NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
kern/59235: efi(8) panics
>Number: 59235
>Category: kern
>Synopsis: efi(8) panics
>Confidential: no
>Severity: serious
>Priority: low
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sun Mar 30 08:55:00 +0000 2025
>Originator: Michael van Elst
>Release: NetBSD 10.99.12
>Organization:
>Environment:
System: NetBSD tazz 10.99.12 NetBSD 10.99.12 (TAZZ) #7: Sat Mar 29 20:45:44 UTC 2025 mlelstv@slowpoke:/scratch2/obj.amd64/scratch/netbsd-current/src/sys/arch/amd64/compile/TAZZ amd64
Architecture: x86_64
Machine: amd64
>Description:
Running efi without arguments causes a kernel panic.
With a LOCKDEBUG kernel you get this:
[ 39236.0798177] Mutex error: rw_vector_enter,304: spin lock held
[ 39236.0798177] lock address : netbsd:efi_runtime_lock
[ 39236.0798177] type : spin
[ 39236.0798177] initialized : netbsd:efi_init+0x2e6
[ 39236.0798177] shared holds : 0 exclusive: 1
[ 39236.0798177] shares wanted: 0 exclusive: 0
[ 39236.0798177] relevant cpu : 0 last held: 0
[ 39236.0798177] relevant lwp : 0xffff8723827b9800 last held: 0xffff8723827b9800
[ 39236.0798177] last locked* : netbsd:efi_runtime_enter+0x22
[ 39236.0798177] unlocked : 0
[ 39236.0798177] owner field : 0x0000000000010600 wait/spin: 0/1
[ 39236.0820692] panic: LOCKDEBUG: Mutex error: rw_vector_enter,304: spin lock h
eld
[ 39236.0820692] cpu0: Begin traceback...
[ 39236.0820692] vpanic() at netbsd:vpanic+0x171
[ 39236.0820692] panic() at netbsd:panic+0x3c
[ 39236.0820692] lockdebug_abort1() at netbsd:lockdebug_abort1+0xe4
[ 39236.0820692] rw_enter() at netbsd:rw_enter+0x80
[ 39236.0820692] uvm_fault_internal() at netbsd:uvm_fault_internal+0x12b
[ 39236.0820692] trap() at netbsd:trap+0x3a7
[ 39236.0820692] --- trap (number 6) ---
[ 39236.0820692] ?() at dab1bd08
[ 39236.0820692] cpu0: End traceback...
[ 39236.0820692] fatal breakpoint trap in supervisor mode
[ 39236.0820692] trap type 1 code 0 rip 0xffffffff8023541d cs 0x8 rflags 0x202 c
r2 0xd6202288 ilevel 0x8 rsp 0xffff8f82b1f675e0
[ 39236.0820692] curlwp 0xffff8723827b9800 pid 5708.5708 lowest kstack 0xffff8f8
2b1f632c0
Stopped in pid 5708.5708 (efi) at netbsd:breakpoint+0x5: leave
db{0}>
However, this seems to be a consequence of generating a trap while holding
a spinlock.
gdb shows more stack frames:
...
#11 0xffffffff809c32b8 in panic (
fmt=fmt@entry=0xffffffff80eb3828 "LOCKDEBUG: %s error: %s,%zu: %s")
at /scratch/netbsd-current/src/sys/kern/subr_prf.c:209
#12 0xffffffff809b6c8b in lockdebug_abort1 (dopanic=true,
msg=0xffffffff80e2bee8 "spin lock held", s=6, ld=0xffff8f800fc07240,
line=304, func=0xffffffff80db9680 <__func__.6> "rw_vector_enter")
at /scratch/netbsd-current/src/sys/kern/subr_lockdebug.c:818
#13 lockdebug_abort1 (func=0xffffffff80db9680 <__func__.6> "rw_vector_enter",
line=304, ld=0xffff8f800fc07240, s=6,
msg=0xffffffff80e2bee8 "spin lock held", dopanic=<optimized out>)
at /scratch/netbsd-current/src/sys/kern/subr_lockdebug.c:796
#14 0xffffffff80980386 in rw_vector_enter (rw=0xffff872377e3a3c8, op=RW_READER)
at /scratch/netbsd-current/src/sys/kern/kern_rwlock.c:304
#15 0xffffffff8091708e in vm_map_lock_read (map=<optimized out>)
at /scratch/netbsd-current/src/sys/uvm/uvm_map.c:726
#16 0xffffffff8090f92b in uvmfault_lookup (write_lock=false,
ufi=0xffff8f82b1f67800)
at /scratch/netbsd-current/src/sys/uvm/uvm_fault_i.h:122
#17 uvm_fault_check (maxprot=false, ranons=<synthetic pointer>,
flt=0xffff8f82b1f67838, ufi=0xffff8f82b1f67800)
at /scratch/netbsd-current/src/sys/uvm/uvm_fault.c:992
#18 uvm_fault_internal (orig_map=orig_map@entry=0xffff872377e3a3c0,
vaddr=vaddr@entry=3592429568, access_type=access_type@entry=1,
fault_flag=fault_flag@entry=0)
at /scratch/netbsd-current/src/sys/uvm/uvm_fault.c:902
#19 0xffffffff8023c180 in trap (frame=0xffff8f82b1f67aa0)
at /scratch/netbsd-current/src/sys/arch/amd64/amd64/trap.c:519
#20 0xffffffff80234ad4 in alltraps ()
#21 0x00000000dab1bd08 in ?? ()
#22 0xffff8f82b1f67c08 in ?? ()
#23 0xffff8f82b1f67c50 in ?? ()
#24 0xffff87236d797000 in ?? ()
#25 0xffff8f82b1f67ef0 in ?? ()
#26 0x0000000000000100 in ?? ()
#27 0xffff8f82b1f67ef0 in ?? ()
#28 0xffff87236d797000 in ?? ()
#29 0xffff8f82b1f67c50 in ?? ()
#30 0xffff87247411c000 in ?? ()
#31 0xffffffff8058fb25 in efi_runtime_nextvar (namesize=0x0,
name=0xffff87236d797000, vendor=0xffff8f82b1f67ef0)
at /scratch/netbsd-current/src/sys/arch/x86/x86/efi_machdep.c:948
#32 0xffff87230d781080 in ?? ()
#33 0x0000000000000000 in ?? ()
Calling efi_runtime_nextvar with namesize==NULL might be reason. Also,
name points to just NUL-Bytes. But the arguments are questionable, there
is only one place where efi_nextvar() is called (in sys/dev/efi.c), and
the namesize argument is the pointer to a local variable &namesize that
cannot possibly be NULL.
>How-To-Repeat:
Run efi(8) without arguments as root or member of wheel.
>Fix:
>Unformatted:
Home |
Main Index |
Thread Index |
Old Index