From nobody Sat Jul 1 17:21:11 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Qtf9M70hGz4l8Y0 for ; Sat, 1 Jul 2023 17:21:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Qtf9M4pgFz3qsr for ; Sat, 1 Jul 2023 17:21:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1688232071; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=GOFOqYho/CQfa3LYpiLkVZ5yWT19T2WCS1Nr3+B2D9k=; b=Jvq5SabrNB5PaGDQQlVraCAk+VDGAxJOJ9mskAOdWqfAZcs/fTYL88DN3e62+r5Vy8NJAT yxqZTl7eAKfEmDwfR9Z6ivhfCHrhO6EfYaZSn3IlIgwu4baKaMrbN2qLUDeAYmeuwRQ4Sp 51bd3syzM+WxU7l+6liAvVNOjvMfIhAn/Ak9EoOhYaq5CCmqIdCETAMKGiPoqMhf3hvioK ghn9GY/rhRrEhA83wd8JGyH3nXjhn/nAom+zXjToEsz9SIjNHIXuMGRYSfz5fjZQf54p3V 0tkdPsLhxYp0bEIe6RhsCMF2N4SR6+QiyBcErxuKkP0yOFjiLFCdVWFgVIgsXg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1688232071; a=rsa-sha256; cv=none; b=PBKQ2JYtrT3dEJoqXpOmyZWJNSWrpsxrDe4GqD+uOGgeO1JM0rU9e7s7Hisop6zbgoz5hF 8z5UlYJChWKan+zfz1BJdCy5YMHFHQQSag1Kgt1rUOqS4ap/uuUnIrMu3y5OqqIrpbDlKw He1o9AdobAoVGTaMoikfdDrc61lfuSxRoh2S2pJKZdMpnKgGYPOJmAVNpBQvv+yt4FC9ZQ D73heD8W1CljZsmQNugz44TlX9ne5G6KJRMDMgMqo7X6+LPcU0lfOQz1BoxMd4yaWNEG/2 zvMgcS2ELrpPeBW+u9q1iUHrhwKs2ttLDPl5MDD0zg5t07MgYfmB0ynMA+m9nw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Qtf9M3w6nzYwk for ; Sat, 1 Jul 2023 17:21:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 361HLBvo070285 for ; Sat, 1 Jul 2023 17:21:11 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 361HLBcF070284 for bugs@FreeBSD.org; Sat, 1 Jul 2023 17:21:11 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 272319] FreeBSD kernel crash on MPD5 restart with PPP configuration. Date: Sat, 01 Jul 2023 17:21:11 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: ny2007ltd@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272319 Bug ID: 272319 Summary: FreeBSD kernel crash on MPD5 restart with PPP configuration. Product: Base System Version: 13.2-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ny2007ltd@gmail.com FreeBSD 12.0-13.2 (both amd64 and i386) have kernel crash on MPD5 daemon restart or OS reboot with PPP configuration. How to reproduce:. 1. Install FreeBSD 13.2 (sample amd64) with default kernel 2. install mpd5 from ports 3. configure mpd5 with PPP over TCP/IP. 4. start MPD5 daemon 5. restart MPD5 or reboot OS 6. kernel crashed. Sample of mpd5 configuration (/usr/local/etc/mpd5/mpd.conf): =3D=3D=3D=3D=3D=3D=3D=3D startup: # set log +all default: load ppp_server ppp_server: set ippool add pool2 10.0.0.0 10.0.255.255 create bundle template B2 set ipcp ranges 10.0.1.1/16 ippool pool2 set iface enable proxy-arp set iface enable tcpmssfix set iface idle 0 create link template L2 tcp set link enable multilink set link enable shortseq set link yes acfcomp protocomp set link action bundle B2 set link disable chap pap eap set link enable chap chap-msv1 chap-msv2 chap-md5 set tcp self 127.0.0.1 57 set link enable incoming =3D=3D=3D=3D=3D=3D Trace: Fatal trap 12: page fault while in kernel mode cpuid =3D 0; apic id =3D 00 fault virtual address =3D 0x18 fault code =3D supervisor write data, page not present instruction pointer =3D 0x20:0xffffffff80be3cc2 stack pointer =3D 0x28:0xfffffe00939e6c70 frame pointer =3D 0x28:0xfffffe00939e6c80 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D resume, IOPL =3D 0 current process =3D 475 (ng_queue0) trap number =3D 12 panic: page fault cpuid =3D 0 time =3D 1688225854 KDB: stack backtrace: #0 0xffffffff80c53dc5 at kdb_backtrace+0x65 #1 0xffffffff80c06741 at vpanic+0x151 #2 0xffffffff80c065e3 at panic+0x43 #3 0xffffffff810b1fa7 at trap_fatal+0x387 #4 0xffffffff810b1fff at trap_pfault+0x4f #5 0xffffffff81088e78 at calltrap+0x8 #6 0xffffffff80c6bef8 at propagate_priority+0x58 #7 0xffffffff80c6cce3 at turnstile_wait+0x323 #8 0xffffffff80be33a0 at __mtx_lock_sleep+0x180 #9 0xffffffff82b366fb at ng_ksocket_shutdown+0x1ab #10 0xffffffff82b23923 at ng_rmnode+0x1c3 #11 0xffffffff82b258b5 at ng_apply_item+0x85 #12 0xffffffff82b287b8 at ngthread+0x1e8 #13 0xffffffff80bc2fce at fork_exit+0x7e #14 0xffffffff81089eee at fork_trampoline+0xe Uptime: 1m52s Dumping 161 out of 2006 MB:..10%..20%..30%..40%..50%..60%..70%..80%..90%..1= 00% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (offsetof(stru= ct pcpu, (kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown.c:396 #2 0xffffffff80c0630a in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:484 #3 0xffffffff80c067ae in vpanic (fmt=3D,=20 ap=3Dap@entry=3D0xfffffe00939e6ac0) at /usr/src/sys/kern/kern_shutdown.= c:923 #4 0xffffffff80c065e3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:847 #5 0xffffffff810b1fa7 in trap_fatal (frame=3D0xfffffe00939e6bb0, eva=3D24) at /usr/src/sys/amd64/amd64/trap.c:942 #6 0xffffffff810b1fff in trap_pfault (frame=3D0xfffffe00939e6bb0,=20 usermode=3Dfalse, signo=3D, ucode=3D) at /usr/src/sys/amd64/amd64/trap.c:761 #7 #8 0xffffffff80be3cc2 in atomic_cmpset_long (expect=3D0,=20 src=3D18446741876100055968, dst=3D) at /usr/src/sys/amd64/include/atomic.h:217 #9 _thread_lock (td=3D0xfffff800210a4158) at /usr/src/sys/kern/kern_mutex.= c:845 #10 0xffffffff80c6bef8 in propagate_priority (td=3D0xfffff800210a4158,=20 td@entry=3D0xfffffe00544443a0) at /usr/src/sys/kern/subr_turnstile.c:234 #11 0xffffffff80c6cce3 in turnstile_wait (ts=3Dts@entry=3D0xfffff800104ff24= 0,=20 owner=3Downer@entry=3D0xfffff800210a4158, queue=3Dqueue@entry=3D0) at /usr/src/sys/kern/subr_turnstile.c:808 #12 0xffffffff80be33a0 in __mtx_lock_sleep (c=3D0xfffff800210a4160,=20 v=3D) at /usr/src/sys/kern/kern_mutex.c:668 #13 0xffffffff82b366fb in ng_ksocket_shutdown (node=3D0xfffff80021ae7800) at /usr/src/sys/netgraph/ng_ksocket.c:939 #14 0xffffffff82b23923 in ng_rmnode (node=3D0xfffff80021ae7800,=20 dummy1=3D, dummy2=3D, dummy3=3D) at /usr/src/sys/netgraph/ng_base.c:758 #15 0xffffffff82b258b5 in ng_apply_item (node=3Dnode@entry=3D0xfffff80021ae= 7800,=20 item=3Ditem@entry=3D0xfffff80021659d80, rw=3Drw@entry=3D1) at /usr/src/sys/netgraph/ng_base.c:2477 #16 0xffffffff82b287b8 in ngthread (arg=3Darg@entry=3D0x0) at /usr/src/sys/netgraph/ng_base.c:3444 #17 0xffffffff80bc2fce in fork_exit (callout=3D0xffffffff82b285d0 ,=20 arg=3D0x0, frame=3D0xfffffe00939e6f40) at /usr/src/sys/kern/kern_fork.c= :1093 #18 #19 0x000004c708f40bfa in ?? () Backtrace stopped: Cannot access memory at address 0x4c700446b68 (kgdb)=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D Reproduced in stable way. Visibility only with PPP over TCP/IP,=20 PPTP or L2TP not have such question. FreeBSD 11 kernel work good=20 and not have such problem. --=20 You are receiving this mail because: You are the assignee for the bug.=