FreeBSD Bugzilla – Attachment 185276 Details for
Bug 219760
ZFS iSCSI w/ Win10 Initiator Causes pool corruption
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
backtraces showing the issue
backtraces.txt (text/plain), 12.44 KB, created by
emz
on 2017-08-11 08:18:23 UTC
(
hide
)
Description:
backtraces showing the issue
Filename:
MIME Type:
Creator:
emz
Created:
2017-08-11 08:18:23 UTC
Size:
12.44 KB
patch
obsolete
>Fatal trap 9: general protection fault while in kernel mode >cpuid = 21; apic id = 15 >instruction pointer = 0x20:0xffffffff8218dba0 >stack pointer = 0x28:0xfffffe1046b03890 >frame pointer = 0x28:0xfffffe1046b038b0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 0 (zio_write_intr_7) >trap number = 9 >panic: general protection fault >cpuid = 21 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80edde0e at trap+0x5e >#5 0xffffffff80ec2d01 at calltrap+0x8 >#6 0xffffffff8218fbbf at arc_write_done+0xbf >#7 0xffffffff8221aefe at zio_done+0x8ce >#8 0xffffffff822166dc at zio_execute+0xac >#9 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#10 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#11 0xffffffff80a2f795 at fork_exit+0x85 >#12 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 16h38m46s > >Fatal trap 12: page fault while in kernel mode >cpuid = 15; apic id = 0f >fault virtual address = 0x20 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8218e993 >stack pointer = 0x28:0xfffffe104b5ad630 >frame pointer = 0x28:0xfffffe104b5ad660 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 0 (cblk189 taskq_3) >trap number = 12 >panic: page fault >cpuid = 15 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff8218ee20 at arc_release+0x1b0 >#8 0xffffffff821991bd at dbuf_dirty+0x30d >#9 0xffffffff821a1439 at dmu_write+0x119 >#10 0xffffffff8224a75c at zvol_strategy+0x27c >#11 0xffffffff809bc3e7 at g_io_request+0x297 >#12 0xffffffff8263b5d2 at ctl_be_block_dispatch_dev+0x202 >#13 0xffffffff8263d29c at ctl_be_block_worker+0x39c >#14 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#15 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#16 0xffffffff80a2f795 at fork_exit+0x85 >#17 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 13h2m57s > >panic: Solaris(panic): zfs: allocating allocated segment(offset=5075935469568 size=81920) > >cpuid = 1 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff8247f192 at vcmn_err+0xc2 >#4 0xffffffff821ee3ca at zfs_panic_recover+0x5a >#5 0xffffffff821d6f9f at range_tree_add+0x20f >#6 0xffffffff821d5b16 at metaslab_free_dva+0x276 >#7 0xffffffff821d5bd1 at metaslab_free+0x91 >#8 0xffffffff8221997a at zio_dva_free+0x1a >#9 0xffffffff822166dc at zio_execute+0xac >#10 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#11 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#12 0xffffffff80a2f795 at fork_exit+0x85 >#13 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 3h12m39s > >panic: Solaris(panic): zfs: allocating allocated segment(offset=6599069589504 size=81920) > >cpuid = 2 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff8247f192 at vcmn_err+0xc2 >#4 0xffffffff821ee3ca at zfs_panic_recover+0x5a >#5 0xffffffff821d6f9f at range_tree_add+0x20f >#6 0xffffffff821d5b16 at metaslab_free_dva+0x276 >#7 0xffffffff821d5bd1 at metaslab_free+0x91 >#8 0xffffffff8221997a at zio_dva_free+0x1a >#9 0xffffffff822166dc at zio_execute+0xac >#10 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#11 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#12 0xffffffff80a2f795 at fork_exit+0x85 >#13 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 3h4m28s > >Fatal trap 12: page fault while in kernel mode >cpuid = 23; apic id = 17 >fault virtual address = 0x20 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8218e993 >stack pointer = 0x28:0xfffffe10495cb6a0 >frame pointer = 0x28:0xfffffe10495cb6d0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 0 (cblk95 taskq_4) >trap number = 12 >panic: page fault >cpuid = 23 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff8218ee20 at arc_release+0x1b0 >#8 0xffffffff82198e52 at dmu_buf_will_dirty+0x162 >#9 0xffffffff821a1439 at dmu_write+0x119 >#10 0xffffffff8224a75c at zvol_strategy+0x27c >#11 0xffffffff809bc3e7 at g_io_request+0x297 >#12 0xffffffff8263b5d2 at ctl_be_block_dispatch_dev+0x202 >#13 0xffffffff8263d29c at ctl_be_block_worker+0x39c >#14 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#15 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#16 0xffffffff80a2f795 at fork_exit+0x85 >#17 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 8h15m17s > >Fatal trap 12: page fault while in kernel mode >cpuid = 18; apic id = 12 >fault virtual address = 0xa8 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8266be4d >stack pointer = 0x28:0xfffffe104795d670 >frame pointer = 0x28:0xfffffe104795d6d0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 586 (work2) >trap number = 12 >panic: page fault >cpuid = 18 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff8262fcb6 at ctl_work_thread+0x1306 >#8 0xffffffff80a2f795 at fork_exit+0x85 >#9 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 21h45m53s > >panic: Solaris(panic): zfs: allocating allocated segment(offset=8245779054592 size=8192) > >cpuid = 6 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff8247f192 at vcmn_err+0xc2 >#4 0xffffffff821ee3ca at zfs_panic_recover+0x5a >#5 0xffffffff821d6f9f at range_tree_add+0x20f >#6 0xffffffff821d5b16 at metaslab_free_dva+0x276 >#7 0xffffffff821d5bd1 at metaslab_free+0x91 >#8 0xffffffff8221997a at zio_dva_free+0x1a >#9 0xffffffff822166dc at zio_execute+0xac >#10 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#11 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#12 0xffffffff80a2f795 at fork_exit+0x85 >#13 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 22h34m34s > >Fatal trap 12: page fault while in kernel mode >cpuid = 19; apic id = 13 >fault virtual address = 0x20 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8218e993 >stack pointer = 0x0:0xfffffe1045bf48c0 >frame pointer = 0x0:0xfffffe1045bf48f0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 9 (arc_reclaim_thread) >trap number = 12 >panic: page fault >cpuid = 19 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff8219374e at arc_evict_state+0x1be >#8 0xffffffff8218c745 at arc_adjust+0x2e5 >#9 0xffffffff82190d2f at arc_reclaim_thread+0xef >#10 0xffffffff80a2f795 at fork_exit+0x85 >#11 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 3d1h8m8s > >Fatal trap 12: page fault while in kernel mode >cpuid = 13; apic id = 0d >fault virtual address = 0x60 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8266ba0f >stack pointer = 0x28:0xfffffe1047f35420 >frame pointer = 0x28:0xfffffe1047f354c0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 597 (work7) >trap number = 12 >panic: page fault >cpuid = 13 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff82623ed1 at ctl_datamove+0x191 >#8 0xffffffff8262d787 at ctl_inquiry+0xff7 >#9 0xffffffff8262f2f0 at ctl_work_thread+0x940 >#10 0xffffffff80a2f795 at fork_exit+0x85 >#11 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 17h15m59s > >Fatal trap 12: page fault while in kernel mode >cpuid = 6; apic id = 06 >fault virtual address = 0x20 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8218e993 >stack pointer = 0x28:0xfffffe1045bf48c0 >frame pointer = 0x28:0xfffffe1045bf48f0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 9 (arc_reclaim_thread) >trap number = 12 >panic: page fault >cpuid = 22 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff80ede7a2 at trap_fatal+0x322 >#4 0xffffffff80ede7f9 at trap_pfault+0x49 >#5 0xffffffff80ede036 at trap+0x286 >#6 0xffffffff80ec2d01 at calltrap+0x8 >#7 0xffffffff8219374e at arc_evict_state+0x1be >#8 0xffffffff8218c77b at arc_adjust+0x31b >#9 0xffffffff82190d2f at arc_reclaim_thread+0xef >#10 0xffffffff80a2f795 at fork_exit+0x85 >#11 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 3d9h33m56s > >panic: Solaris(panic): zfs: allocating allocated segment(offset=1792100934656 size=46080) > >cpuid = 6 >KDB: stack backtrace: >#0 0xffffffff80aada17 at kdb_backtrace+0x67 >#1 0xffffffff80a6baf6 at vpanic+0x186 >#2 0xffffffff80a6b963 at panic+0x43 >#3 0xffffffff8247f192 at vcmn_err+0xc2 >#4 0xffffffff821ee3ca at zfs_panic_recover+0x5a >#5 0xffffffff821d6f9f at range_tree_add+0x20f >#6 0xffffffff821d5b16 at metaslab_free_dva+0x276 >#7 0xffffffff821d5bd1 at metaslab_free+0x91 >#8 0xffffffff8221997a at zio_dva_free+0x1a >#9 0xffffffff822166dc at zio_execute+0xac >#10 0xffffffff80abe7e7 at taskqueue_run_locked+0x127 >#11 0xffffffff80abf988 at taskqueue_thread_loop+0xc8 >#12 0xffffffff80a2f795 at fork_exit+0x85 >#13 0xffffffff80ec323e at fork_trampoline+0xe >Uptime: 14h2m18s > >Fatal trap 12: page fault while in kernel mode >cpuid = 29; apic id = 1d >fault virtual address = 0x20 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff8218f993 >stack pointer = 0x28:0xfffffe1045be48c0 >frame pointer = 0x28:0xfffffe1045be48f0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 9 (arc_reclaim_thread) >trap number = 12 >panic: page fault >cpuid = 29 >KDB: stack backtrace: >#0 0xffffffff80aada97 at kdb_backtrace+0x67 >#1 0xffffffff80a6bb76 at vpanic+0x186 >#2 0xffffffff80a6b9e3 at panic+0x43 >#3 0xffffffff80edf832 at trap_fatal+0x322 >#4 0xffffffff80edf889 at trap_pfault+0x49 >#5 0xffffffff80edf0c6 at trap+0x286 >#6 0xffffffff80ec3641 at calltrap+0x8 >#7 0xffffffff8219473e at arc_evict_state+0x1be >#8 0xffffffff8218d77b at arc_adjust+0x31b >#9 0xffffffff82191dbb at arc_reclaim_thread+0x18b >#10 0xffffffff80a2f815 at fork_exit+0x85 >#11 0xffffffff80ec3b7e at fork_trampoline+0xe >Uptime: 9h56m56s
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 219760
:
183182
| 185276