Opened 17 months ago

Last modified 16 months ago

#13927 new bug

gpgme KDL's when test are enabled

Reported by: Begasus Owned by: axeld
Priority: normal Milestone: Unscheduled
Component: Network & Internet/TCP Version: R1/Development
Keywords: Cc:
Blocked By: Blocking:
Has a Patch: no Platform: All

Description

When trying to update to the latest version for gpgme I ran into KDL's (reproducible), I initially filed an issue it on haikuports and it seems legit at that time, updating the system with full-sync removed the KDL from the build, but then the problem was still there when after the build the filesystem couldn't be unmounted, I could kill the instance with PC and the got back out of the unmounting problem. After that I try'd to build with the option "--disable-gpg-test" and then the build was ok, but I couldn't run the test with "hp --test *" Then I retry'd the build with the test enabled, knowing the problem with unmount. But when trying to run the test again inside haikuporter it send me back into KDL, more info and links at: https://github.com/haikuports/haikuports/issues/2040

Attachments (1)

gpg_kdl.txt (149.8 KB) - added by Begasus 17 months ago.
serial output from VirtualBox on the last attempt …

Download all attachments as: .zip

Change History (8)

Changed 17 months ago by Begasus

Attachment: gpg_kdl.txt added

serial output from VirtualBox on the last attempt ...

comment:1 Changed 17 months ago by Begasus

Has a Patch: set

comment:2 Changed 17 months ago by diver

syslog doesn't seem to contain KDL output.

comment:3 Changed 17 months ago by pulkomandy

PANIC: vm_page_fault: unhandled page fault in kernel space at 0xdeadbefb, ip 0x81251e16
 
Welcome to Kernel Debugging Land...
Thread 249 "loop consumer" running on CPU 0
stack trace for thread 249 "loop consumer"
    kernel stack: 0x81174000 to 0x81178000
frame               caller     <image>:function + offset
 0 81177a34 (+  32) 8014f416   <kernel_x86> arch_debug_stack_trace + 0x12
 1 81177a54 (+  16) 800a9fbf   <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
 2 81177a64 (+  12) 801411ce   <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
 3 81177a70 (+  48) 800abae6   <kernel_x86> debug_call_with_fault_handler + 0x5a
 4 81177aa0 (+  64) 800aa1db   <kernel_x86> kernel_debugger_loop([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x217
 5 81177ae0 (+  48) 800aa557   <kernel_x86> kernel_debugger_internal([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x53
 6 81177b10 (+  48) 800abe72   <kernel_x86> panic + 0x3a
 7 81177b40 (+ 144) 80125c9d   <kernel_x86> vm_page_fault + 0x145
 8 81177bd0 (+  80) 80150c7f   <kernel_x86> x86_page_fault_exception + 0x17f
 9 81177c20 (+  12) 80143b8c   <kernel_x86> int_bottom + 0x3c
kernel iframe at 0x81177c2c (end = 0x81177c7c)
 eax 0xdeadbeef    ebx 0x81256178     ecx 0xdd458354  edx 0x4
 esi 0xdd471c60    edi 0xdd471c6c     ebp 0x81177cb4  esp 0x81177c60
 eip 0x81251e16 eflags 0x210286  
 vector: 0xe, error code: 0x0
10 81177c2c (+ 136) 81251e16   </boot/system/add-ons/kernel/network/protocols/tcp> ConnectionHashDefinition<[32m0xd259674c[0m>::Compare(ConnectionHashDefinition: [34m0x81177cec[0m) + 0x22
11 81177cb4 (+  64) 812522da   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::_LookupConnection(sockaddr*: [34m0xdd458354[0m) + 0x66
12 81177cf4 (+ 336) 81252d23   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::FindConnection(sockaddr*: [34m0xdd458354[0m) + 0xc7
13 81177e44 (+ 160) 8124c9e7   </boot/system/add-ons/kernel/network/protocols/tcp> tcp_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x31b
14 81177ee4 (+ 128) 8115b66a   </boot/system/add-ons/kernel/network/protocols/ipv4> ipv4_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x36a
15 81177f64 (+  80) 8113c9ce   </boot/system/add-ons/kernel/network/stack> device_consumer_thread([34m0xd203d000[0m) + 0x6e
16 81177fb4 (+  48) 80089207   <kernel_x86> common_thread_entry([34m0x81177ff0[0m) + 0x3b
kdebug> co
read access attempted on read-protected area 0x57 at 0xdeadb000
vm_page_fault: vm_soft_fault returned error 'Permission denied' on fault at 0xdeadbefb, ip 0x81251e16, write 0, user 0, thread 0xf9
PANIC: vm_page_fault: unhandled page fault in kernel space at 0xdeadbefb, ip 0x81251e16
 
Welcome to Kernel Debugging Land...
Thread 249 "loop consumer" running on CPU 0
stack trace for thread 249 "loop consumer"
    kernel stack: 0x81174000 to 0x81178000
frame               caller     <image>:function + offset
 0 81177a34 (+  32) 8014f416   <kernel_x86> arch_debug_stack_trace + 0x12
 1 81177a54 (+  16) 800a9fbf   <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
 2 81177a64 (+  12) 801411ce   <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
 3 81177a70 (+  48) 800abae6   <kernel_x86> debug_call_with_fault_handler + 0x5a
 4 81177aa0 (+  64) 800aa1db   <kernel_x86> kernel_debugger_loop([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x217
 5 81177ae0 (+  48) 800aa557   <kernel_x86> kernel_debugger_internal([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x53
 6 81177b10 (+  48) 800abe72   <kernel_x86> panic + 0x3a
 7 81177b40 (+ 144) 80125c9d   <kernel_x86> vm_page_fault + 0x145
 8 81177bd0 (+  80) 80150c7f   <kernel_x86> x86_page_fault_exception + 0x17f
 9 81177c20 (+  12) 80143b8c   <kernel_x86> int_bottom + 0x3c
kernel iframe at 0x81177c2c (end = 0x81177c7c)
 eax 0xdeadbeef    ebx 0x81256178     ecx 0xdd458354  edx 0x4
 esi 0xdd471c60    edi 0xdd471c6c     ebp 0x81177cb4  esp 0x81177c60
 eip 0x81251e16 eflags 0x210286  
 vector: 0xe, error code: 0x0
10 81177c2c (+ 136) 81251e16   </boot/system/add-ons/kernel/network/protocols/tcp> ConnectionHashDefinition<[32m0xd259674c[0m>::Compare(ConnectionHashDefinition: [34m0x81177cec[0m) + 0x22
11 81177cb4 (+  64) 812522da   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::_LookupConnection(sockaddr*: [34m0xdd458354[0m) + 0x66
12 81177cf4 (+ 336) 81252d23   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::FindConnection(sockaddr*: [34m0xdd458354[0m) + 0xc7
13 81177e44 (+ 160) 8124c9e7   </boot/system/add-ons/kernel/network/protocols/tcp> tcp_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x31b
14 81177ee4 (+ 128) 8115b66a   </boot/system/add-ons/kernel/network/protocols/ipv4> ipv4_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x36a
15 81177f64 (+  80) 8113c9ce   </boot/system/add-ons/kernel/network/stack> device_consumer_thread([34m0xd203d000[0m) + 0x6e
16 81177fb4 (+  48) 80089207   <kernel_x86> common_thread_entry([34m0x81177ff0[0m) + 0x3b
kdebug> sc
stack trace for thread 249 "loop consumer"
    kernel stack: 0x81174000 to 0x81178000
frame               caller     <image>:function + offset
 0 81177824 (+  48) 800acc30   <kernel_x86> invoke_command_trampoline([34m0x811778bc[0m) + 0x1c
 1 81177854 (+  12) 801411ce   <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
 2 81177860 (+  48) 800abae6   <kernel_x86> debug_call_with_fault_handler + 0x5a
 3 81177890 (+  64) 800ace89   <kernel_x86> invoke_debugger_command + 0xb9
 4 811778d0 (+  64) 800accb5   <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: [34m0xcce38030[0m, int32: [34m0[0m, [34m0x0[0m [31m"<NULL>"[0m) + 0x79
 5 81177910 (+  64) 800acff4   <kernel_x86> invoke_debugger_command_pipe + 0x9c
 6 81177950 (+  48) 800aef34   <kernel_x86> ExpressionParser<[32m0x81177a00[0m>::_ParseCommandPipe([34m0x811779fc[0m) + 0x234
 7 81177980 (+  64) 800ae154   <kernel_x86> ExpressionParser<[32m0x81177a00[0m>::EvaluateCommand([34m0x801c52c0[0m [36m"sc"[0m, [34m0x811779fc[0m) + 0x2d0
 8 811779c0 (+ 224) 800b0580   <kernel_x86> evaluate_debug_command + 0x80
 9 81177aa0 (+  64) 800aa2ea   <kernel_x86> kernel_debugger_loop([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x326
10 81177ae0 (+  48) 800aa557   <kernel_x86> kernel_debugger_internal([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m0[0m) + 0x53
11 81177b10 (+  48) 800abe72   <kernel_x86> panic + 0x3a
12 81177b40 (+ 144) 80125c9d   <kernel_x86> vm_page_fault + 0x145
13 81177bd0 (+  80) 80150c7f   <kernel_x86> x86_page_fault_exception + 0x17f
14 81177c20 (+  12) 80143b8c   <kernel_x86> int_bottom + 0x3c
kernel iframe at 0x81177c2c (end = 0x81177c7c)
 eax 0xdeadbeef    ebx 0x81256178     ecx 0xdd458354  edx 0x4
 esi 0xdd471c60    edi 0xdd471c6c     ebp 0x81177cb4  esp 0x81177c60
 eip 0x81251e16 eflags 0x210286  
 vector: 0xe, error code: 0x0
15 81177c2c (+ 136) 81251e16   </boot/system/add-ons/kernel/network/protocols/tcp> ConnectionHashDefinition<[32m0xd259674c[0m>::Compare(ConnectionHashDefinition: [34m0x81177cec[0m) + 0x22
16 81177cb4 (+  64) 812522da   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::_LookupConnection(sockaddr*: [34m0xdd458354[0m) + 0x66
17 81177cf4 (+ 336) 81252d23   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::FindConnection(sockaddr*: [34m0xdd458354[0m) + 0xc7
18 81177e44 (+ 160) 8124c9e7   </boot/system/add-ons/kernel/network/protocols/tcp> tcp_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x31b
19 81177ee4 (+ 128) 8115b66a   </boot/system/add-ons/kernel/network/protocols/ipv4> ipv4_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x36a
20 81177f64 (+  80) 8113c9ce   </boot/system/add-ons/kernel/network/stack> device_consumer_thread([34m0xd203d000[0m) + 0x6e
21 81177fb4 (+  48) 80089207   <kernel_x86> common_thread_entry([34m0x81177ff0[0m) + 0x3b
kdebug> co
read access attempted on read-protected area 0x57 at 0xdeadb000
vm_page_fault: vm_soft_fault returned error 'Permission denied' on fault at 0xdeadbefb, ip 0x81251e16, write 0, user 0, thread 0xf9
PANIC: vm_page_fault: unhandled page fault in kernel space at 0xdeadbefb, ip 0x81251e16
 
Welcome to Kernel Debugging Land...
Thread 249 "loop consumer" running on CPU 1
stack trace for thread 249 "loop consumer"
    kernel stack: 0x81174000 to 0x81178000
frame               caller     <image>:function + offset
 0 81177a34 (+  32) 8014f416   <kernel_x86> arch_debug_stack_trace + 0x12
 1 81177a54 (+  16) 800a9fbf   <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
 2 81177a64 (+  12) 801411ce   <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
 3 81177a70 (+  48) 800abae6   <kernel_x86> debug_call_with_fault_handler + 0x5a
 4 81177aa0 (+  64) 800aa1db   <kernel_x86> kernel_debugger_loop([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m1[0m) + 0x217
 5 81177ae0 (+  48) 800aa557   <kernel_x86> kernel_debugger_internal([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m1[0m) + 0x53
 6 81177b10 (+  48) 800abe72   <kernel_x86> panic + 0x3a
 7 81177b40 (+ 144) 80125c9d   <kernel_x86> vm_page_fault + 0x145
 8 81177bd0 (+  80) 80150c7f   <kernel_x86> x86_page_fault_exception + 0x17f
 9 81177c20 (+  12) 80143b8c   <kernel_x86> int_bottom + 0x3c
kernel iframe at 0x81177c2c (end = 0x81177c7c)
 eax 0xdeadbeef    ebx 0x81256178     ecx 0xdd458354  edx 0x4
 esi 0xdd471c60    edi 0xdd471c6c     ebp 0x81177cb4  esp 0x81177c60
 eip 0x81251e16 eflags 0x210286  
 vector: 0xe, error code: 0x0
10 81177c2c (+ 136) 81251e16   </boot/system/add-ons/kernel/network/protocols/tcp> ConnectionHashDefinition<[32m0xd259674c[0m>::Compare(ConnectionHashDefinition: [34m0x81177cec[0m) + 0x22
11 81177cb4 (+  64) 812522da   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::_LookupConnection(sockaddr*: [34m0xdd458354[0m) + 0x66
12 81177cf4 (+ 336) 81252d23   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::FindConnection(sockaddr*: [34m0xdd458354[0m) + 0xc7
13 81177e44 (+ 160) 8124c9e7   </boot/system/add-ons/kernel/network/protocols/tcp> tcp_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x31b
14 81177ee4 (+ 128) 8115b66a   </boot/system/add-ons/kernel/network/protocols/ipv4> ipv4_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x36a
15 81177f64 (+  80) 8113c9ce   </boot/system/add-ons/kernel/network/stack> device_consumer_thread([34m0xd203d000[0m) + 0x6e
16 81177fb4 (+  48) 80089207   <kernel_x86> common_thread_entry([34m0x81177ff0[0m) + 0x3b
kdebug> shutdown
kdebug> co
read access attempted on read-protected area 0x57 at 0xdeadb000
vm_page_fault: vm_soft_fault returned error 'Permission denied' on fault at 0xdeadbefb, ip 0x81251e16, write 0, user 0, thread 0xf9
PANIC: vm_page_fault: unhandled page fault in kernel space at 0xdeadbefb, ip 0x81251e16
 
Welcome to Kernel Debugging Land...
Thread 249 "loop consumer" running on CPU 1
stack trace for thread 249 "loop consumer"
    kernel stack: 0x81174000 to 0x81178000
frame               caller     <image>:function + offset
 0 81177a34 (+  32) 8014f416   <kernel_x86> arch_debug_stack_trace + 0x12
 1 81177a54 (+  16) 800a9fbf   <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
 2 81177a64 (+  12) 801411ce   <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
 3 81177a70 (+  48) 800abae6   <kernel_x86> debug_call_with_fault_handler + 0x5a
 4 81177aa0 (+  64) 800aa1db   <kernel_x86> kernel_debugger_loop([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m1[0m) + 0x217
 5 81177ae0 (+  48) 800aa557   <kernel_x86> kernel_debugger_internal([34m0x80193777[0m [36m"PANIC: "[0m, [34m0x801aa440[0m [36m"vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
"[0m, [34m0x81177b4c[0m [36m"\FB\BE\AD\DE
%\81\93[\80@V\9F\82`
G\DD,|\81D\AA\8D\82\B2\80D\AA\8D\82"[0m, int32: [34m1[0m) + 0x53
 6 81177b10 (+  48) 800abe72   <kernel_x86> panic + 0x3a
 7 81177b40 (+ 144) 80125c9d   <kernel_x86> vm_page_fault + 0x145
 8 81177bd0 (+  80) 80150c7f   <kernel_x86> x86_page_fault_exception + 0x17f
 9 81177c20 (+  12) 80143b8c   <kernel_x86> int_bottom + 0x3c
kernel iframe at 0x81177c2c (end = 0x81177c7c)
 eax 0xdeadbeef    ebx 0x81256178     ecx 0xdd458354  edx 0x4
 esi 0xdd471c60    edi 0xdd471c6c     ebp 0x81177cb4  esp 0x81177c60
 eip 0x81251e16 eflags 0x210286  
 vector: 0xe, error code: 0x0
10 81177c2c (+ 136) 81251e16   </boot/system/add-ons/kernel/network/protocols/tcp> ConnectionHashDefinition<[32m0xd259674c[0m>::Compare(ConnectionHashDefinition: [34m0x81177cec[0m) + 0x22
11 81177cb4 (+  64) 812522da   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::_LookupConnection(sockaddr*: [34m0xdd458354[0m) + 0x66
12 81177cf4 (+ 336) 81252d23   </boot/system/add-ons/kernel/network/protocols/tcp> EndpointManager<[32m0xd2596720[0m>::FindConnection(sockaddr*: [34m0xdd458354[0m) + 0xc7
13 81177e44 (+ 160) 8124c9e7   </boot/system/add-ons/kernel/network/protocols/tcp> tcp_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x31b
14 81177ee4 (+ 128) 8115b66a   </boot/system/add-ons/kernel/network/protocols/ipv4> ipv4_receive_data(net_buffer*: [34m0xdd458298[0m) + 0x36a
15 81177f64 (+  80) 8113c9ce   </boot/system/add-ons/kernel/network/stack> device_consumer_thread([34m0xd203d000[0m) + 0x6e
16 81177fb4 (+  48) 80089207   <kernel_x86> common_thread_entry([34m0x81177ff0[0m) + 0x3b
kdebug> shutdown =[1D [1D=n[1D [1D[1D [1D+[1D [1D/[1D [1D>[1D [1D.[1D [1D,<MN[1D [1D[1D [1D[1D [1D[1D [1D0-[1D [1D[1D [1D-n
kdebug>
Last edited 17 months ago by pulkomandy (previous) (diff)

comment:4 Changed 17 months ago by pulkomandy

Possibly similar to #12567 (which affected UDP) in TCP code.

comment:5 Changed 17 months ago by diver

Component: - GeneralNetwork & Internet/TCP
Owner: changed from nobody to axeld

comment:6 Changed 17 months ago by mmlr

FWIW I am unable to reproduce this. I also don't really see the link to #12567. From a quick glance at the change to resolve that one and the corresponding TCP code I don't really see how one would apply the logic there. I have not actually investigated it in depth though.

comment:7 Changed 16 months ago by pulkomandy

Has a Patch: unset
Note: See TracTickets for help on using tickets.