From owner-freebsd-amd64@freebsd.org Mon May 2 17:57:58 2016 Return-Path: Delivered-To: freebsd-amd64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D7D14B2AEFA for ; Mon, 2 May 2016 17:57:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BCA541DC9 for ; Mon, 2 May 2016 17:57:58 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u42Hvw3f037891 for ; Mon, 2 May 2016 17:57:58 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-amd64@FreeBSD.org Subject: [Bug 208140] panic: page fault in pf Date: Mon, 02 May 2016 17:57:58 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: rkondakov@ya.ru X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-pf@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Mailman-Approved-At: Mon, 02 May 2016 18:03:03 +0000 X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 May 2016 17:57:58 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208140 --- Comment #12 from Roman --- new crash: panic: page fault --- GNU gdb 6.1.1 [FreeBSD] Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain condition= s. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "amd64-marcel-freebsd"... Unread portion of the kernel message buffer: panic: page fault cpuid =3D 0 KDB: stack backtrace: #0 0xffffffff80444e10 at kdb_backtrace+0x60 #1 0xffffffff8040b306 at vpanic+0x126 #2 0xffffffff8040b1d3 at panic+0x43 #3 0xffffffff8066ddab at trap_fatal+0x36b #4 0xffffffff8066e0ad at trap_pfault+0x2ed #5 0xffffffff8066d72a at trap+0x47a #6 0xffffffff80653892 at calltrap+0x8 #7 0xffffffff805b5fc6 at pf_test+0xd66 #8 0xffffffff805c5ced at pf_check_in+0x1d #9 0xffffffff804d94d4 at pfil_run_hooks+0x84 #10 0xffffffff804f543d at ip_input+0x31d #11 0xffffffff804d8672 at netisr_dispatch_src+0x62 #12 0xffffffff804d13a6 at ether_demux+0x126 #13 0xffffffff804d204e at ether_nh_input+0x35e #14 0xffffffff804d8672 at netisr_dispatch_src+0x62 #15 0xffffffff804d1311 at ether_demux+0x91 #16 0xffffffff804d204e at ether_nh_input+0x35e #17 0xffffffff804d8672 at netisr_dispatch_src+0x62 --- bt: #0 doadump (textdump=3D) at pcpu.h:219 #1 0xffffffff8040af62 in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:486 #2 0xffffffff8040b345 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:889 #3 0xffffffff8040b1d3 in panic (fmt=3D0x0) at /usr/src/sys/kern/kern_shutdown.c:818 #4 0xffffffff8066ddab in trap_fatal (frame=3D, eva=3D) at /usr/src/sys/amd64/amd64/trap.c:858 #5 0xffffffff8066e0ad in trap_pfault (frame=3D0xfffffe00003cf480, usermode=3D) at /usr/src/sys/amd64/amd64/trap.c:681 #6 0xffffffff8066d72a in trap (frame=3D0xfffffe00003cf480) at /usr/src/sys/amd64/amd64/trap.c:447 #7 0xffffffff80653892 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:236 #8 0xffffffff805dbd06 in pfr_update_stats (kt=3D, a= =3D0x10, af=3D, len=3D74, dir_out=3D0, op_pass=3D1, notrule= =3D0) at /usr/src/sys/netpfil/pf/pf_table.c:1962 #9 0xffffffff805b5fc6 in pf_test (dir=3D1, ifp=3D, m0=3D0xfffffe00003cf798, inp=3D) at /usr/src/sys/netpfil/pf/pf.c:6105 #10 0xffffffff805c5ced in pf_check_in (arg=3D, m=3D0xfffffe00003cf798, ifp=3D0x10, dir=3D, inp=3D= 0x0) at /usr/src/sys/netpfil/pf/pf_ioctl.c:3551 #11 0xffffffff804d94d4 in pfil_run_hooks (ph=3D0xffffffff80b1e158, mp=3D0xfffffe00003cf820, ifp=3D0xfffff80006c16000, dir=3D1, inp=3D0x0) at /usr/src/sys/net/pfil.c:82 --- #8 0xffffffff805dbd06 in pfr_update_stats (kt=3D, a= =3D0x10, af=3D, len=3D74, dir_out=3D0, op_pass=3D1, notrule= =3D0) at /usr/src/sys/netpfil/pf/pf_table.c:1962 1962 sin.sin_family =3D AF_INET; (kgdb) p sin $1 =3D {sin_len =3D 16 '\020', sin_family =3D 2 '\002', sin_port =3D 0, sin= _addr =3D { s_addr =3D 0}, sin_zero =3D "\000\000\000\000\000\000\000"} #9 0xffffffff805b5fc6 in pf_test (dir=3D1, ifp=3D, m0=3D0xfffffe00003cf798, inp=3D) at /usr/src/sys/netpfil/pf/pf.c:6105 (kgdb) l 6100 &s->key[(s->direction =3D=3D PF_IN)]-> 6101 addr[(s->direction =3D=3D PF_OUT)], 6102 pd.af, pd.tot_len, dir =3D=3D PF_OUT, 6103 r->action =3D=3D PF_PASS, tr->src.neg); 6104 if (tr->dst.addr.type =3D=3D PF_ADDR_TABLE) 6105 pfr_update_stats(tr->dst.addr.p.tbl, 6106 (s =3D=3D NULL) ? pd.dst : 6107 &s->key[(s->direction =3D=3D PF_IN)]-> 6108 addr[(s->direction =3D=3D PF_IN)], 6109 pd.af, pd.tot_len, dir =3D=3D PF_OUT, p tr->dst.addr.p.tbl Cannot access memory at address 0x68 (kgdb) p tr $4 =3D (kgdb) p tr->dst Cannot access memory at address 0x39 (kgdb) p tr->dst.addr Cannot access memory at address 0x39 (kgdb) p tr->dst.addr.p Cannot access memory at address 0x59 (kgdb) p tr->dst.addr.p.tbl Cannot access memory at address 0x59 ...=20 p *tr - worked p tr->dst.addr.p.tbl - worked after p *tr --=20 You are receiving this mail because: You are on the CC list for the bug.=