From nobody Sun Aug 6 07:42:50 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RJWdQ4F63z4pZWY for ; Sun, 6 Aug 2023 07:42:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RJWdQ2bYKz3LMk for ; Sun, 6 Aug 2023 07:42:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1691307770; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jx3vheLCn4plr9GK3jGpxsNT/W9XZ9I9l9m2MJOrx4k=; b=HeDNXaiDpIoL+d6L5VjLNdWpPWgjTDj2MUKmoQV851oTCVGlnqfm3422EOvGMzFI/IEHk+ ybYuwnxsgfqFnPZ1B+dgiJdKYcjRlxTwkD4z5z4hl/DNxyHQSnmkXZGxel8pWnmXkdldj3 fLSGSUursumbA2ut0UM8X0M3eeXC7YN/dAyo0y2NeKw+j1H9pudeADqTLTQVlB1j8yHbu4 cBmEfch/U8EBU5FBvn4IBFaajyZMG+v3TWyrUKR9wYDzVrQWSV6CCtl3/G0fYeAnC0U3Wj pGcmGxXXwqj+m9LIBL5pteqIOuUe60pqHUZg4XWORWao9jQNpsjD0RKiD7JerQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1691307770; a=rsa-sha256; cv=none; b=Qx56uLf2WpZPp7SuVraGaH7Opjzek1d90f/m/wHPTIBqcOMuam/Ep62JHjRrCT63sBFApq 0bO4MjtX6sH6fMKMgul0zSvUhnBSYh/70YFjgOYGqTqTbEMjwC87Ug5o31ppLH84yNK/bA wtWAjlvDUb2h+wd4PGmlEQenLfcBOJ9PoDJJIVSntdISbgDbxjgvFq9eiJA3AW/cK1113K gD5hCx906PgckUy+CXug/LJNM4vFbLnnXe/hH7GLT7DjC+nTkSk3sbNHUNu+gu6iNicsvg zvQGOEMtBgQrf62fDNO6O3+0+5mFTOvVITA4z/qJFnHVWm9Sf2y6lOGIagLFAw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RJWdQ1gQ7z12hN for ; Sun, 6 Aug 2023 07:42:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3767go2c031615 for ; Sun, 6 Aug 2023 07:42:50 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3767gocY031614 for bugs@FreeBSD.org; Sun, 6 Aug 2023 07:42:50 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 272965] armv7 'Alignment Fault' on read panic during udp_input for kyua's sys/netinet6/exthdr:exthdr ; other udp_input related panics Date: Sun, 06 Aug 2023 07:42:50 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272965 --- Comment #2 from Mark Millard --- (In reply to Mark Millard from comment #1) Other tests that got the same sort of failure backtrace include: # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_compat:overindex sys/netpfil/pf/fragmentation_compat:overindex -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_compat:overlimit sys/netpfil/pf/fragmentation_compat:overlimit -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_compat:overreplace sys/netpfil/pf/fragmentation_compat:overreplace -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_pass:overindex sys/netpfil/pf/fragmentation_pass:overindex -> Fatal kernel mode data abo= rt: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_pass:overlimit sys/netpfil/pf/fragmentation_pass:overlimit -> Fatal kernel mode data abo= rt: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/fragmentation_pass:overreplace sys/netpfil/pf/fragmentation_pass:overreplace -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/get_state:many sys/netpfil/pf/get_state:many -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/modulate:modulat= e_v4 sys/netpfil/pf/modulate:modulate_v4 -> lock order reversal: 1st 0xe1bca318 pf unlinked interfaces (pf unlinked interfaces, sleep mutex= ) @ /usr/src/sys/netpfil/pf/pf_if.c:413 2nd 0xd78405ec pf rulesets (pf rulesets, rm) @ /usr/src/sys/netpfil/pf/pf_if.c:282 lock order pf rulesets -> pf unlinked interfaces established at: #0 0xc035d360 at witness_checkorder+0x308 #1 0xc02c8bac at __mtx_lock_flags+0xb4 #2 0xe1b84ac0 at $a.36+0xc0 #3 0xe1b83ccc at $a.10+0xc8 #4 0xc040f0ec at if_detach_internal+0x338 lock order pf unlinked interfaces -> pf rulesets attempted at: #0 0xc035dbb4 at witness_checkorder+0xb5c #1 0xc02e13c8 at _rm_wlock_debug+0xa4 #2 0xe1b84388 at pf_kkif_free+0x54 #3 0xe1b84c7c at pfi_kkif_purge+0xd0 #4 0xe1b6b554 at pf_purge_thread+0xc28 #5 0xc02a384c at fork_exit+0xa0 #6 0xc05ef640 at swi_exit+0 Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/proxy:ftp sys/netpfil/pf/proxy:ftp -> Fatal kernel mode data abort: 'Alignment Faul= t' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/route_to:icmp_nat sys/netpfil/pf/route_to:icmp_nat -> lock order reversal: 1st 0xe1aca318 pf unlinked interfaces (pf unlinked interfaces, sleep mutex= ) @ /usr/src/sys/netpfil/pf/pf_if.c:413 2nd 0xd78405ec pf rulesets (pf rulesets, rm) @ /usr/src/sys/netpfil/pf/pf_if.c:282 lock order pf rulesets -> pf unlinked interfaces established at: #0 0xc035d360 at witness_checkorder+0x308 #1 0xc02c8bac at __mtx_lock_flags+0xb4 #2 0xe1a84ac0 at $a.36+0xc0 #3 0xe1a83ccc at $a.10+0xc8 #4 0xc040f0ec at if_detach_internal+0x338 #5 0xc0415efc at if_vmove+0x30 #6 0xc0412a00 at if_vmove_loan+0x234 #7 0xc0411828 at ifhwioctl+0x7c4 #8 0xc0413a9c at ifioctl+0x72c #9 0xc03638e4 at kern_ioctl+0x36c #10 0xc0363514 at sys_ioctl+0x114 #11 0xc0610464 at swi_handler+0x158 #12 0xc05ef640 at swi_exit+0 lock order pf unlinked interfaces -> pf rulesets attempted at: #0 0xc035dbb4 at witness_checkorder+0xb5c #1 0xc02e13c8 at _rm_wlock_debug+0xa4 #2 0xe1a84388 at pf_kkif_free+0x54 #3 0xe1a84c7c at pfi_kkif_purge+0xd0 #4 0xe1a6b554 at pf_purge_thread+0xc28 #5 0xc02a384c at fork_exit+0xa0 #6 0xc05ef640 at swi_exit+0 Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_compat:max_mss_v4 sys/netpfil/pf/scrub_compat:max_mss_v4 -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_compat:max_mss_v6 sys/netpfil/pf/scrub_compat:max_mss_v6 -> Aug 6 06:49:21 generic kernel: nd6_dad_timer: called with non-tentative address fe80:3::91:a4ff:fef4:460a(epair0a) Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_compat:min_ttl_v4 sys/netpfil/pf/scrub_compat:min_ttl_v4 -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_compat:no_scrub_v4 sys/netpfil/pf/scrub_compat:no_scrub_v4 -> lock order reversal: 1st 0xe19ca318 pf unlinked interfaces (pf unlinked interfaces, sleep mutex= ) @ /usr/src/sys/netpfil/pf/pf_if.c:413 2nd 0xd78405ec pf rulesets (pf rulesets, rm) @ /usr/src/sys/netpfil/pf/pf_if.c:282 lock order pf rulesets -> pf unlinked interfaces established at: #0 0xc035d360 at witness_checkorder+0x308 #1 0xc02c8bac at __mtx_lock_flags+0xb4 #2 0xe1984ac0 at $a.36+0xc0 #3 0xe1983ccc at $a.10+0xc8 #4 0xc040f0ec at if_detach_internal+0x338 #5 0xc0415efc at if_vmove+0x30 #6 0xc0412a00 at if_vmove_loan+0x234 #7 0xc0411828 at ifhwioctl+0x7c4 #8 0xc0413a9c at ifioctl+0x72c #9 0xc03638e4 at kern_ioctl+0x36c #10 0xc0363514 at sys_ioctl+0x114 #11 0xc0610464 at swi_handler+0x158 #12 0xc05ef640 at swi_exit+0 lock order pf unlinked interfaces -> pf rulesets attempted at: #0 0xc035dbb4 at witness_checkorder+0xb5c #1 0xc02e13c8 at _rm_wlock_debug+0xa4 #2 0xe1984388 at pf_kkif_free+0x54 #3 0xe1984c7c at pfi_kkif_purge+0xd0 #4 0xe196b554 at pf_purge_thread+0xc28 #5 0xc02a384c at fork_exit+0xa0 #6 0xc05ef640 at swi_exit+0 Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_compat:set_tos_v4 sys/netpfil/pf/scrub_compat:set_tos_v4 -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_pass:max_mss_v4 sys/netpfil/pf/scrub_pass:max_mss_v4 -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_pass:min_ttl_v4 sys/netpfil/pf/scrub_pass:min_ttl_v4 -> lock order reversal: 1st 0xe19ca318 pf unlinked interfaces (pf unlinked interfaces, sleep mutex= ) @ /usr/src/sys/netpfil/pf/pf_if.c:413 2nd 0xd78405ec pf rulesets (pf rulesets, rm) @ /usr/src/sys/netpfil/pf/pf_if.c:282 lock order pf rulesets -> pf unlinked interfaces established at: #0 0xc035d360 at witness_checkorder+0x308 #1 0xc02c8bac at __mtx_lock_flags+0xb4 #2 0xe1984ac0 at $a.36+0xc0 #3 0xe1983ccc at $a.10+0xc8 #4 0xc040f0ec at if_detach_internal+0x338 #5 0xc0415efc at if_vmove+0x30 #6 0xc0412a00 at if_vmove_loan+0x234 #7 0xc0411828 at ifhwioctl+0x7c4 #8 0xc0413a9c at ifioctl+0x72c #9 0xc03638e4 at kern_ioctl+0x36c #10 0xc0363514 at sys_ioctl+0x114 #11 0xc0610464 at swi_handler+0x158 #12 0xc05ef640 at swi_exit+0 lock order pf unlinked interfaces -> pf rulesets attempted at: #0 0xc035dbb4 at witness_checkorder+0xb5c #1 0xc02e13c8 at _rm_wlock_debug+0xa4 #2 0xe1984388 at pf_kkif_free+0x54 #3 0xe1984c7c at pfi_kkif_purge+0xd0 #4 0xe196b554 at pf_purge_thread+0xc28 #5 0xc02a384c at fork_exit+0xa0 #6 0xc05ef640 at swi_exit+0 Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_pass:set_tos_v4 sys/netpfil/pf/scrub_pass:set_tos_v4 -> Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/scrub_pass:set_tos_v6 sys/netpfil/pf/scrub_pass:set_tos_v6 -> lock order reversal: 1st 0xe1aca318 pf unlinked interfaces (pf unlinked interfaces, sleep mutex= ) @ /usr/src/sys/netpfil/pf/pf_if.c:413 2nd 0xd78405ec pf rulesets (pf rulesets, rm) @ /usr/src/sys/netpfil/pf/pf_if.c:282 lock order pf rulesets -> pf unlinked interfaces established at: #0 0xc035d360 at witness_checkorder+0x308 #1 0xc02c8bac at __mtx_lock_flags+0xb4 #2 0xe1a84ac0 at $a.36+0xc0 #3 0xe1a83ccc at $a.10+0xc8 #4 0xc040f0ec at if_detach_internal+0x338 #5 0xc0415efc at if_vmove+0x30 #6 0xc0412a00 at if_vmove_loan+0x234 #7 0xc0411828 at ifhwioctl+0x7c4 #8 0xc0413a9c at ifioctl+0x72c #9 0xc03638e4 at kern_ioctl+0x36c #10 0xc0363514 at sys_ioctl+0x114 #11 0xc0610464 at swi_handler+0x158 #12 0xc05ef640 at swi_exit+0 lock order pf unlinked interfaces -> pf rulesets attempted at: #0 0xc035dbb4 at witness_checkorder+0xb5c #1 0xc02e13c8 at _rm_wlock_debug+0xa4 #2 0xe1a84388 at pf_kkif_free+0x54 #3 0xe1a84c7c at pfi_kkif_purge+0xd0 #4 0xe1a6b554 at pf_purge_thread+0xc28 #5 0xc02a384c at fork_exit+0xa0 #6 0xc05ef640 at swi_exit+0 Fatal kernel mode data abort: 'Alignment Fault' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/set_tos:v4 sys/netpfil/pf/set_tos:v4 -> Fatal kernel mode data abort: 'Alignment Fau= lt' on read # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/set_tos:v6 sys/netpfil/pf/set_tos:v6 -> Fatal kernel mode data abort: 'Alignment Fau= lt' on read For reference: # grep kldload ~/prekyua-kldloads.sh kldload -v -n zfs.ko kldload -v -n cryptodev.ko kldload -v -n nullfs.ko kldload -v -n fdescfs.ko kldload -v -n filemon.ko kldload -v -n nfsd.ko kldload -v -n tarfs.ko kldload -v -n xz.ko kldload -v -n geom_concat.ko kldload -v -n geom_eli.ko kldload -v -n geom_nop.ko kldload -v -n geom_gate.ko kldload -v -n geom_mirror.ko kldload -v -n geom_multipath.ko kldload -v -n sdt.ko kldload -v -n dtrace.ko kldload -v -n opensolaris.ko kldload -v -n geom_raid3.ko kldload -v -n geom_shsec.ko kldload -v -n geom_stripe.ko kldload -v -n geom_uzip.ko kldload -v -n if_epair.ko kldload -v -n if_gif.ko kldload -v -n if_tuntap.ko kldload -v -n if_lagg.ko kldload -v -n if_infiniband.ko kldload -v -n if_wg.ko kldload -v -n ng_socket.ko kldload -v -n netgraph.ko kldload -v -n ng_hub.ko kldload -v -n ng_bridge.ko kldload -v -n ng_ether.ko kldload -v -n ng_vlan_rotate.ko kldload -v -n ipdivert.ko kldload -v -n pf.ko kldload -v -n if_bridge.ko kldload -v -n bridgestp.ko kldload -v -n mqueuefs.ko kldload -v -n tcpmd5.ko kldload -v -n carp.ko kldload -v -n sctp.ko kldload -v -n if_stf.ko kldload -v -n if_ovpn.ko kldload -v -n ipsec.ko #kldload -v -n ipfw.ko #kldload -v -n pflog.ko #kldload -v -n pfsync.ko kldload -v -n dummynet.ko #kldload -v -n mac_bsdextended.ko #kldload -v -n mac_ipacl.ko #kldload -v -n mac_portacl.ko --=20 You are receiving this mail because: You are the assignee for the bug.=