From owner-freebsd-bugs@freebsd.org Fri Mar 31 09:31:12 2017 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 732D0D265B2 for ; Fri, 31 Mar 2017 09:31:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 59D64258 for ; Fri, 31 Mar 2017 09:31:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v2V9VCna054211 for ; Fri, 31 Mar 2017 09:31:12 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 218252] VIMAGE + ppp over uplcom or vboxnet = panic Date: Fri, 31 Mar 2017 09:31:12 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: bsd@kobyla.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Mar 2017 09:31:12 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D218252 Bug ID: 218252 Summary: VIMAGE + ppp over uplcom or vboxnet =3D panic Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: bsd@kobyla.org Unread portion of the kernel message buffer: Kernel page fault with the following non-sleepable locks held: exclusive sleep mutex uplcom (uplcom) r =3D 0 (0xfffff8002a5504c0) loc= ked @ /usr/src/sys/dev/usb/usb_transfer.c:2264 stack backtrace: #0 0xffffffff80584590 at witness_debugger+0x70 #1 0xffffffff805858b7 at witness_warn+0x457 #2 0xffffffff8082b7e7 at trap_pfault+0x57 #3 0xffffffff8082b000 at trap+0x280 #4 0xffffffff80812ab1 at calltrap+0x8 #5 0xffffffff8243b630 at ng_iface_rcvdata+0x110 #6 0xffffffff8242a756 at ng_apply_item+0x146 #7 0xffffffff8242a3cf at ng_snd_item+0x37f #8 0xffffffff8244114d at ng_ppp_rcvdata+0x23d #9 0xffffffff8242a756 at ng_apply_item+0x146 #10 0xffffffff8242a3cf at ng_snd_item+0x37f #11 0xffffffff8242a756 at ng_apply_item+0x146 #12 0xffffffff8242a3cf at ng_snd_item+0x37f #13 0xffffffff8244d776 at nga_rcvdata+0x326 #14 0xffffffff8242a756 at ng_apply_item+0x146 #15 0xffffffff8242a3cf at ng_snd_item+0x37f #16 0xffffffff82448925 at ngt_rint_bypass+0x1a5 #17 0xffffffff8176a18d at ucom_put_data+0x11d Fatal trap 12: page fault while in kernel mode cpuid =3D 1; apic id =3D 02 fault virtual address =3D 0x28 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff8061f56c stack pointer =3D 0x28:0xfffffe02f7e77370 frame pointer =3D 0x28:0xfffffe02f7e773c0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 217 (usbus0) (kgdb) fr 14 #14 0xffffffff8061f56c in netisr_dispatch_src (proto=3D1, source=3D0, m=3D0xfffff8035e803800) at /usr/src/sys/net/netisr.c:1098 1098 if (V_netisr_enable[proto] =3D=3D 0) { Current language: auto; currently minimal (kgdb) list 1093 npp =3D &netisr_proto[proto]; 1094 KASSERT(npp->np_handler !=3D NULL, ("%s: invalid proto %u", __func__, 1095 proto)); 1096 1097 #ifdef VIMAGE 1098 if (V_netisr_enable[proto] =3D=3D 0) { 1099 m_freem(m); 1100 return (ENOPROTOOPT); 1101 } 1102 #endif (kgdb) #0 doadump (textdump=3D0) at pcpu.h:232 #1 0xffffffff8031e39c in db_fncall (dummy1=3D,=20 dummy2=3D, dummy3=3D,=20 dummy4=3D) at /usr/src/sys/ddb/db_command.c:5= 81 #2 0xffffffff8031df1f in db_command (cmd_table=3D) at /usr/src/sys/ddb/db_command.c:453 #3 0xffffffff80322858 in db_script_exec (scriptname=3D,=20 warnifnotfound=3D) at /usr/src/sys/ddb/db_script.c:302 #4 0xffffffff8031df1f in db_command (cmd_table=3D) at /usr/src/sys/ddb/db_command.c:453 #5 0xffffffff80322858 in db_script_exec (scriptname=3D,=20 warnifnotfound=3D) at /usr/src/sys/ddb/db_script.c:302 #6 0xffffffff8031df1f in db_command (cmd_table=3D) at /usr/src/sys/ddb/db_command.c:453 #7 0xffffffff8031dc94 in db_command_loop () at /usr/src/sys/ddb/db_command.c:506 #8 0xffffffff80320bbf in db_trap (type=3D,=20 code=3D) at /usr/src/sys/ddb/db_main.c:248 #9 0xffffffff8056b893 in kdb_trap (type=3D,=20 code=3D, tf=3D) at /usr/src/sys/kern/subr_kdb.c:654 #10 0xffffffff8082b742 in trap_fatal (frame=3D0xfffffe02f7e772b0, eva= =3D40) at /usr/src/sys/amd64/amd64/trap.c:796 #11 0xffffffff8082b968 in trap_pfault (frame=3D0xfffffe02f7e772b0, usermode=3D0) at /usr/src/sys/amd64/amd64/trap.c:658 #12 0xffffffff8082b000 in trap (frame=3D0xfffffe02f7e772b0) at /usr/src/sys/amd64/amd64/trap.c:421 #13 0xffffffff80812ab1 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:236 #14 0xffffffff8061f56c in netisr_dispatch_src (proto=3D1, source=3D0,= =20 m=3D0xfffff8035e803800) at /usr/src/sys/net/netisr.c:1098 #15 0xffffffff8243b630 in ng_iface_rcvdata (hook=3D,=20 item=3D) at /usr/src/sys/netgraph/ng_iface.c:= 710 #16 0xffffffff8242a756 in ng_apply_item (node=3D0xfffff8003175d400,=20 item=3D0xfffff8027bc42080, rw=3D0) at /usr/src/sys/netgraph/ng_bas= e.c:2403 #17 0xffffffff8242a3cf in ng_snd_item (item=3D,=20 flags=3D) at /usr/src/sys/netgraph/ng_base.c:= 2320 #18 0xffffffff8244114d in ng_ppp_rcvdata (hook=3D= ,=20 item=3D0xfffff8027bc42080) at /usr/src/sys/netgraph/ng_ppp.c:1536 #19 0xffffffff8242a756 in ng_apply_item (node=3D0xfffff802bb3fb600,=20 item=3D0xfffff8027bc42080, rw=3D0) at /usr/src/sys/netgraph/ng_bas= e.c:2403 #20 0xffffffff8242a3cf in ng_snd_item (item=3D,=20 flags=3D) at /usr/src/sys/netgraph/ng_base.c:= 2320 #21 0xffffffff8242a756 in ng_apply_item (node=3D0xfffff80315019900,=20 item=3D0xfffff8027bc42080, rw=3D0) at /usr/src/sys/netgraph/ng_bas= e.c:2403 #22 0xffffffff8242a3cf in ng_snd_item (item=3D,=20 flags=3D) at /usr/src/sys/netgraph/ng_base.c:= 2320 #23 0xffffffff8244d776 in nga_rcvdata (hook=3D,=20 item=3D) at /usr/src/sys/netgraph/ng_async.c:= 548 #24 0xffffffff8242a756 in ng_apply_item (node=3D0xfffff80191980b00,=20 item=3D0xfffff8027bc42080, rw=3D1) at /usr/src/sys/netgraph/ng_bas= e.c:2403 #25 0xffffffff8242a3cf in ng_snd_item (item=3D,=20 flags=3D) at /usr/src/sys/netgraph/ng_base.c:= 2320 #26 0xffffffff82448925 in ngt_rint_bypass (tp=3D,= =20 buf=3D0xfffff8002a024000, len=3D) at /usr/src/sys/netgraph/ng_tty.c:446 #27 0xffffffff8176a18d in ucom_put_data (sc=3D,=20 pc=3D, offset=3D0, len=3D) at /usr/src/sys/dev/usb/serial/usb_serial.c:1476 #28 0xffffffff8176595c in uplcom_read_callback (xfer=3D0xfffff8002a4ce= 278,=20 error=3DUSB_ERR_NORMAL_COMPLETION) at /usr/src/sys/dev/usb/serial/uplcom.c:911 #29 0xffffffff812fe67d in usbd_transfer_unsetup (pxfer=3D,=20 n_setup=3D) at /usr/src/sys/dev/usb/usb_transfer.c:1363 #30 0xffffffff812ff80d in usbd_transfer_stop (xfer=3D0xfffff8002a4ce06= 0) at /usr/src/sys/dev/usb/usb_transfer.c:1979 #31 0xffffffff812fe81e in usbd_transfer_drain (xfer=3D0xfffff8002a4ce0= 00) at /usr/src/sys/dev/usb/usb_transfer.c:2042 #32 0xffffffff812f98b5 in usb_proc_drain (up=3D0xfffff8002a4ce088) at /usr/src/sys/dev/usb/usb_process.c:443 #33 0xffffffff804f8d91 in fork_exit (callout=3D0xfffffe0007643520,=20 arg=3D0xfffffe0007643500, frame=3D0xffffffff812f97e0) at /usr/src/sys/kern/kern_fork.c:1038 #34 0xffffffff80812fee in fork_trampoline () at /usr/src/sys/amd64/amd64/exception.S:611 #35 0x0000000000000000 in ?? () Current language: auto; currently minimal (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=