Re: amd64/183397: Kernel panic at first incoming ssh

2013-11-01 Thread John Baldwin
On Thursday, October 31, 2013 7:50:01 pm Torbjorn Granlund wrote:
 The following reply was made to PR amd64/183397; it has been noted by GNATS.
 
 From: Torbjorn Granlund t...@gmplib.org
 To: John Baldwin j...@freebsd.org
 Cc: freebsd-amd64@freebsd.org,  freebsd-gnats-sub...@freebsd.org
 Subject: Re: amd64/183397: Kernel panic at first incoming ssh
 Date: Fri, 01 Nov 2013 00:42:19 +0100
 
  Those attachments didn't come out too pretty at the web PR interface.
  
  I put the screen dumps in png format here:
  
  http://gmplib.org/~tege/fbsd32-oh-no-ssh.png
  http://gmplib.org/~tege/fbsd64-oh-no-ssh.png

Can you fire up gdb against your 64-bit kernel file (e.g. gdb 
/boot/kernel/kernel) and do 'l *xn_intr+0x7d'?

-- 
John Baldwin
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to freebsd-amd64-unsubscr...@freebsd.org


Re: amd64/183397: Kernel panic at first incoming ssh

2013-11-01 Thread John Baldwin
On Friday, November 01, 2013 12:48:54 pm Torbjorn Granlund wrote:
 John Baldwin j...@freebsd.org writes:
 
   Can you fire up gdb against your 64-bit kernel file (e.g. gdb 
   /boot/kernel/kernel) and do 'l *xn_intr+0x7d'?
 
 I'm afraid my ignorance of how to debug the kernel will show itself
 here.
 
 I did this:
 
 1. booted the system.
 2. logged in as root on the (vnc) console.
 3. issued the command gdb /boot/kernel/kernel
 4. Issued the above command and got this printout:
 
 (gdb) l *xn_intr+0x7d
 0x8079fb7d is in xn_intr (atomic.h:161).
 156 atomic.h: No such file ot directory.
 in atomic.h
 (gdb)

Hummm, I assume you can't get a crashdump when this happens?  atomic.h means 
it is likely acquiring a lock:

static void
xn_intr(void *xsc)
{
struct netfront_info *np = xsc;
struct ifnet *ifp = np-xn_ifp;

#if 0
if (!(np-rx.rsp_cons != np-rx.sring-rsp_prod 
likely(netfront_carrier_ok(np)) 
ifp-if_drv_flags  IFF_DRV_RUNNING))
return;
#endif
if (RING_HAS_UNCONSUMED_RESPONSES(np-tx)) {
XN_TX_LOCK(np);
xn_txeof(np);
XN_TX_UNLOCK(np);   
}   

XN_RX_LOCK(np);
xn_rxeof(np);
XN_RX_UNLOCK(np);

Either the XN_TX_LOCK() or XN_RX_LOCK().  It's hard to narrow down where the 
corruption lies without a dump.

-- 
John Baldwin
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to freebsd-amd64-unsubscr...@freebsd.org


Re: amd64/183397: Kernel panic at first incoming ssh

2013-10-31 Thread Torbjorn Granlund
The following reply was made to PR amd64/183397; it has been noted by GNATS.

From: Torbjorn Granlund t...@gmplib.org
To: John Baldwin j...@freebsd.org
Cc: freebsd-amd64@freebsd.org, freebsd-gnats-sub...@freebsd.org
Subject: Re: amd64/183397: Kernel panic at first incoming ssh
Date: Thu, 31 Oct 2013 22:10:31 +0100

 --=-=-=
 
   The contents of the stack trace would indeed be very valuable.
 
 These are screendumps (sorry, no text version!) of the last few lines of
 the amd64 panic first, and then the x86-32 panic:
 
 
 --=-=-=
 Content-Type: application/octet-stream
 Content-Disposition: attachment; filename=fbsd64-oh-no-ssh.bz2
 Content-Transfer-Encoding: base64
 
 QlpoOTFBWSZTWaYCcu4AKjd/4CH+8AAA
 DeHOD6X0+yTKhSiEBdmEUFKJSFFsBlE7YkoSFANJBWdEid3OlMUdAaULNDQiZSeptKn7
 QalPyntKNMU/SnlPTCT1D0IZBiHqAGTQANGJgmEaekaGE9QYAgAADEYQDT1GQA0DJpoyaGmmmIZM
 RiaGgwSmRE0EQCNCZTEYE9TU9QNpkCMmRkBptRoDEANAAaAADTRoAGmg0ABoDI0AAAeoB6jQAAAG
 QGgCAAAJgACYADQmAADQAAAjRhGAmAA0ABoA0AAR6mTAAEwACYABCpIkzU0yFPUeoDNQ
 aPUAaGjEAADTIBoAGgyNAxNAPSAAABoMgMmgG0gaABppoAGQDQA0AZAANAiVKVNBo00Bo0GE00aa
 YQ0aaNMmBMmmIxMRkZGQZBoaYQZAZDTIaZMjJpoGmBMCNMATJkADJkwgNGhkGEyaPfvJVFBJqISa
 BTUNEn6p7VGgD9UBo0AAAZAaAADQAAAGgAAANAAHIaQREG4KLE1SBkqAqSKo
 kdc4vAGSCKhSqCSwgAJCSgoksCKhDCIiQkorIEgBAEANKg0oK0rDAiEhIKEEKLKyqkiQCw1ISyVB
 ASQk6VhFhhCYVpEqoGpkkYEgpJCSWIICCAhlgIKCohggmSJgKUgmEiAIlklmkoBpCCGShihSZWSi
 IoJiWkgkmQiGICSmYhIIVpIJIilFoJkKASkKUgoKgaAIgmoaWkiCYgqpKCkYgopqKiZiAKaUoKJo
 ilEmCahSJVGmqQJlKkgqkpKaQmIqSlBYgaCZKCioqBiBApUpRpQKBUppWhJKhClpUapEJlCmlBmU
 gkZiYAmWRkgkqkiKGiCoYmkJlYCEppIigIKiKWZCEaEgkImpJomCJpYqEiFpCkQiIkBopmpqIWKg
 pSZQppRamAiGlSmKiCUiQGmihaIAgqWAaAaSokqJqq9uATgiEoCBUaEpEKFiFDWlEUxKlIRCU0UQ
 S0g0UVMg0BUSpFLAUCFGY1JVQXNjCHZpRVB8pCaUqqgBqyqoOxkQBTqUoAKOoO1xo+wd9yABFy6Z
 gcSVa+FRUHElCdBxhBUBptGAwQgAJTSxKCiUNRAioU01QiIlFLVKK0NCUUgBFStADUwCJBKANU0U
 CIUNMSChRREKLQVQlKqUFDSlALTRVKUxNAUVVAVTVCVRRSLQRFCEVFCsUSDSU00I0jRTQlJRVAUE
 VMRVAUVVAUlES0NEQMUQ1TEFMyUTBVFFBRTMVRQUzCVUQBUVARNUtURRJFSVM1VUzFDUVLREFNUU
 k1DRNQUzBRMVNBBFTQVFQEyFVEBVRCUIKgNTBqQWMCiCCGzAAJBFEdtGsgoAIVQLSqTA0ggg54AV
 BMJtGBBF12A2yYJhGJZMYxjHKOPBScDMm26dDPt9wpbjTU8NRwVCp4Oqq6bhKy5VVbXV9hc0BBQk
 NE+KIioyOkJKUlpianJ6gogFIApqnyVVZXWFlaW1xdXl9gYWJjZGUCzM7QBaWprbG1ub3BxcnN0d
 XZ3eHl6+f0e/r9nx9fn/7/iAgYKDhIOFhvzDxETFRcZGx0fISMlJgpSVBS0vMTM1Nzk7PT4MHQUN
 FR0lLTU4SoqQlVV1lbXV9hY2VnaWttb3FzdXd5e31/gYOFh4mLjY+Rk5WXmZv6/YUL/M7P/uho6W
 nqautr7Gztbe5u73+3+Dh4uPk5ebn6Onq6++/53//f/aLOrrGj0mjAVQdJonIM5oZIqsyhFM2ZsE
 VAc2Bmwc2ZsUABM2BmwDNmbARRM2LmwzZmxEVDNgZsDNhmxRETNjmwDNhmwFXNi5sE0+8qZ/KFME
 AplMKYAUxAaYUymUxBEplMplM6WKANMKYGdOTl0UMkRCmLTApmdOQihl+iGTTGmUxUXyfewySmFM
 UpgANMSmLr9OQNMQWmB4XvIZNMKYDTAplMCmIUxphTCmIeG76GRTAphTFKYUxpjTBXwn8YZJTKZs
 MPVU5KFMphTGmKtMphTKYI0zRRKYHne6hkFM8VBHwOxwyFpmcKZoR0PIwyUpg0xphTENp0yGSUym
 FMCmeL8bDJ1TxMMimIbVtEMmmFMKYhTBpjTKYBTFpjTKYjTKYUymLTCmBTKYlMCmUymDTGmaMtyt
 iWwtjbG2JbG2BbLZbG2GmW5NsS2BbLZbFLYWwtlsQLYWyxAQgABwyvuNDQLYhbLYFsLYBbC2Nsth
 bLYNsthbBthbLZbAthbC2FsC2Wy2NsW2FsthbALY2y2JbAthbG2DbLZozDkYYuGOGYZhhhiYYGGY
 ZhiYY4ZhmGOGGGYZhhhmGYZhiYZhhhgYYmGGGhhmGYYJhmGIYZhimGKCoDhhhmGY
 Y6QUVAQkBQUVAkQRB3bEQUkxEoC0gKUgCUgghCiQIAFCqg/vvpaDAiomaEQVoB3Uc1CoB/yREM0i
 IFCFKBu9PAIrp+c9BkmZh3/S91ZABiD2kUCupBQhSae3wuVQiaJknJJDZJOD+WyQ9BxQQs53Zl+2
 ZD8jX83HABq4wgbqVNlKBrwB9qBzwh8SQRzSomnGtIidgkNM8eS7UK/1ORk4Isppf4ahSfZ/ts/l
 EzdeHo0kz6NRvMTdURWiTNwoxmnhEp1hErJBkYJUTDRMEyJhsUUtm2/7BjOTwz/b/POZ9OcjYOyD
 AlMpk2pugN3hZRxZmtBcQifriZ8lyVDLshSKZ4JQ8lEXFDSRS4UAJ70v1iaNK7OKFr+zno21zd72
 kixg+AdJq1CUsekfOihHZWnos4eJuRqAoIhEEVX4Po7wQBlBCOoojul6fsdOKoI4vBkkDeITYyLC
 PQ762tw8jg0x8/oWlMnwUdlVfW12c/uBJC/E+onA1ZQGRURkGxvVlLIRjIojFPb24warWvDWe78E
 USDAMb2EUFk/qmi3riBIJyJDV1KmkGkI6GoSImTaFXOM8TccVXhHSpZO839Ff4ioyA8OXnzv8tjT
 H5mzyVi0sEjcijM+e7nxfYVKvgPFTEVLfk3DDx7tB6Hor9VNIW8LEpUURZvRQklIxkKwUQA1CMPO
 XHjd7PEeEV4XsXpXDtsJ0FGEM3jfQlxKqRmH5C1uEJPFf4yYtdBPAspZ5E0eKvmdhZeBcR6A+H3q
 3GCAJz7QeEXCUzCUIDJbyh9iXGQp0lmcxJIoy1N4qgKIpA9HkJKJBoIytQT5N1baYcIaHYQoBptt
 ZIyK8kPKoKOoRjPFoInRDyFrWJ8HfMarWLColmKaUKJ5vU2k4Cx5OdUdB+aUnz/PMmTGNN7/a6Yz
 yY0VTUig0NDnx3TnjMF3SopIS4a59swaC5cWk8sxQgUezNl7SpjSQUm4h0TnyE7WepgMKBpkuWwa
 cWWeVCLXtFIYpdFEUWAtIcG4MYM3j2V5d1vS5jLB5fj/JxeI4kAXhPVy3scHB0ZJp7MbQhmBEsKc
 0mkoaiOHPimLCgR0+mMkzWvHx8nHfRLKGI22npcZJxtM062OrUadbRiiEcr4ptk5GuZO7iUSCMJh
 msThOve3wiCCTUqVW1wUjVoGY8CWJQ+AbVhI5Mw7YziZyeDjeaGihDHcotWWjvR329ckzwZzTxHW
 cBFmTXWq1RTFFgUtbDQMcC0XNjbTz7/XieJmyUyDta1CbEfYZbhGyKQ2+3cEmPcnEWEUQcg+AULd
 nbVu3JySTnBDgajMeZLLsZk7x/O7rEb2e1Lf0m+4uszmschyowu06LjTAZIDjbgfFwIZK9G4te3c
 1HJCLRjM5iQO24s9xg3F2NqHEaSFoHCMIOgiuZ7SbcOdKKy4+FZV+QvOeF4AzD8PVrtso3pXsj53
 zu/uDlv2YjEEPORVVSOoJEJCBiaEIUMEVR1ag2QUqHDC7gUhRVQogLBYwPK3IhmYiGqxjFNWxQC5
 AyNXNG8CWWMsR4nGKqEmEoM5JiUZiLIJjKFFEnoG472wpqkfQPsN+2ZQKlrD1ot8dUhSBJ9JkHUR
 IqFEoFhh8TuaVwWosbdmd89iTgxZ5jVEsKaoSgGETrdgimt6qyUxE3a1ooVMlMBE0lQZBmZnOJM4
 zbAwNpSOqsR0VTGCMMJQqVyoKrW3GUGZWxsAsUhZshTwknt7ZYoSwV0M+EUFo0ZpCxg9SK0GhXbM
 MQoWQOM5JcKdRPESMWIqJueNU28

Re: amd64/183397: Kernel panic at first incoming ssh

2013-10-28 Thread Torbjorn Granlund
I suppose non-critical/low might not be appropriate if Xen-based
virtualisation is common for FreeBSD.  Then critical/high is more
suitable!

For what it is worth, the exact same panic happens for a x86-32 install
(as opposed to x86-64 in the PR) under the same Xen/NetBSD system.

I should also perhaps mention that the Xen/NetBSD system runs several
guests flawlessly, including 32-bit and 64-bit FreeBSD 9.2, NetBSD
6.1.2, Debian GNU/Linux and Debian GNU/kFreeBSD.

I fully realise that the bug might very well be on the Xen side.

-- 
Torbjörn
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to freebsd-amd64-unsubscr...@freebsd.org

Re: amd64/183397: Kernel panic at first incoming ssh

2013-10-28 Thread Torbjorn Granlund
The following reply was made to PR amd64/183397; it has been noted by GNATS.

From: Torbjorn Granlund t...@gmplib.org
To: freebsd-gnats-sub...@freebsd.org
Cc: freebsd-amd64@FreeBSD.org
Subject: Re: amd64/183397: Kernel panic at first incoming ssh
Date: Mon, 28 Oct 2013 17:29:48 +0100

 I suppose non-critical/low might not be appropriate if Xen-based
 virtualisation is common for FreeBSD.  Then critical/high is more
 suitable!
 
 For what it is worth, the exact same panic happens for a x86-32 install
 (as opposed to x86-64 in the PR) under the same Xen/NetBSD system.
 
 I should also perhaps mention that the Xen/NetBSD system runs several
 guests flawlessly, including 32-bit and 64-bit FreeBSD 9.2, NetBSD
 6.1.2, Debian GNU/Linux and Debian GNU/kFreeBSD.
 
 I fully realise that the bug might very well be on the Xen side.
 
 --=20
 Torbj=C3=B6rn
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to freebsd-amd64-unsubscr...@freebsd.org