[Bug 232387] head -r339076: system crash in vnet_epair_init during kern_jail_set in a kyua test on powerpc64
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Fri Oct 19 02:59:15 UTC 2018
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232387
--- Comment #6 from Mark Millard <marklmi26-fbsd at yahoo.com> ---
(In reply to Bjoern A. Zeeb from comment #2)
I did a svnlite update -r339341 /usr/src/sys/kern/link_elf.c
and rebuilt, reinstalled, rebooted, and retested based on
using devel/powerpc64-xtoolchain-gcc materials.
Result: Still crashed.
The below has show reg as well.
. . .
epair3a: Ethernet address: 02:60:27:70:4b:0a
epair3b: Ethernet address: 02:60:27:70:4b:0b
epair3a: link state changed to UP
epair3b: link state changed to UP
lock order reversal:
1st 0x13be260 allprison (allprison) @ /usr/src/sys/kern/kern_jail.c:960
2nd 0x15964a0 vnet_sysinit_sxlock (vnet_sysinit_sxlock) @
/usr/src/sys/net/vnet.c:575
stack backtrace:
#0 0x6f6520 at witness_debugger+0xf4
#1 0x6f8440 at witness_checkorder+0xa1c
#2 0x675690 at _sx_slock_int+0x70
#3 0x675810 at _sx_slock+0x1c
#4 0x7f4338 at vnet_sysinit+0x38
#5 0x7f44dc at vnet_alloc+0x118
#6 0x62ab84 at kern_jail_set+0x3274
#7 0x62b62c at sys_jail_set+0x8c
#8 0xa8a798 at trap+0x9a0
#9 0xa7e660 at powerpc_interrupt+0x140
fatal kernel trap:
exception = 0x300 (data storage interrupt)
virtual address = 0xc00000008df1df30
dsisr = 0x42000000
srr0 = 0xe00000004784ce98 (0xe00000004784ce98)
srr1 = 0x9000000000009032
current msr = 0x9000000000009032
lr = 0xe00000004784ce90 (0xe00000004784ce90)
curthread = 0xc00000000b8c8560
pid = 9536, comm = jail
(Hand transcribed from here on:)
[ thread pid 9536 tid 100174 ]
Stopped at vnet_epair_init+0x78: stdx r3,r29,r30
db:0:kdb.enter.default> bt
Tracing pid 9536 tid 100174 td 0xc00000000b8c8560
0xe000000047274240: at vnet_sysinit+0x70
0xe000000047274270: at vnet_alloc+0x118
0xe000000047274300: at kern_jail_set+0x3274
0xe000000047274610: at sys_jail_set+0x8c
0xe000000047274660: at trap+0x9a0
0xe000000047274790: at powerpc_interrupt+0x140
0xe000000047274820: user sc trap by 0x81016a888
srr1 = 0x900000000000f032
r1 = 0x3fffffffffffd080
cr = 0x28002482
xer = 0x20000000
ctr = 0x81016a880
r2 = 0x810322300
db> show reg
r0 = 0xe00000004784ce90 vnet_epair_init+0x70
r1 = 0xe000000047050200
r2 = 0xe00000004784ce90 .TOC.
r3 = 0xc000000027a3fc00
r4 = 0x4
r5 = 0xe04008
r6 = 0x119
r7 = 0
r8 = 0xc00000000b8c8560
r9 = 0x2
r10 = 0xc00000000b8c8560
r11 = 0xc00000000b8c86a0
r12 = 0x152f1e8
r13 = 0xc00000000b8c8560
r14 = 0
r15 = 0
r16 = 0xc00000000763d960
r17 = 0xc000000008145090
r18 = 0
r19 = 0xc000000027a45058
r20 = 0x10e3690 prison0
r21 = 0
r22 = 0
r23 = 0
r24 = 0
r25 = 0xc000000027a45000
r26 = 0
r27 = 0x11e71b0 __start_set_compressors
r28 = 0xe000000047871000 .TOC.+0x9300
r29 = 0xe000000047860230 vnet_entry_epair_cloner
r30 = 0xe0000000466bdd00
r31 = 0xe000000047050200
srr0 = 0xe00000004784ce98 vnet_epair_init+0x78
srr1 = 0x9000000000009032
lr = 0xe00000004784ce90 vnet_epair_init+0x70
ctr = 0x1
cr = 0x20222234
xer = 0
dar = 0xe00000008df1df30
dsisr= 0x42000000
vnet_epair_init+0x70: stdx r3,r29,r30
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ppc
mailing list