Date: Sat, 15 Aug 2015 19:12:50 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 202351] [ip6] [panic] Kernel panic in ip6_forward (different from 128247, 131038) Message-ID: <bug-202351-8@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202351 Bug ID: 202351 Summary: [ip6] [panic] Kernel panic in ip6_forward (different from 128247, 131038) Product: Base System Version: 10.2-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: dennis.noordsij@helsinki.fi Since upgrading to 10.2-RELEASE I am experiencing regular (every few hours) kernel panics. >From reading bug reports 128246 and 131038 I think it is not the same bug, especially since those 2 should have been patched already. Please let me know which information, if any, is needed from for example /var/crash/core.txt.0. This is not a mission critical system, so I am happy to try out patches or perform other tests. Some notes: - System is a Xeon E3-1220v3, Supermicro X10-something motherboard, 16GB ECC RAM. - I use a custom kernel with as only difference ROUTETABLES=6 - Main network interface is igb0 - bridge0 exists for tap0+igb0 for bhyve (using iohyve for setup) with a FreeBSD guest (which otherwise itself works fine). - I don't actually (explicitly) use ip6 for anything, nor have any specific ip6 rules in pf.conf Highlights: Fatal trap 12: page fault while in kernel mode cpuid = 3; apic id = 06 fault virtual address = 0x28 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff809ff8db stack pointer = 0x28:0xfffffe0000270f90 frame pointer = 0x28:0xfffffe0000270fa0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 12 (irq269: igb0:que 3) trap number = 12 panic: page fault cpuid = 3 KDB: stack backtrace: #0 0xffffffff80984e30 at kdb_backtrace+0x60 #1 0xffffffff809489e6 at vpanic+0x126 #2 0xffffffff809488b3 at panic+0x43 #3 0xffffffff80d4aadb at trap_fatal+0x36b #4 0xffffffff80d4addd at trap_pfault+0x2ed #5 0xffffffff80d4a47a at trap+0x47a #6 0xffffffff80d307f2 at calltrap+0x8 #7 0xffffffff80989cbc at kvprintf+0xf9c #8 0xffffffff8098a71d at _vprintf+0x8d #9 0xffffffff80988a1c at log+0x5c #10 0xffffffff80b15f97 at ip6_forward+0x107 #11 0xffffffff8203460e at pf_refragment6+0x16e #12 0xffffffff820263b4 at pf_test6+0x1044 #13 0xffffffff8202e2cd at pf_check6_out+0x4d #14 0xffffffff80a18634 at pfil_run_hooks+0x84 #15 0xffffffff81d2e798 at bridge_pfil+0x218 #16 0xffffffff81d2f5be at bridge_broadcast+0xde #17 0xffffffff81d2f3ef at bridge_forward+0x20f With line numbers: #12 0xffffffff80b15f97 in ip6_forward (m=0xfffff8000bff8c00, srcrt=<value optimized out>) at /usr/src/sys/netinet6/ip6_forward.c:142 #13 0xffffffff8203460e in pf_refragment6 (ifp=<value optimized out>, m0=<value optimized out>, mtag=<value optimized out>) at /usr/src/sys/modules/pf/../../netpfil/pf/pf_norm.c:1158 #14 0xffffffff820263b4 in pf_test6 (dir=<value optimized out>, ifp=0xfffff8000f299000, m0=0xfffffe0000271608, inp=<value optimized out>) at /usr/src/sys/modules/pf/../../netpfil/pf/pf.c:6453 #15 0xffffffff8202e2cd in pf_check6_out (arg=<value optimized out>, m=0xfffffe0000271608, ifp=0xfffff8000f299000, dir=<value optimized out>, inp=0x0) at /usr/src/sys/modules/pf/../../netpfil/pf/pf_ioctl.c:3616 #16 0xffffffff80a18634 in pfil_run_hooks (ph=0xffffffff8168e6d0, mp=0xfffffe0000271720, ifp=0xfffff8000f299000, dir=2, inp=0x0) at /usr/src/sys/net/pfil.c:82 #17 0xffffffff81d2e798 in bridge_pfil (mp=0xfffffe0000271720, bifp=0xfffff8000f299000, ifp=0x0, dir=2) at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:3210 #18 0xffffffff81d2f5be in bridge_broadcast (sc=0xfffff80011b58800, src_if=0xfffff80007656000, m=0xfffff80020c52300, runfilt=1) at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2456 #19 0xffffffff81d2f3ef in bridge_forward (sc=0xfffff80011b58800, sbif=<value optimized out>, m=0xfffff80020c52300) at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2178 #20 0xffffffff81d2d93c in bridge_input (ifp=<value optimized out>, m=0xfffff8004a00d100) at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2298 #21 0xffffffff80a0f77a in ether_nh_input (m=<value optimized out>) at /usr/src/sys/net/if_ethersubr.c:607 #22 0xffffffff80a177d2 in netisr_dispatch_src (proto=<value optimized out>, source=<value optimized out>, m=0x28) at /usr/src/sys/net/netisr.c:976 #23 0xffffffff804f715c in igb_rxeof (count=98) at /usr/src/sys/dev/e1000/if_igb.c:4808 #24 0xffffffff804f7801 in igb_msix_que (arg=0xfffff80007645b38) at /usr/src/sys/dev/e1000/if_igb.c:1621 #25 0xffffffff8091482b in intr_event_execute_handlers ( p=<value optimized out>, ie=0xfffff80007672400) at /usr/src/sys/kern/kern_intr.c:1264 #26 0xffffffff80914c76 in ithread_loop (arg=0xfffff8000767cac0) at /usr/src/sys/kern/kern_intr.c:1277 #27 0xffffffff8091244a in fork_exit ( callout=0xffffffff80914be0 <ithread_loop>, arg=0xfffff8000767cac0, frame=0xfffffe0000271ac0) at /usr/src/sys/kern/kern_fork.c:1018 #28 0xffffffff80d30d2e in fork_trampoline () at /usr/src/sys/amd64/amd64/exception.S:611 #29 0x0000000000000000 in ?? () -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-202351-8>