From owner-freebsd-hackers@freebsd.org Mon Jul 2 14:08:20 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8D457102A6E4 for ; Mon, 2 Jul 2018 14:08:20 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3E39A8A3F0 for ; Mon, 2 Jul 2018 14:08:20 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 338BA21C51 for ; Mon, 2 Jul 2018 10:08:13 -0400 (EDT) Received: from web3 ([10.202.2.213]) by compute3.internal (MEProxy); Mon, 02 Jul 2018 10:08:13 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:message-id:mime-version:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=sMaEHSHbLqwBsAf1p1jUZBhsCjfug JOALo6jojEYPBE=; b=oJeI7UErB1oAnRPqA4WJ7gc0tK64WedEhzgBaNmAi7wLA Gxu/cChLL8ya3MIymLNxsovPIVkDEOs6Psm33IW57YuZVftvlmZIbXDEkGTZ8Z7C WOf46fptGGAxpmZ+DnHKoXzSh22SfHp0ZK55lHQWta1lD5i3wSj02RZNRYtocyvt QL5d1Spt6i+8YAc9xNevo3iZn+4bT7ykY9ihhUxwSifHeVeRFlICPVv+xVKrAiEW gtouugOdX57a4Ny4DsuhJjki8tyx6UXAYSWJtQNj6ufMsAYnsbsbg7TgkGLtqJwe ulTd5+xKKAxyw0tLHpxH9VmgY6qGJA7t5f7PZNluQ== X-ME-Proxy: X-ME-Sender: Received: by mailuser.nyi.internal (Postfix, from userid 99) id CC42B9E320; Mon, 2 Jul 2018 10:08:12 -0400 (EDT) Message-Id: <1530540492.517203.1427327440.52FB6E20@webmail.messagingengine.com> From: Mark Felder To: freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="utf-8" X-Mailer: MessagingEngine.com Webmail Interface - ajax-0d8ea36c Date: Mon, 02 Jul 2018 09:08:12 -0500 Subject: IPv6 UDP panic on CURRENT X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Jul 2018 14:08:20 -0000 I was having nightly crashes for a while but my watchdog was resetting the server. Finally disabled so I could see the screen. It was happening when my acme (Let's Encrypt) script was running to generate new certificates and uses DNS validation which hits a nameserver hosted on the same box and accessible over IPv6. Fatal trap 12: page fault while in kernel mode cpuid = 11; apic id = 14 fault virtual address = 0xcd fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80e1dc46 stack pointer = 0x28:0xfffffe00005ab760 frame pointer = 0x28:0xfffffe00005ab800 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 12 (swi1: netisr 0) [ thread pid 12 tid 100086 ] Stopped at ip6_savecontrol_v4+0x26: testb $0x4,ll+0xac(%rax) db> bt Tracing pid 12 tid 100086 td 0xfffff8000381c580 ip6_savecontrol_v4() at ip6_savecontrol_v4+0x26/frame 0xfffffe00005ab800 ip6_savecontrol() at ip6_savecontrol+0x2c/frame 0xfffffe00005ab850 udp6_append() at udp6_append+0xe7/frame 0xfffffe00005ab8a0 udp6_input() at udp6_input+0x4f8/frame 0xfffffe00005ab9c0 ip6_input() at ip6_input+0xdd8/frame 0xfffffe00005abab0 swi_net() at swi_net+0x17b/frame 0xfffffe00005abb20 intr_event_execute_handlers() at intr_event_execute_handlers+0xe9/frame 0xfffffe00005abb60 ithread_loop() at ithread_loop+0xe7/frame 0xfffffe00005abbb0 fork_exit() at fork_exit+0x83/frame 0xfffffe00005abbf0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00005abbf0 --- trap 0, rip = 0, rsp = 0, rbp = 0 --- FreeBSD colo.feld.me 12.0-CURRENT FreeBSD 12.0-CURRENT #3 r335699M: Wed Jun 27 09:09:28 UTC 2018 root@colo.feld.me:/usr/obj/usr/src/amd64.amd64/sys/GENERIC-MLX4 amd64 If there is more information I can collect next time please let me know. -- Mark Felder ports-secteam & portmgr member feld@FreeBSD.org