Kernel panic on boot at dm_crypt

Stefan Unterweger 232.20711 at chiffre.aleturo.com
Wed Sep 14 06:36:59 PDT 2016


Just a heads-up:  I still get pretty much the same problems with
50787d03cd0a.  I think it got worse between 4.6 and 4.7 (50787d03cd0a),
but I am not really sure—could also be coincidental.

It’s not as bad as when I originally reported it, but still nasty
enough.  The panics are the same (see screenshots), only with different
addresses.

| Fatal trap 12: page fault while in kernel mode
| cpuid = 0; lapic->id    = 00000000
| fault virtual address   = 0x0
| fault code              = supervisor write data, page not present
| instruction pointer     = 0x8:0xffffffff80601202
| stack pointer           = 0x10:0xffffffe09f84b810
| frame pointer           = 0x10:0xffffffe09f84b850
| code segment            = base 0x0, limit 0xfffff, type 0x1b
|                         = DPL 0, pres 1, long 0, def32 0, gran 1
| processor eflags        = interrupt enabled, resume, IOPL = 0
| current process         = Idle
| current thread          = pri 28 (CRIT)
| kernel: type 12 trap, code=0
| 
| CPU0 stopping CPUs: 0x00000002
|  stopped
| Stopped at     mpipe_alloc_callback+0x13d:    movq    %rcx,(%rax)
| db>

When I try to add LUKS keys once the machine is running, I get a
slightly different panic:

| Fatal trap 9: general protection fault while in kernel mode
| cpuid = 0; lapic->id    = 00000000
| instruction pointer     = 0x8:0xffffffff805f54ac
| stack pointer           = 0x10:0xffffffe09f84b7a0
| frame pointer           = 0x10:0xffffffe09f84b7f0
| code segment            = base 0x0, limit 0xfffff, type 0x1b
|                         = DPL 0, pres 1, long 0, def32 0, gran 1
| processor eflags        = interrupt enabled, resume, IOPL = 0
| current process         = Idle
| current thread          = pri 28 (CRIT)
| kernel: type 9 trap, code=0
| 
| CPU0 stopping CPUs: 0x00000002
|  stopped
| Stopped at     objcache_get+0x75:             addl    $0x1,0xd0(%r12)
| db>

This is a test machine.  I can reliably provoke the panic and can
test any patches relatively quickly now. :o)


Thanks,
    Stefan


* Stefan Unterweger on Wed, Jul 06, 2016 at 01:04:47AM +0200:
> Since I’m currently stuck staring at rebooting screeny anyway, I thought
> I might as well copy the contents of the kernel page as plain text, for
> easier reference.  I hope I haven’t mistyped too many of those horribly
> long memory addresses in the process.
> 
> 
> Fatal trap 12: page fault while in kernel mode
> cpuid = 0; lapic->id    = 00000000
> fault virtual address   = 0xffffffe07ff40318
> fault code              = supervisor write data, page not present
> instruction pointer     = 0x8:0xffffffff80606056
> stack pointer           = 0x10:0xffffffe0b6140810
> frame pointer           = 0x10:0xffffffe0b6140850
> code segment            = base 0x0, limit 0xfffff, type 0x1b
>                         = DPL 0, pres 1, long 0, def32 0, gran 1
> processor eflags        = interrupt enabled, resume, IOPL = 0
> current process         = Idle
> current thread          = pri 28 (CRIT)
> kernel: type 12 trap, code=0
> 
> CPU0 stopping CPUs: 0x0000000e
>  stopped
> Stopped at     mpipe_alloc_callback+0x13d:    movq    %rcv,(%rax)
> db>

-- 
▪ Die Internetbleibe.  Schick, magisch, leistungsstark.  https://internetbleibe.de/
▪ medoly media UG (haftungsbeschränkt) | Hausburgstraße 13, 10249 Berlin
▪ info at medolymedia.de | https://medolymedia.de/ | Tel. 030 609 826‒560 | Fax …‒569
▪ Geschäftsführer: Matthias Nothhaft | HRB 131198 (Amtsgericht Berlin-Charlottenburg), Sitz: Berlin, USt-ID: DE275221203
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 5GIe+bh13 ? ledostar at nur-ab-sal xwd-#00062.png
Type: image/png
Size: 29634 bytes
Desc: not available
URL: <http://lists.dragonflybsd.org/pipermail/users/attachments/20160914/a002b918/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 5GIe+bh13 ? ledostar at nur-ab-sal xwd-#00063.png
Type: image/png
Size: 28576 bytes
Desc: not available
URL: <http://lists.dragonflybsd.org/pipermail/users/attachments/20160914/a002b918/attachment-0003.png>


More information about the Users mailing list