounds: 0
Dump Status: good
----
If I recall correctly: at the moment of the panic I was moving the pointer, or
typing, in Remmina (an RDP connection to Windows) or Firefox.
I might have also keyed Alt-Tab to switch applications after the Control-Q.
I assumed that quit of Chromium was complete, however PID 50768 (chrome) is
shown, below, as the current process.
I'll send panicmail with reference to this bug report.
---
Unread portion of the kernel message buffer:
Fatal trap 9: general protection fault while in kernel mode
cpuid = 0; apic id = 00
instruction pointer = 0x20:0xffffffff80d280b0
stack pointer = 0x28:0xfffffe01030ccb20
frame pointer = 0x28:0xfffffe01030ccb40
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 50768 (chrome)
rdi: deadc0dedeadc0de rsi: 0000000000000001 rdx: 0000000000000000
rcx: fffff8028bc4c560 r8: fffff800018cf040 r9: fffffe01030cd000
rax: fffff8028bc4c500 rbx: fffff802b285b500 rbp: fffffe01030ccb40
r10: 0000000000001388 r11: 00000000000027a7 r12: fffff8028bc4c500
r13: fffff801efef5640 r14: fffff802b285b500 r15: fffff801efef5660
trap number = 9
panic: general protection fault
cpuid = 3
time = 1693915789
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01030cc860
vpanic() at vpanic+0x132/frame 0xfffffe01030cc990
panic() at panic+0x43/frame 0xfffffe01030cc9f0
trap_fatal() at trap_fatal+0x40c/frame 0xfffffe01030cca50
calltrap() at calltrap+0x8/frame 0xfffffe01030cca50
--- trap 0x9, rip = 0xffffffff80d280b0, rsp = 0xfffffe01030ccb20, rbp =
0xfffffe01030ccb40 ---
ip_mfilter_free() at ip_mfilter_free+0x1a0/frame 0xfffffe01030ccb40
inp_freemoptions() at inp_freemoptions+0x85/frame 0xfffffe01030ccb80
sorele_locked() at sorele_locked+0xf7/frame 0xfffffe01030ccbb0
soclose() at soclose+0x17d/frame 0xfffffe01030ccc10
_fdrop() at _fdrop+0x1b/frame 0xfffffe01030ccc30
closef() at closef+0x1e3/frame 0xfffffe01030cccc0
fdescfree() at fdescfree+0x41a/frame 0xfffffe01030ccd80
exit1() at exit1+0x4b1/frame 0xfffffe01030ccdf0
sys_exit() at sys_exit+0xd/frame 0xfffffe01030cce00
amd64_syscall() at amd64_syscall+0x138/frame 0xfffffe01030ccf30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01030ccf30
--- syscall (1, FreeBSD ELF64, exit), rip = 0x2f6f91df251a, rsp =
0x2f6f6517bd28, rbp = 0x2f6f6517bd40 ---
KDB: enter: panic
Uptime: 1d2h13m47s
Dumping 2164 out of 16244 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%
__curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57
57 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
pcpu,
(kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57
#1 doadump (textdump=textdump@entry=1)
at /usr/src/sys/kern/kern_shutdown.c:405
#2 0xffffffff80b57f60 in kern_reboot (howto=260)
at /usr/src/sys/kern/kern_shutdown.c:526
#3 0xffffffff80b5845f in vpanic (fmt=0xffffffff811a0789 "%s",
ap=ap@entry=0xfffffe01030cc9d0) at /usr/src/sys/kern/kern_shutdown.c:970
#4 0xffffffff80b58203 in panic (fmt=<unavailable>)
at /usr/src/sys/kern/kern_shutdown.c:894
#5 0xffffffff8105dd7c in trap_fatal (frame=0xfffffe01030cca60, eva=0)
at /usr/src/sys/amd64/amd64/trap.c:952
#6 <signal handler called>
#7 mbufq_drain (mq=<optimized out>) at /usr/src/sys/sys/mbuf.h:1593
#8 imf_purge (imf=imf@entry=0xfffff802b285b500)
at /usr/src/sys/netinet/in_mcast.c:919
#9 ip_mfilter_free (imf=imf@entry=0xfffff802b285b500)
at /usr/src/sys/netinet/in_mcast.c:350
#10 0xffffffff80d29455 in inp_freemoptions (imo=0xfffff801efef5640)
at /usr/src/sys/netinet/in_mcast.c:1610
#11 0xffffffff80c098d7 in sofree (so=0xfffff8040a4643c0)
at /usr/src/sys/kern/uipc_socket.c:1211
#12 sorele_locked (so=so@entry=0xfffff8040a4643c0)
at /usr/src/sys/kern/uipc_socket.c:1238
#13 0xffffffff80c0a74d in soclose (so=0xfffff8040a4643c0)
at /usr/src/sys/kern/uipc_socket.c:1308
#14 0xffffffff80af232b in fo_close (fp=0xfffff803c7dd9d20, td=0x1)
at /usr/src/sys/sys/file.h:388
#15 _fdrop (fp=fp@entry=0xfffff803c7dd9d20, td=0x1,
td@entry=0xfffffe0104a20e40) at /usr/src/sys/kern/kern_descrip.c:3632
#16 0xffffffff80af5b83 in closef (fp=fp@entry=0xfffff803c7dd9d20,
td=td@entry=0xfffffe0104a20e40) at /usr/src/sys/kern/kern_descrip.c:2841
#17 0xffffffff80af51ea in fdescfree_fds (td=0xfffffe0104a20e40,
fdp=0xfffffe0104d7d920) at /usr/src/sys/kern/kern_descrip.c:2564
#18 fdescfree (td=td@entry=0xfffffe0104a20e40)
at /usr/src/sys/kern/kern_descrip.c:2607
#19 0xffffffff80b07d81 in exit1 (td=0xfffffe0104a20e40, rval=<optimized out>,
signo=signo@entry=0) at /usr/src/sys/kern/kern_exit.c:404
#20 0xffffffff80b078cd in sys_exit (td=0xdeadc0dedeadc0de,
uap=<optimized out>) at /usr/src/sys/kern/kern_exit.c:210
#21 0xffffffff8105e748 in syscallenter (td=<optimized out>)
at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:187
#22 amd64_syscall (td=0xfffffe0104a20e40, traced=0)
at /usr/src/sys/amd64/amd64/trap.c:1197
#23 <signal handler called>
#24 0x00002f6f91df251a in ?? ()
Backtrace stopped: Cannot access memory at address 0x2f6f6517bd28
(kgdb)
------------------------------------------------------------------------
ps -axlww
…
--
You are receiving this mail because:
You are the assignee for the bug.