From owner-freebsd-net@freebsd.org Wed Nov 7 18:02:59 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 532F8112B801 for ; Wed, 7 Nov 2018 18:02:59 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id C3F3D72BE4 for ; Wed, 7 Nov 2018 18:02:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 88436112B800; Wed, 7 Nov 2018 18:02:58 +0000 (UTC) Delivered-To: net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6657C112B7FF for ; Wed, 7 Nov 2018 18:02:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E20E372BE2 for ; Wed, 7 Nov 2018 18:02:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 0B5FA1AECF for ; Wed, 7 Nov 2018 18:02:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wA7I2u78093622 for ; Wed, 7 Nov 2018 18:02:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wA7I2usJ093614 for net@FreeBSD.org; Wed, 7 Nov 2018 18:02:56 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 227720] Kernel panic in ppp server Date: Wed, 07 Nov 2018 18:02:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-RELEASE X-Bugzilla-Keywords: crash, needs-qa X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: Franck.Rousseau@imag.fr X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: mfc-stable11? X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: C3F3D72BE4 X-Spamd-Result: default: False [-105.74 / 200.00]; FORGED_RECIPIENTS_FORWARDING(0.00)[]; ALLOW_DOMAIN_WHITELIST(-100.00)[freebsd.org]; FORWARDED(0.00)[net@mailman.ysv.freebsd.org]; SPF_FAIL_FORWARDING(0.00)[]; TO_DN_NONE(0.00)[]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; XAW_SERVICE_ACCT(1.00)[]; RCVD_IN_DNSWL_MED(-0.20)[5.0.0.0.0.5.0.0.0.0.0.0.0.0.0.0.a.6.0.2.4.5.2.2.0.0.9.1.1.0.0.2.list.dnswl.org : 127.0.9.2]; MX_GOOD(-0.01)[cached: mx66.freebsd.org]; NEURAL_HAM_SHORT(-1.00)[-0.999,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; IP_SCORE(-3.53)[ip: (-9.69), ipnet: 2001:1900:2254::/48(-4.48), asn: 10310(-3.39), country: US(-0.09)]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]; FORGED_RECIPIENTS(0.00)[net@FreeBSD.org,freebsd-net@freebsd.org]; TO_DOM_EQ_FROM_DOM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; FROM_NO_DN(0.00)[]; RCVD_COUNT_SEVEN(0.00)[7] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Nov 2018 18:02:59 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D227720 Franck Rousseau changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |Franck.Rousseau@imag.fr --- Comment #35 from Franck Rousseau --- Hi everyone, same kind of crash here on a 11.2-RELEASE-p4, it also crashes = on 11.2-RELEASE, but it seems to be a long standing bug, we had similar issues= on previous versions. I only have the crash logs for this latest release. # uname -a FreeBSD testpc 11.2-RELEASE-p4 FreeBSD 11.2-RELEASE-p4 #0: Thu Sep 27 08:16= :24 UTC 2018 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERI= C=20 amd64 # dmidecode -s system-product-name OptiPlex 7010 # sysctl hw.model hw.model: Intel(R) Core(TM) i5-3570 CPU @ 3.40GHz The crash occurs when we play with forwarding, a PPP server and ARP proxy, = but unfortunately we do not have a very precise procedure to reproduce it, also= it crashes very consistently. We use FreeBSD for educational purposes, doing practical work in computer networking. This is a simple setup where we use 3 computers, configure PC1 as a PPP client, that connects to PC2 that is a PPP server and ARP proxy for PC1, and we finally check the IP connectivity from= PC3 that is on the same Ethernet LAN as PC2 and observe ARP activity.=20 If we activate forwarding, start the PPP server, connect the client, add an= ARP published entry, it works ok as long as there is no mistake done (although I cannot guarantee that it would run for hours). But when students make sever= al wrong tries, stop ppp, play with arp, restart ppp, at some point it crashes= (we had dozens of crashes). It is rather easy to provoke this crash as I did to= get the crash log, although there are various symptoms: ppp server not accepting connections anymore unless we reboot, arp failing with socket memory error, etc. until it crashes at some point. Quite hard to track this one down... This bug seems to be somewhat similar to bug #230498 with the same location= and cause. The ppp client and server configs are trivial, over a serial line, plus pro= xy arp (arp -s 192.168.0.1 pub) default: set log Phase Chat LCP IPCP CCP tun command set device /dev/cuau0 set speed 9600 set accmap 000a0000 set ctsrts off set cd off set timeout 0 server: set ifaddr 192.168.0.2 192.168.0.1 255.255.255.255 Here is the backtrace, I can provide the crash image and kernel.debug if needed. (kgdb) bt #0 doadump (textdump=3D) at pcpu.h:229 #1 0xffffffff80af673b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:383 #2 0xffffffff80af6b61 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:776 #3 0xffffffff80af69a3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:707 #4 0xffffffff80f77fdf in trap_fatal (frame=3D0xfffffe04688ae320, eva=3D0) = at /usr/src/sys/amd64/amd64/trap.c:875 #5 0xffffffff80f78039 in trap_pfault (frame=3D0xfffffe04688ae320, usermode= =3D0) at pcpu.h:229 #6 0xffffffff80f77807 in trap (frame=3D0xfffffe04688ae320) at /usr/src/sys/amd64/amd64/trap.c:415 #7 0xffffffff80f57fbc in calltrap () at /usr/src/sys/amd64/amd64/exception.S:231 #8 0xffffffff80c0ce96 in sysctl_dumpentry (rn=3D0xfffff8000bc48410, vw=3D0xfffffe04688ae690) at /usr/src/sys/net/rtsock.c:1559 #9 0xffffffff80c07aa0 in rn_walktree (h=3D, f=3D, w=3D) at /usr/src/sys/net/radix.c:1094 #10 0xffffffff80c0c7ff in sysctl_rtsock (oidp=3D, arg1=3D, arg2=3D,=20 req=3D) at /usr/src/sys/net/rtsock.c:1916 #11 0xffffffff80b03ccb in sysctl_root_handler_locked (oid=3D0xffffffff81a33= f38, arg1=3D0xfffffe04688ae908, arg2=3D4, req=3D0xfffffe04688ae840,=20 tracker=3D0xfffffe04688ae7b8) at /usr/src/sys/kern/kern_sysctl.c:165 #12 0xffffffff80b03521 in sysctl_root (arg1=3D0xfffffe04688ae908, arg2=3D4)= at /usr/src/sys/kern/kern_sysctl.c:1915 #13 0xffffffff80b03a46 in userland_sysctl (td=3D, name=3D0xfffffe04688ae900, namelen=3D6, old=3D0x0,=20 oldlenp=3D, inkernel=3D, new= =3D0x0, newlen=3D0, retval=3D0xfffffe04688ae968, flags=3D0) at /usr/src/sys/kern/kern_sysctl.c:2011 #14 0xffffffff80b038cf in sys___sysctl (td=3D0xfffff80098410000, uap=3D0xfffff80098410538) at /usr/src/sys/kern/kern_sysctl.c:1945 #15 0xffffffff80f79068 in amd64_syscall (td=3D0xfffff80098410000, traced=3D= 0) at subr_syscall.c:132 #16 0xffffffff80f5880d in fast_syscall_common () at /usr/src/sys/amd64/amd64/exception.S:479 #17 0x0000000801de047a in ?? () (kgdb) f 8=20=20=20 #8 0xffffffff80c0ce96 in sysctl_dumpentry (rn=3D0xfffff8000bc48410, vw=3D0xfffffe04688ae690) at /usr/src/sys/net/rtsock.c:1559 1559 info.rti_info[RTAX_IFP] =3D rt->rt_ifp->if_addr->ifa_addr; (kgdb) p rt->rt_ifp->if_addr $1 =3D (struct ifaddr *) 0x0 --=20 You are receiving this mail because: You are the assignee for the bug.=