From owner-freebsd-bugs@FreeBSD.ORG Wed Aug 6 10:22:09 2014 Return-Path: Delivered-To: freebsd-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4E667C48 for ; Wed, 6 Aug 2014 10:22:09 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 36BFB2262 for ; Wed, 6 Aug 2014 10:22:09 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.8/8.14.8) with ESMTP id s76AM9KG020407 for ; Wed, 6 Aug 2014 10:22:09 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 192426] [panic]: Kernel panic when using BPF Date: Wed, 06 Aug 2014 10:22:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: robert@octarineparrot.com X-Bugzilla-Status: Needs Triage X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Aug 2014 10:22:09 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192426 --- Comment #3 from Robert Clipsham --- Running this binary is what reproduces the panic for me. Usage as follows: ---- $ sudo chmod g+rw /dev/bpf $ RUST_TEST_TASKS=1 ./pnet ---- Within seconds, the kernel will panic. All networking should be done on the loopback interface, but just in case it might be best to run this offline. Obviously it will panic the machine too. Binary can be found here (4.5meg, too large to upload as an attachment): http://octarineparrot.com/assets/pnet -- You are receiving this mail because: You are the assignee for the bug.