From owner-freebsd-bugs@freebsd.org Fri Aug 24 05:43:09 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5DC9110802A6 for ; Fri, 24 Aug 2018 05:43:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id E5E697802A for ; Fri, 24 Aug 2018 05:43:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id AB05410802A3; Fri, 24 Aug 2018 05:43:08 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 70FD210802A2 for ; Fri, 24 Aug 2018 05:43:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F00FE78029 for ; Fri, 24 Aug 2018 05:43:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 2E28DAC5B for ; Fri, 24 Aug 2018 05:43:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w7O5h704028637 for ; Fri, 24 Aug 2018 05:43:07 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w7O5h7TT028636 for bugs@FreeBSD.org; Fri, 24 Aug 2018 05:43:07 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 230857] loading carp module panic i386 kernel (VIMAGE related) Date: Fri, 24 Aug 2018 05:43:07 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: olivier@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Aug 2018 05:43:09 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230857 Bug ID: 230857 Summary: loading carp module panic i386 kernel (VIMAGE related) Product: Base System Version: CURRENT Hardware: i386 OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: olivier@freebsd.org It's very easy to panic an i386=C2=A0current by just loading carp module. I believe there are still lot's of i386 setups (network appliance like Soek= ris or VMs) that will be impacted if this bug is still present when 12.0 will be released. Set to reproduce is very easy: 1. Download 12-ALPHA2 i386 image and start it 2. Login as root 3. Enter 'kldldoad carp' and system will panic Thread on the mailing list: https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070780.html Panic message: root@freebsd:~ # kldload carp Fatal trap 12: page fault while in kernel mode cpuid =3D 0; apic id =3D 00 fault virtual address =3D 0x24ef548c fault code =3D supervisor write, page not present instruction pointer =3D 0x20:0x1541635c stack pointer =3D 0x28:0x14de57f4 frame pointer =3D 0x28:0x14de57fc code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, def32 1, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 703 (kldload) [ thread pid 703 tid 100073 ] Stopped at vnet_carpstats_init+0x2c: movl=20=20=20 %eax,__stop_set_vnet(%ecx,%esi,1) db> bt Tracing pid 703 tid 100073 td 0x15152700 vnet_carpstats_init(0,0,1820be1,1e2,17c0321,...) at vnet_carpstats_init+0x2c/frame 0x14de57fc vnet_register_sysinit(154182cc,0,1732cd3,e6,0,...) at vnet_register_sysinit+0xf6/frame 0x14de5828 linker_load_module(0,0,14de5a6c,42e,115a201,...) at linker_load_module+0xc64/frame 0x14de5a4c kern_kldload(15152700,11a0b800,14de5a98,0,0,...) at kern_kldload+0xf5/frame 0x14de5a80 sys_kldload(15152700,15152984,180ca39,4,14de5ad4,...) at sys_kldload+0x6e/f= rame 0x14de5aa8 syscall(14de5ba8,3b,3b,3b,ffbfee90,...) at syscall+0x33f/frame 0x14de5b9c Xint0x80_syscall() at PTDpde+0x43af/frame 0x14de5b9c --- syscall (304, FreeBSD ELF32, sys_kldload), eip =3D 0x200a076f, esp =3D 0xffbfe7c4, ebp =3D 0xffbfed18 --- carp_list() at 0x200a076f --=20 You are receiving this mail because: You are the assignee for the bug.=