From owner-freebsd-bugs@freebsd.org Thu Mar 7 10:10:21 2019 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A53C7152863F for ; Thu, 7 Mar 2019 10:10:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3D8A874D9A for ; Thu, 7 Mar 2019 10:10:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id EDA1E152863D; Thu, 7 Mar 2019 10:10:20 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C8DBE152863C for ; Thu, 7 Mar 2019 10:10:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 61B6D74D95 for ; Thu, 7 Mar 2019 10:10:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id A114012FC8 for ; Thu, 7 Mar 2019 10:10:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x27AAJFY046615 for ; Thu, 7 Mar 2019 10:10:19 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x27AAJlM046614 for bugs@FreeBSD.org; Thu, 7 Mar 2019 10:10:19 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 236356] Kernel panic after disconnect pptp client... Date: Thu, 07 Mar 2019 10:10:19 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: admin@5034.ru X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 Mar 2019 10:10:21 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236356 Bug ID: 236356 Summary: Kernel panic after disconnect pptp client... Product: Base System Version: 12.0-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: admin@5034.ru Hi All, FreeBSD version: FreeBSD server.5034.ru 12.0-STABLE FreeBSD 12.0-STABLE #2 r343904M: Kernel panic after disconnect pptp client (client was connected via mpd5): # kgdb /boot/kernel/kernel /var/crash/vmcore.last GNU gdb (GDB) 8.2.1 [GDB v8.2.1 for FreeBSD] Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.0". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /boot/kernel/kernel...Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug...done. done. Unread portion of the kernel message buffer: frame pointer =3D 0x28:0xfffffe0050180600 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 985 (mpd5) trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1551948804 KDB: stack backtrace: #0 0xffffffff80c531c7 at kdb_backtrace+0x67 #1 0xffffffff80c07143 at vpanic+0x1a3 #2 0xffffffff80c06f93 at panic+0x43 #3 0xffffffff8118d9ff at trap_fatal+0x35f #4 0xffffffff8118da59 at trap_pfault+0x49 #5 0xffffffff8118d07e at trap+0x29e #6 0xffffffff81168af5 at calltrap+0x8 #7 0xffffffff80dafecf at in_ifdetach+0x6f #8 0xffffffff80d0af5d at if_detach_internal+0x8ed #9 0xffffffff80d0a65e at if_detach+0x2e #10 0xffffffff80d8e1f3 at ng_iface_shutdown+0x43 #11 0xffffffff80d87255 at ng_rmnode+0x1e5 #12 0xffffffff80d89581 at ng_apply_item+0x421 #13 0xffffffff80d88f10 at ng_snd_item+0x130 #14 0xffffffff80da248c at ngc_send+0x19c #15 0xffffffff80c9de16 at sosend_generic+0x586 #16 0xffffffff80c9e120 at sosend+0x50 #17 0xffffffff80ca4f17 at kern_sendit+0x237 Uptime: 1d14h48m43s Dumping 1005 out of 8077 MB:..2%..12%..21%..31%..42%..51%..61%..71%..82%..9= 1% __curthread () at ./machine/pcpu.h:230 230 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (OFFSETOF_CURTHREAD)); (kgdb) bt #0 __curthread () at ./machine/pcpu.h:230 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80c06d2b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80c071a3 in vpanic (fmt=3D, ap=3D0xfffffe00501= 80310) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80c06f93 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff8118d9ff in trap_fatal (frame=3D0xfffffe0050180500, eva=3D24)= at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff8118da59 in trap_pfault (frame=3D0xfffffe0050180500, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:765 #7 0xffffffff8118d07e in trap (frame=3D0xfffffe0050180500) at /usr/src/sys/amd64/amd64/trap.c:441 #8 #9 0xffffffff80dbb7c8 in in_pcbpurgeif0 (pcbinfo=3D, ifp=3D0xfffff80165986800) at /usr/src/sys/netinet/in_pcb.c:1804 #10 0xffffffff80dafecf in in_ifdetach (ifp=3D0xfffff80165986800) at /usr/src/sys/netinet/in.c:1002 #11 0xffffffff80d0af5d in if_detach_internal (ifp=3D, vmove= =3D0, ifcp=3D0x0) at /usr/src/sys/net/if.c:1160 #12 0xffffffff80d0a65e in if_detach (ifp=3D0x0) at /usr/src/sys/net/if.c:10= 39 #13 0xffffffff80d8e1f3 in ng_iface_shutdown (node=3D0xfffff80124360d00) at /usr/src/sys/netgraph/ng_iface.c:743 #14 0xffffffff80d87255 in ng_rmnode (node=3D0xfffff80124360d00, dummy1=3D, dummy2=3D, dummy3=3D) at /usr/src/sys/netgraph/ng_base.c:757 #15 0xffffffff80d89581 in ng_generic_msg (here=3D0xfffff80124360d00, item=3D, lasthook=3D) at /usr/src/sys/netgraph/ng_base.c:2523 #16 ng_apply_item (node=3D0xfffff80124360d00, item=3D0xfffff80228799c80, rw= =3D1) at /usr/src/sys/netgraph/ng_base.c:2437 #17 0xffffffff80d88f10 in ng_snd_item (item=3D0xfffff80228799c80, flags=3D0= ) at /usr/src/sys/netgraph/ng_base.c:2320 #18 0xffffffff80da248c in ngc_send (so=3D, flags=3D, m=3D0xfffff801cac0f000, addr=3D, control=3D, td=3D) at /usr/src/sys/netgraph/ng_socket.c:338 #19 0xffffffff80c9de16 in sosend_generic (so=3D0xfffff8002b8bf6d0, addr=3D0xfffff8017d9d5f70, uio=3D0xfffffe0050180988, top=3D0xfffff801cac0f0= 00, control=3D0x2363, flags=3D0, td=3D0xfffff8002bc14580) at /usr/src/sys/kern/uipc_socket.c:1582 #20 0xffffffff80c9e120 in sosend (so=3D0x0, addr=3D0xfffff80165986800, uio=3D0xfffff8002bc14580, top=3D0x1, control=3D0x0, flags=3D-2008371993, td=3D0xfffff8002bc14580) at /usr/src/sys/kern/uipc_socket.c:1628 #21 0xffffffff80ca4f17 in kern_sendit (td=3D0xfffff8002bc14580, s=3D5, mp=3D, flags=3D0, control=3D0x0, segflg=3DUIO_USERSPACE) at /usr/src/sys/kern/uipc_syscalls.c:796 #22 0xffffffff80ca528e in sendit (td=3D0xfffff8002bc14580, s=3D5, mp=3D0xfffffe0050180a70, flags=3D0) at /usr/src/sys/kern/uipc_syscalls.c:721 #23 0xffffffff80ca50dd in sys_sendto (td=3D0x0, uap=3D) at /usr/src/sys/kern/uipc_syscalls.c:838 #24 0xffffffff8118e592 in syscallenter (td=3D) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:135 #25 amd64_syscall (td=3D0xfffff8002bc14580, traced=3D0) at /usr/src/sys/amd64/amd64/trap.c:1154 #26 #27 0x000000080091a64a in ?? () Backtrace stopped: Cannot access memory at address 0x7fffdfffd6f8 (kgdb) frame 8 #8 (kgdb) frame 9 #9 0xffffffff80dbb7c8 in in_pcbpurgeif0 (pcbinfo=3D, ifp=3D0xfffff80165986800) at /usr/src/sys/netinet/in_pcb.c:1804 1804 if (imo->imo_membership[i]->inm_ifp= =3D=3D ifp) { (kgdb) frame 10 #10 0xffffffff80dafecf in in_ifdetach (ifp=3D0xfffff80165986800) at /usr/src/sys/netinet/in.c:1002 1002 in_pcbpurgeif0(&V_udbinfo, ifp); (kgdb) frame 11 #11 0xffffffff80d0af5d in if_detach_internal (ifp=3D, vmove= =3D0, ifcp=3D0x0) at /usr/src/sys/net/if.c:1160 1160 in_ifdetach(ifp); (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=