Bug report

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

Bug report

bugreport
Hello!

>Synopsis: Intermittent kernel panics after varying periods of time
>Category: kernel
>Environment:
        System      : OpenBSD 6.4
        Details     : OpenBSD 6.4 (GENERIC) #349: Thu Oct 11 13:25:13 MDT 2018
                         [hidden email]:/usr/src/sys/arch/amd64/compile/GENERIC

        Architecture: OpenBSD.amd64
        Machine     : amd64
>Description:
       
>How-To-Repeat: unsure

Relevant bit in /var/log/messages:
Nov  5 17:11:09 malice syslogd[46310]: start
Nov  5 17:11:09 malice /bsd: uvm_fault(0xffffffff81d02318, 0x13b, 0, 2) -> e
Nov  5 17:11:09 malice /bsd: fatal page fault in supervisor mode
Nov  5 17:11:09 malice /bsd: trap type 6 code 2 rip ffffffff816f5f80 cs
8 rflags 10286 cr2  13b cpl 0 rsp ffff80000e399a68
Nov  5 17:11:09 malice /bsd: gsbase 0xffffffff81c69ff0  kgsbase 0x0
Nov  5 17:11:09 malice /bsd: panic: trap type 6, code=2, pc=ffffffff816f5f80
Nov  5 17:11:09 malice /bsd: Starting stack trace...
Nov  5 17:11:09 malice /bsd: panic() at panic+0x113
Nov  5 17:11:09 malice /bsd: kerntrap(9b8708802bdc7533) at kerntrap+0xee
Nov  5 17:11:09 malice /bsd: alltraps_kern(6,1,0,2,ffffff000bad57c0,0)
at alltraps_kern+0x7b
Nov  5 17:11:09 malice /bsd: refcnt_take(e78f7c08b9a2a0b8) at
refcnt_take+0x10
Nov  5 17:11:09 malice /bsd: pf_purge(ffff800000021040) at pf_purge+0x2e
Nov  5 17:11:09 malice /bsd: taskq_thread(0) at taskq_thread+0x5d
Nov  5 17:11:09 malice /bsd: end trace frame: 0x0, count: 251
Nov  5 17:11:09 malice /bsd: End of stack trace.
Nov  5 17:11:09 malice /bsd: syncing disks... done
Nov  5 17:11:09 malice /bsd: syncing disks... done
Nov  5 17:11:09 malice /bsd: dump to dev 4,1 not possible
Nov  5 17:11:09 malice /bsd: rebooting...
Nov  5 17:11:09 malice /bsd: OpenBSD 6.4 (GENERIC) #349: Thu Oct 11
13:25:13 MDT 2018
Nov  5 17:11:09 malice /bsd:
[hidden email]:/usr/src/sys/arch/amd64/compile/GENERIC

       
I've been informed the panic comes from pf, so I will include my ruleset
also:

        #       $OpenBSD: pf.conf,v 1.54 2014/08/23 05:49:42 deraadt Exp $
#
# See pf.conf(5) and /etc/examples/pf.conf

# Ports #
ports_tcp="{ 22, 53, 80, 25, 587, 143, 443 }"
ports_udp="{ 60000:61000, 53 }"
icmp6_types="icmp6-type 128 code 0"
icmp_types="icmp-type 8 code 0"
blocked_users="{ chat }"
# Options #
set skip on lo0
set reassemble yes
set block-policy drop
set loginterface vio0
set state-policy if-bound
set fingerprints "/etc/pf.os"
set ruleset-optimization none

# Tables #
#set optimization normal
#set timeout { tcp.established 600, tcp.closing 60 }

set optimization aggressive
set timeout { adaptive.end 120000, interval 2, tcp.tsdiff 5, tcp.first
5, tcp.closing 5, tcp.closed 5, tcp.finwait 5, tcp.established 4200}
set limit   { states 100000, src-nodes 100000 }

block log on vio0

# Match #
match on vio0 all scrub (random-id min-ttl 64 reassemble tcp max-mss 1440)
#match on vio0 all scrub (no-df max-mss 1440)

# Pass in #
pass in log on vio0 inet  proto icmp  keep state
pass in log on vio0 inet6 proto icmp6 keep state

pass in on vio0 inet proto tcp from any to any port $ports_tcp keep state
pass in on vio0 inet proto udp from any to any port $ports_udp keep state

pass in on vio0 inet6 proto tcp from any to any port $ports_tcp keep state
pass in on vio0 inet6 proto udp from any to any port $ports_udp keep state

# znc/weechat

pass in on vio0 inet proto tcp from any to any port 19203 rdr-to 127.0.0.1
pass in on vio0 inet6 proto tcp from any to any port 19203 rdr-to ::1

pass out on vio0

block out proto tcp from self user $blocked_users
block out proto udp from self user $blocked_users
block  in proto tcp from self user $blocked_users
block  in proto udp from self user $blocked_users



dmesg:
OpenBSD 6.4 (GENERIC) #349: Thu Oct 11 13:25:13 MDT 2018
    [hidden email]:/usr/src/sys/arch/amd64/compile/GENERIC
real mem = 519946240 (495MB)
avail mem = 495091712 (472MB)
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.8 @ 0xf5780 (9 entries)
bios0: vendor SeaBIOS version
"rel-1.11.2-0-gf9626ccb91-prebuilt.qemu-project.org" date 04/01/2014
bios0: QEMU Standard PC (i440FX + PIIX, 1996)
acpi0 at bios0: rev 0
acpi0: sleep states S3 S4 S5
acpi0: tables DSDT FACP APIC HPET
acpi0: wakeup devices
acpitimer0 at acpi0: 3579545 Hz, 24 bits
acpimadt0 at acpi0 addr 0xfee00000: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: Virtual CPU a7769a6388d5, 2395.28 MHz, 06-3d-02
cpu0:
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,SSE3,PCLMUL,SSSE3,FMA3,CX16,PCID,SSE4.1,SSE4.2,MOVBE,POPCNT,AES,XSAVE,AVX,F16C,RDRAND,HV,NXE,RDTSCP,LONG,LAHF,ABM,FSGSBASE,BMI1,AVX2,SMEP,BMI2,ERMS,INVPCID,ARAT,XSAVEOPT,MELTDOWN
cpu0: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB
64b/line 16-way L2 cache
cpu0: ITLB 255 4KB entries direct-mapped, 255 4MB entries direct-mapped
cpu0: DTLB 255 4KB entries direct-mapped, 255 4MB entries direct-mapped
cpu0: smt 0, core 0, package 0
mtrr: Pentium Pro MTRR support, 8 var ranges, 88 fixed ranges
cpu0: apic clock running at 999MHz
ioapic0 at mainbus0: apid 0 pa 0xfec00000, version 20, 24 pins
acpihpet0 at acpi0: 100000000 Hz
acpiprt0 at acpi0: bus 0 (PCI0)
acpicpu0 at acpi0: C1(@1 halt!)
"ACPI0006" at acpi0 not configured
acpicmos0 at acpi0
"PNP0A06" at acpi0 not configured
"PNP0A06" at acpi0 not configured
"PNP0A06" at acpi0 not configured
"QEMU0002" at acpi0 not configured
"ACPI0010" at acpi0 not configured
pvbus0 at mainbus0: KVM
pci0 at mainbus0 bus 0
pchb0 at pci0 dev 0 function 0 "Intel 82441FX" rev 0x02
pcib0 at pci0 dev 1 function 0 "Intel 82371SB ISA" rev 0x00
pciide0 at pci0 dev 1 function 1 "Intel 82371SB IDE" rev 0x00: DMA,
channel 0 wired to compatibility, channel 1 wired to compatibility
pciide0: channel 0 disabled (no drives)
atapiscsi0 at pciide0 channel 1 drive 0
scsibus1 at atapiscsi0: 2 targets
cd0 at scsibus1 targ 0 lun 0: <QEMU, QEMU DVD-ROM, 2.5+> ATAPI 5/cdrom
removable
cd0(pciide0:1:0): using PIO mode 4, DMA mode 2
uhci0 at pci0 dev 1 function 2 "Intel 82371SB USB" rev 0x01: apic 0 int 11
piixpm0 at pci0 dev 1 function 3 "Intel 82371AB Power" rev 0x03: apic 0
int 9
iic0 at piixpm0
vga1 at pci0 dev 2 function 0 "Cirrus Logic CL-GD5446" rev 0x00
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation)
virtio0 at pci0 dev 3 function 0 "Qumranet Virtio Network" rev 0x00
vio0 at virtio0: address 56:00:01:b2:df:2c
virtio0: msix shared
virtio1 at pci0 dev 4 function 0 "Qumranet Virtio Storage" rev 0x00
vioblk0 at virtio1
scsibus2 at vioblk0: 2 targets
sd0 at scsibus2 targ 0 lun 0: <VirtIO, Block Device, > SCSI3 0/direct fixed
sd0: 20480MB, 512 bytes/sector, 41943040 sectors
virtio1: msix shared
virtio2 at pci0 dev 5 function 0 "Qumranet Virtio Memory" rev 0x00
viomb0 at virtio2
virtio2: apic 0 int 10
virtio3 at pci0 dev 6 function 0 "Qumranet Virtio RNG" rev 0x00
viornd0 at virtio3
virtio3: apic 0 int 10
isa0 at pcib0
isadma0 at isa0
fdc0 at isa0 port 0x3f0/6 irq 6 drq 2
pckbc0 at isa0 port 0x60/5 irq 1 irq 12
pckbd0 at pckbc0 (kbd slot)
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pms0 at pckbc0 (aux slot)
wsmouse0 at pms0 mux 0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
usb0 at uhci0: USB revision 1.0
uhub0 at usb0 configuration 1 interface 0 "Intel UHCI root hub" rev
1.00/1.00 addr 1
uhidev0 at uhub0 port 1 configuration 1 interface 0 "QEMU QEMU USB
Tablet" rev 2.00/0.00 addr 2
uhidev0: iclass 3/0
ums0 at uhidev0: 3 buttons, Z dir
wsmouse1 at ums0 mux 0
vscsi0 at root
scsibus3 at vscsi0: 256 targets
softraid0 at root
scsibus4 at softraid0: 256 targets
root on sd0a (d631b5c3a4945998.a) swap on sd0b dump on sd0b
WARNING: / was not properly unmounted
fd0 at fdc0 drive 1: density unknown

usbdevs:
Controller /dev/usb0:
addr 01: 8086:0000 Intel, UHCI root hub
         full speed, self powered, config 1, rev 1.00
         driver: uhub0
addr 02: 0627:0001 QEMU, QEMU USB Tablet
         full speed, power 100 mA, config 1, rev 0.00, iSerialNumber 42
         driver: uhidev0

pcidump:
Domain /dev/pci0:
 0:0:0: Intel 82441FX
        0x0000: Vendor ID: 8086 Product ID: 1237
        0x0004: Command: 0103 Status: 0000
        0x0008: Class: 06 Subclass: 00 Interface: 00 Revision: 02
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR empty (00000000)
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR empty (00000000)
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 00 Line: 00 Min Gnt: 00 Max Lat: 00
        0x0000: 12378086 00000103 06000002 00000000
        0x0010: 00000000 00000000 00000000 00000000
        0x0020: 00000000 00000000 00000000 11001af4
        0x0030: 00000000 00000000 00000000 00000000
        0x0040: 00000000 00000000 00000000 00000000
        0x0050: 00000000 40000000 11111000 33111111
        0x0060: 00000000 00000000 00000000 00000000
        0x0070: 000a0000 00000000 00000000 00000000
        0x0080: 00000000 00000000 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:1:0: Intel 82371SB ISA
        0x0000: Vendor ID: 8086 Product ID: 7000
        0x0004: Command: 0103 Status: 0200
        0x0008: Class: 06 Subclass: 01 Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 80 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR empty (00000000)
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR empty (00000000)
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 00 Line: 00 Min Gnt: 00 Max Lat: 00
        0x0000: 70008086 02000103 06010000 00800000
        0x0010: 00000000 00000000 00000000 00000000
        0x0020: 00000000 00000000 00000000 11001af4
        0x0030: 00000000 00000000 00000000 00000000
        0x0040: 00000000 00000000 00000000 0003004d
        0x0050: 00000000 00000000 00000000 00000000
        0x0060: 0b0b0a0a 00000000 00000200 00000000
        0x0070: 00000080 0c0c0000 00000002 00000000
        0x0080: 00000000 00000000 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000008 00000000 0000000f 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:1:1: Intel 82371SB IDE
        0x0000: Vendor ID: 8086 Product ID: 7010
        0x0004: Command: 0107 Status: 0280
        0x0008: Class: 01 Subclass: 01 Interface: 80 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR empty (00000000)
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR io addr: 0x0000c0c0/0x0010
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 00 Line: 00 Min Gnt: 00 Max Lat: 00
        0x0000: 70108086 02800107 01018000 00000000
        0x0010: 00000000 00000000 00000000 00000000
        0x0020: 0000c0c1 00000000 00000000 11001af4
        0x0030: 00000000 00000000 00000000 00000000
        0x0040: a3070000 00000000 00000000 00000000
        0x0050: 00000000 00000000 00000000 00000000
        0x0060: 00000000 00000000 00000000 00000000
        0x0070: 00000000 00000000 00000000 00000000
        0x0080: 00000000 00000000 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:1:2: Intel 82371SB USB
        0x0000: Vendor ID: 8086 Product ID: 7020
        0x0004: Command: 0107 Status: 0000
        0x0008: Class: 0c Subclass: 03 Interface: 00 Revision: 01
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR empty (00000000)
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR io addr: 0x0000c040/0x0020
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 04 Line: 0b Min Gnt: 00 Max Lat: 00
        0x0000: 70208086 00000107 0c030001 00000000
        0x0010: 00000000 00000000 00000000 00000000
        0x0020: 0000c041 00000000 00000000 11001af4
        0x0030: 00000000 00000000 00000000 0000040b
        0x0040: 00000000 00000000 00000000 00000000
        0x0050: 00000000 00000000 00000000 00000000
        0x0060: 00000010 00000000 00010000 00000000
        0x0070: 00000000 00000000 00000000 00000000
        0x0080: 00000000 00000000 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00002000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:1:3: Intel 82371AB Power
        0x0000: Vendor ID: 8086 Product ID: 7113
        0x0004: Command: 0103 Status: 0280
        0x0008: Class: 06 Subclass: 80 Interface: 00 Revision: 03
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR empty (00000000)
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR empty (00000000)
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 01 Line: 09 Min Gnt: 00 Max Lat: 00
        0x0000: 71138086 02800103 06800003 00000000
        0x0010: 00000000 00000000 00000000 00000000
        0x0020: 00000000 00000000 00000000 11001af4
        0x0030: 00000000 00000000 00000000 00000109
        0x0040: 00000601 00000000 00000000 00000000
        0x0050: 00000000 00000000 02000000 10000000
        0x0060: 60000000 00000000 00000000 00000000
        0x0070: 00000000 00000000 00000000 00000000
        0x0080: 00000001 00000000 00000000 00000000
        0x0090: 00000701 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00090000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:2:0: Cirrus Logic CL-GD5446
        0x0000: Vendor ID: 1013 Product ID: 00b8
        0x0004: Command: 0107 Status: 0000
        0x0008: Class: 03 Subclass: 00 Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR mem prefetchable 32bit addr: 0xfc000000/0x02000000
        0x0014: BAR mem 32bit addr: 0xfebf0000/0x00001000
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR empty (00000000)
        0x0024: BAR empty (00000000)
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 1100
        0x0030: Expansion ROM Base Address: febe0000
        0x0038: 00000000
        0x003c: Interrupt Pin: 00 Line: 00 Min Gnt: 00 Max Lat: 00
        0x0000: 00b81013 00000107 03000000 00000000
        0x0010: fc000008 febf0000 00000000 00000000
        0x0020: 00000000 00000000 00000000 11001af4
        0x0030: febe0000 00000000 00000000 00000000
        0x0040: 00000000 00000000 00000000 00000000
        0x0050: 00000000 00000000 00000000 00000000
        0x0060: 00000000 00000000 00000000 00000000
        0x0070: 00000000 00000000 00000000 00000000
        0x0080: 00000000 00000000 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:3:0: Qumranet Virtio Network
        0x0000: Vendor ID: 1af4 Product ID: 1000
        0x0004: Command: 0107 Status: 0010
        0x0008: Class: 02 Subclass: 00 Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR io addr: 0x0000c060/0x0020
        0x0014: BAR mem 32bit addr: 0xfebf1000/0x00001000
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR mem prefetchable 64bit addr: 0x00000000fe000000/0x00004000
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 0001
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 01 Line: 0b Min Gnt: 00 Max Lat: 00
        0x0098: Capability 0x11: Extended Message Signalled Interrupts (MSI-X)
        0x0084: Capability 0x09: Vendor Specific
        0x0070: Capability 0x09: Vendor Specific
        0x0060: Capability 0x09: Vendor Specific
        0x0050: Capability 0x09: Vendor Specific
        0x0040: Capability 0x09: Vendor Specific
        0x0000: 10001af4 00100107 02000000 00000000
        0x0010: 0000c061 febf1000 00000000 00000000
        0x0020: fe00000c 00000000 00000000 00011af4
        0x0030: 00000000 00000098 00000000 0000010b
        0x0040: 01100009 00000004 00000000 00001000
        0x0050: 03104009 00000004 00001000 00001000
        0x0060: 04105009 00000004 00002000 00001000
        0x0070: 02146009 00000004 00003000 00001000
        0x0080: 00000004 05147009 00000000 00000000
        0x0090: 00000000 00000000 80028411 00000001
        0x00a0: 00000801 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:4:0: Qumranet Virtio Storage
        0x0000: Vendor ID: 1af4 Product ID: 1001
        0x0004: Command: 0107 Status: 0010
        0x0008: Class: 01 Subclass: 00 Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR io addr: 0x0000c000/0x0040
        0x0014: BAR mem 32bit addr: 0xfebf2000/0x00001000
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR mem prefetchable 64bit addr: 0x00000000fe004000/0x00004000
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 0002
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 01 Line: 0b Min Gnt: 00 Max Lat: 00
        0x0098: Capability 0x11: Extended Message Signalled Interrupts (MSI-X)
        0x0084: Capability 0x09: Vendor Specific
        0x0070: Capability 0x09: Vendor Specific
        0x0060: Capability 0x09: Vendor Specific
        0x0050: Capability 0x09: Vendor Specific
        0x0040: Capability 0x09: Vendor Specific
        0x0000: 10011af4 00100107 01000000 00000000
        0x0010: 0000c001 febf2000 00000000 00000000
        0x0020: fe00400c 00000000 00000000 00021af4
        0x0030: 00000000 00000098 00000000 0000010b
        0x0040: 01100009 00000004 00000000 00001000
        0x0050: 03104009 00000004 00001000 00001000
        0x0060: 04105009 00000004 00002000 00001000
        0x0070: 02146009 00000004 00003000 00001000
        0x0080: 00000004 05147009 00000000 00000000
        0x0090: 00000000 00000000 80018411 00000001
        0x00a0: 00000801 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:5:0: Qumranet Virtio Memory
        0x0000: Vendor ID: 1af4 Product ID: 1002
        0x0004: Command: 0107 Status: 0010
        0x0008: Class: 00 Subclass: ff Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR io addr: 0x0000c080/0x0020
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR mem prefetchable 64bit addr: 0x00000000fe008000/0x00004000
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 0005
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 01 Line: 0a Min Gnt: 00 Max Lat: 00
        0x0084: Capability 0x09: Vendor Specific
        0x0070: Capability 0x09: Vendor Specific
        0x0060: Capability 0x09: Vendor Specific
        0x0050: Capability 0x09: Vendor Specific
        0x0040: Capability 0x09: Vendor Specific
        0x0000: 10021af4 00100107 00ff0000 00000000
        0x0010: 0000c081 00000000 00000000 00000000
        0x0020: fe00800c 00000000 00000000 00051af4
        0x0030: 00000000 00000084 00000000 0000010a
        0x0040: 01100009 00000004 00000000 00001000
        0x0050: 03104009 00000004 00001000 00001000
        0x0060: 04105009 00000004 00002000 00001000
        0x0070: 02146009 00000004 00003000 00001000
        0x0080: 00000004 05147009 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000
 0:6:0: Qumranet Virtio RNG
        0x0000: Vendor ID: 1af4 Product ID: 1005
        0x0004: Command: 0107 Status: 0010
        0x0008: Class: 00 Subclass: ff Interface: 00 Revision: 00
        0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 00
        0x0010: BAR io addr: 0x0000c0a0/0x0020
        0x0014: BAR empty (00000000)
        0x0018: BAR empty (00000000)
        0x001c: BAR empty (00000000)
        0x0020: BAR mem prefetchable 64bit addr: 0x00000000fe00c000/0x00004000
        0x0028: Cardbus CIS: 00000000
        0x002c: Subsystem Vendor ID: 1af4 Product ID: 0004
        0x0030: Expansion ROM Base Address: 00000000
        0x0038: 00000000
        0x003c: Interrupt Pin: 01 Line: 0a Min Gnt: 00 Max Lat: 00
        0x0084: Capability 0x09: Vendor Specific
        0x0070: Capability 0x09: Vendor Specific
        0x0060: Capability 0x09: Vendor Specific
        0x0050: Capability 0x09: Vendor Specific
        0x0040: Capability 0x09: Vendor Specific
        0x0000: 10051af4 00100107 00ff0000 00000000
        0x0010: 0000c0a1 00000000 00000000 00000000
        0x0020: fe00c00c 00000000 00000000 00041af4
        0x0030: 00000000 00000084 00000000 0000010a
        0x0040: 01100009 00000004 00000000 00001000
        0x0050: 03104009 00000004 00001000 00001000
        0x0060: 04105009 00000004 00002000 00001000
        0x0070: 02146009 00000004 00003000 00001000
        0x0080: 00000004 05147009 00000000 00000000
        0x0090: 00000000 00000000 00000000 00000000
        0x00a0: 00000000 00000000 00000000 00000000
        0x00b0: 00000000 00000000 00000000 00000000
        0x00c0: 00000000 00000000 00000000 00000000
        0x00d0: 00000000 00000000 00000000 00000000
        0x00e0: 00000000 00000000 00000000 00000000
        0x00f0: 00000000 00000000 00000000 00000000

acpidump:
begin-base64 644 APIC.3
QVBJQ3gAAAAB7UJPQ0hTIEJYUENBUElDAQAAAEJYUEMBAAAAAADg/gEAAAAACAAAAQAAAAEMAAAA
AMD+AAAAAAIKAAACAAAAAAACCgAFBQAAAA0AAgoACQkAAAANAAIKAAoKAAAADQACCgALCwAAAA0A
BAb/AAAB
====
begin-base64 644 DSDT.2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====
begin-base64 644 FACP.1
RkFDUHQAAAABJ0JPQ0hTIEJYUENGQUNQAQAAAEJYUEMBAAAAAAD+H0AA/h8BAAkAsgAAAPHwAAAA
BgAAAAAAAAQGAAAAAAAAAAAAAAgGAADgrwAAAAAAAAQCAAQEAAAA/w//DwAAAAAAAAAAMgAAAKWA
AAA=
====
begin-base64 644 HPET.4
SFBFVDgAAAABA0JPQ0hTIEJYUENIUEVUAQAAAEJYUEMBAAAAAaKGgAAAAAAAAND+AAAAAAAAAAA=
====
begin-base64 644 RSDT.0
UlNEVDAAAAABB0JPQ0hTIEJYUENSU0RUAQAAAEJYUEMBAAAAJRT+H5kU/h8RFf4f
====
begin-base64 644 headers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====

Thank you and please get in touch if you require any more information

Reply | Threaded
Open this post in threaded view
|

Re: Bug report

Alexander Bluhm
On Mon, Nov 05, 2018 at 07:12:23PM +0000, bugreport wrote:
> Nov  5 17:11:09 malice /bsd: uvm_fault(0xffffffff81d02318, 0x13b, 0, 2) -> e

Offset of refcnt.refs in struct pf_state is 0x13c.  So I think the
state pointer is -1.

> Nov  5 17:11:09 malice /bsd: refcnt_take(e78f7c08b9a2a0b8) at
> refcnt_take+0x10
> Nov  5 17:11:09 malice /bsd: pf_purge(ffff800000021040) at pf_purge+0x2e

pf_purge() calls pf_purge_expired_states().

So I guess _Q_INVALID comes from here.

                /* get next state, as cur may get deleted */
                next = TAILQ_NEXT(cur, entry_list);

Currently I don't see how this can happen.  It is an non-MP kernel.
I will continue thinking about it.

bluhm

Reply | Threaded
Open this post in threaded view
|

Re: Bug report

bugreport
Hi,
Did you find anything?
Or do you need some more information about my setup?

Regards

On November 6, 2018 5:54:17 AM UTC, Alexander Bluhm <[hidden email]> wrote:

>On Mon, Nov 05, 2018 at 07:12:23PM +0000, bugreport wrote:
>> Nov  5 17:11:09 malice /bsd: uvm_fault(0xffffffff81d02318, 0x13b, 0,
>2) -> e
>
>Offset of refcnt.refs in struct pf_state is 0x13c.  So I think the
>state pointer is -1.
>
>> Nov  5 17:11:09 malice /bsd: refcnt_take(e78f7c08b9a2a0b8) at
>> refcnt_take+0x10
>> Nov  5 17:11:09 malice /bsd: pf_purge(ffff800000021040) at
>pf_purge+0x2e
>
>pf_purge() calls pf_purge_expired_states().
>
>So I guess _Q_INVALID comes from here.
>
>                /* get next state, as cur may get deleted */
>                next = TAILQ_NEXT(cur, entry_list);
>
>Currently I don't see how this can happen.  It is an non-MP kernel.
>I will continue thinking about it.
>
>bluhm