On Sat, Nov 15, 2025 at 06:35:40PM +0100, Mark Kettenis wrote:
> > Date: Sat, 15 Nov 2025 18:16:04 +0100
> > From: Jeremie Courreges-Anglas <[email protected]>
> >
> > On Thu, Nov 13, 2025 at 12:18:29PM +0000, Martin Pieuchot wrote:
> > > On 05/11/25(Wed) 15:48, Dave Voutila wrote:
> > > > "Piotr K. Isajew" <[email protected]> writes:
> > > >
> > > > > I wanted to install local browser extension (Extensions -> Manage
> > > > > extensions), but the browser process crashed. So I relaunched the
> > > > > browser from terminal and when I choose that option from the
> > > > > menu, entire OS has crashed.
> > > > >
> > > > > Attaching dmesg and screenshot showing crash.
> > > >
> > > > My quick and dirty OCR via the magic of "AI":
> > > >
> > > > uvm_fault(0xfffffd814aa2ba38, 0x60, 0, 1) -> e
> > > > kernel: page fault trap, code=0
> > > > Stopped at bread+0x33: testq $0x180,0x60(%rax)
> > > > TID PID UID PRFLAGS PFLAGS CPU COMMAND
> > > > 158743 32412 35 0x12 0 0 Xorg
> > > > bread(0xfffffd8125e6e8,e0,4000,fff80003ed0a1a0) at bread+0x33
> > > > ffs_update(fffffd80668f4700,1) at ffs_update+0xff
> > > > ffs_truncate(fffffd80668f4700,0,0,ffffffffffffffff) at
> > > > ffs_truncate+0x615
> > > > ufs_inactive(fffffd8063eed1c8) at ufs_inactive+0xca
> > > > UOP_INACTIVE(fffffd8063eed1c8,ffff80003eb60fd8) at UOP_INACTIVE+0x4b
> > > > vput(fffffd8122232c0) at vput+0x60
> > > > vn_closefile(fffffd8125eb609,ffff80003eb60fd8) at vn_closefile+0xc3
> > > > fdrop(fffffd8125eb609,ffff80003eb60fd8) at fdropt+0xa1
> > > > closef(fffffd8125eb609,ffff80003eb60fd8) at closef+0xba
> > > > syscall() at syscall+0x5f9
> > > > syscall() at syscall+0x128
> > > > end trace frame: 0x7e81f564b4b, count: 4
> > > >
> > > > Looks like getblk() in vfs_bio returned NULL... corrupted filesystem
> > > > maybe?
> > >
> > > I don't think so. getblk(0, INFSLP) should never return NULL.
> >
> > It shouldn't indeed, but it does for me.
> >
> > > Piotr can you easily reproduce this bug?
> >
> > Since at least Aug 30 I'd get hangs when watching youtube videos in
> > firefox, with variable frequency and no visual feedback. I set up AMT
> > console redirection to debug that, with no result. On one occasion
> > without AMT I got to see a partial trace similar to the above but
> > missed the "kernel: page fault trap" part that doesn't end up in "show
> > panic".
> >
> > After Piotr's report I decided to test yt videos again with a -current
> > kernel, and very quickly the system hanged. After adding guards and a
> > printf in getblk() - see diff below - I could see that tsleep_nsec()
> > was actually returning -1 (ERESTART). Traces also show biowait()
> > surviving the same error. More instrumentation showed that P_SINTR
> > can be set at tsleep_nsec() *entry*, so even if sleep_setup() didn't
> > set the flag, sleep_finish() can pick it up and return ERESTART:
> >
> > tsleep_nsec: returning ERESTART without PCATCH (p_sintr 128)
> >
> > sleep_finish() always clears P_SINTR, so clearly that would point to a
> > sleep_setup(PCATCH) call with no corresponding sleep_finish(). All of
> > the call sites for these functions are tightly bound, except the ones
> > in dev/pci/drm. set_current_state() does use sleep_setup(), but
> > __set_current_state() partly unrolls sleep_finish() and doesn't clear
> > P_SINTR. I assume there were good reasons to unroll it.
> >
> > Clearing P_SINTR in __set_current_state() gives me no more traces
> > after a few hours of testing. Clearing P_SINTR at the start of
> > sleep_setup() looks like sweeping the problem under the rug. Maybe we
> > should warn if P_SINTR is set at the start of sleep_setup()?
> >
> > Here's a dump of the diag code and the tentative fix, drop the latter
> > if you want to get some traces.
> >
> > cc'ing the usual drm and sleep/signal suspects.
>
> Clearing P_SINTR in __set_current_state() may very well be the right
> solution. The Linux code that uses __set_current_state() already
> checks for pending signals so we don't need to do it again.
>
> Curious what claudio@ has to say...
I agree.
> > Index: dev/pci/drm/drm_linux.c
> > ===================================================================
> > RCS file: /cvs/src/sys/dev/pci/drm/drm_linux.c,v
> > diff -u -p -r1.126 drm_linux.c
> > --- dev/pci/drm/drm_linux.c 13 Jun 2025 07:01:37 -0000 1.126
> > +++ dev/pci/drm/drm_linux.c 15 Nov 2025 13:27:22 -0000
> > @@ -126,7 +126,7 @@ __set_current_state(int state)
> > SCHED_LOCK();
> > unsleep(p);
> > p->p_stat = SONPROC;
> > - atomic_clearbits_int(&p->p_flag, P_INSCHED);
> > + atomic_clearbits_int(&p->p_flag, P_INSCHED|P_SINTR);
> > SCHED_UNLOCK();
> > }
> >
This bit is obviously right. This clears the sleep and needs to clear
P_SINTR as well. I once tried to use sleep_finish(INFSLP, 0); here instead
of hand rolling the same but it is not quite the same behaviour (since
__set_current_state code skips any signal checks).
For the debug diffs below I think it is better to instead just KASSERT at
the start of sleep_setup that P_SINTR is not set.
This would detect such errors but not point to where the error was
caused, but if hit adding a hint to find the culprit should be easy
doable.
> > Index: kern/kern_synch.c
> > ===================================================================
> > RCS file: /cvs/src/sys/kern/kern_synch.c,v
> > diff -u -p -r1.232 kern_synch.c
> > --- kern/kern_synch.c 18 Aug 2025 04:15:35 -0000 1.232
> > +++ kern/kern_synch.c 15 Nov 2025 12:03:40 -0000
> > @@ -114,6 +114,8 @@ int
> > tsleep_nsec(const volatile void *ident, int priority, const char *wmesg,
> > uint64_t nsecs)
> > {
> > + int error;
> > + int p_sintr = atomic_load_int(&curproc->p_flag) & P_SINTR;
> > #ifdef MULTIPROCESSOR
> > int hold_count;
> > #endif
> > @@ -150,7 +152,15 @@ tsleep_nsec(const volatile void *ident,
> > }
> >
> > sleep_setup(ident, priority, wmesg);
> > - return sleep_finish(nsecs, 1);
> > + error = sleep_finish(nsecs, 1);
> > +
> > + if (error == ERESTART && !ISSET(priority, PCATCH)) {
> > + printf("%s: returning ERESTART without PCATCH (p_sintr %d)\n",
> > + __func__, p_sintr);
> > + db_stack_dump();
> > + }
> > +
> > + return error;
> > }
> >
> > int
> > @@ -176,6 +186,7 @@ msleep_nsec(const volatile void *ident,
> > const char *wmesg, uint64_t nsecs)
> > {
> > int error, spl;
> > + int p_sintr = atomic_load_int(&curproc->p_flag) & P_SINTR;
> > #ifdef MULTIPROCESSOR
> > int hold_count;
> > #endif
> > @@ -221,6 +232,12 @@ msleep_nsec(const volatile void *ident,
> > if ((priority & PNORELOCK) == 0)
> > mtx_enter(mtx);
> >
> > + if (error == ERESTART && !ISSET(priority, PCATCH)) {
> > + printf("%s: returning ERESTART without PCATCH (p_sintr %d)\n",
> > + __func__, p_sintr);
> > + db_stack_dump();
> > + }
> > +
> > return error;
> > }
> >
> > @@ -247,6 +264,7 @@ rwsleep_nsec(const volatile void *ident,
> > const char *wmesg, uint64_t nsecs)
> > {
> > int error, status;
> > + int p_sintr = atomic_load_int(&curproc->p_flag) & P_SINTR;
> >
> > KASSERT((priority & ~(PRIMASK | PCATCH | PNORELOCK)) == 0);
> > KASSERT(ident != &nowake || ISSET(priority, PCATCH) || nsecs != INFSLP);
> > @@ -262,6 +280,12 @@ rwsleep_nsec(const volatile void *ident,
> >
> > if ((priority & PNORELOCK) == 0)
> > rw_enter(rwl, status);
> > +
> > + if (error == ERESTART && !ISSET(priority, PCATCH)) {
> > + printf("%s: returning ERESTART without PCATCH (p_sintr %d)\n",
> > + __func__, p_sintr);
> > + db_stack_dump();
> > + }
> >
> > return error;
> > }
> > Index: kern/vfs_bio.c
> > ===================================================================
> > RCS file: /cvs/src/sys/kern/vfs_bio.c,v
> > diff -u -p -r1.216 vfs_bio.c
> > --- kern/vfs_bio.c 8 Jun 2025 06:23:43 -0000 1.216
> > +++ kern/vfs_bio.c 14 Nov 2025 13:11:02 -0000
> > @@ -1013,8 +1013,14 @@ start:
> > error = tsleep_nsec(bp, slpflag | (PRIBIO + 1),
> > "getblk", slptimeo);
> > splx(s);
> > - if (error)
> > + if (error) {
> > + if (slpflag == 0 && slptimeo == INFSLP) {
> > + printf("%s: tsleep error %d\n",
> > + __func__, error);
> > + goto start;
> > + }
> > return (NULL);
> > + }
> > goto start;
> > }
> >
> >
> >
> > --
> > jca
> >
--
:wq Claudio