Date: Thu, 29 Nov 2018 08:19:29 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 233622] panic: page not present fault when stopping VIMAGE jail on 12.0-RC2, netgraph Message-ID: <bug-233622-227@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233622 Bug ID: 233622 Summary: panic: page not present fault when stopping VIMAGE jail on 12.0-RC2, netgraph Product: Base System Version: 12.0-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: jordantboland@live.com This is reproducible for me - any time I stop this jail the system panics. = I appreciate your patience as I am new to kernel debugging, so if I have omit= ted necessary information it is out of ignorance and not malice. :-) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Unread portion of the kernel message buffer: <6>in6_purgeaddr: err=3D65, destination address delete failed ng node ng0_unifi_1 needs NGF_REALLY_DIE Fatal trap 12: page fault while in kernel mode cpuid =3D 0; apic id =3D 00 fault virtual address =3D 0x0 fault code =3D supervisor write data, page not present instruction pointer =3D 0x20:0xffffffff8263dba6 stack pointer =3D 0x28:0xfffffe008caeb6c0 frame pointer =3D 0x28:0xfffffe008caeb6e0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 60579 (jail) trap number =3D 12 panic: page fault cpuid =3D 0 time =3D 1543479102 KDB: stack backtrace: #0 0xffffffff80be74a7 at kdb_backtrace+0x67 #1 0xffffffff80b9b093 at vpanic+0x1a3 #2 0xffffffff80b9aee3 at panic+0x43 #3 0xffffffff8107394f at trap_fatal+0x35f #4 0xffffffff810739a9 at trap_pfault+0x49 #5 0xffffffff81072fce at trap+0x29e #6 0xffffffff8104e865 at calltrap+0x8 #7 0xffffffff80ca0dd5 at ether_ifdetach+0x35 #8 0xffffffff80caab14 at vlan_clone_destroy+0x24 #9 0xffffffff80c9ea26 at if_clone_destroyif+0x116 #10 0xffffffff80c9f338 at if_clone_detach+0xc8 #11 0xffffffff80cc7b3c at vnet_destroy+0x13c #12 0xffffffff80b63480 at prison_deref+0x2b0 #13 0xffffffff80b64d04 at sys_jail_remove+0x364 #14 0xffffffff81074429 at amd64_syscall+0x369 #15 0xffffffff8104f14d at fast_syscall_common+0x101 Uptime: 1m36s Dumping 768 out of 16178 MB:..3%..11%..21%..32%..42%..53%..61%..71%..82%..9= 2% __curthread () at ./machine/pcpu.h:230 230 ./machine/pcpu.h: No such file or directory. (kgdb) list *0xffffffff8263dba6 0xffffffff8263dba6 is in ng_ether_detach (/usr/src/sys/netgraph/ng_ether.c:367). 362 /usr/src/sys/netgraph/ng_ether.c: No such file or directory. (kgdb) backtrace #0 __curthread () at ./machine/pcpu.h:230 #1 doadump (textdump=3D<optimized out>) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80b9ac7b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80b9b0f3 in vpanic (fmt=3D<optimized out>, ap=3D0xfffffe008bc= f2410) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80b9aee3 in panic (fmt=3D<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff8107394f in trap_fatal (frame=3D0xfffffe008bcf2600, eva=3D0) = at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff810739a9 in trap_pfault (frame=3D0xfffffe008bcf2600, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:765 #7 0xffffffff81072fce in trap (frame=3D0xfffffe008bcf2600) at /usr/src/sys/amd64/amd64/trap.c:441 #8 <signal handler called> #9 ng_ether_detach (ifp=3D0xfffff800038a6800) at /usr/src/sys/netgraph/ng_ether.c:367 #10 0xffffffff80ca0dd5 in ether_ifdetach (ifp=3D0xfffff800038a6800) at /usr/src/sys/net/if_ethersubr.c:981 #11 0xffffffff80caab14 in vlan_clone_destroy (ifc=3D0xfffff80013c55600, ifp=3D0xfffff800038a6800) at /usr/src/sys/net/if_vlan.c:1106 #12 0xffffffff80c9ea26 in if_clone_destroyif (ifc=3D0xfffff80013c55600, ifp=3D0xfffff800038a6800) at /usr/src/sys/net/if_clone.c:330 #13 0xffffffff80c9f338 in if_clone_detach (ifc=3D0xfffff80013c55600) at /usr/src/sys/net/if_clone.c:451 #14 0xffffffff80cc7b3c in vnet_sysuninit () at /usr/src/sys/net/vnet.c:597 #15 vnet_destroy (vnet=3D0xfffff80013c7dd00) at /usr/src/sys/net/vnet.c:284 #16 0xffffffff80b63480 in prison_deref (pr=3D0xffffffff81b0b3c0 <prison0>, flags=3D19) at /usr/src/sys/kern/kern_jail.c:2634 #17 0xffffffff80b64d04 in sys_jail_remove (td=3D<optimized out>, uap=3D<opt= imized out>) at /usr/src/sys/kern/kern_jail.c:2257 #18 0xffffffff81074429 in syscallenter (td=3D<optimized out>) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:135 #19 amd64_syscall (td=3D0xfffff80117757000, traced=3D0) at /usr/src/sys/amd64/amd64/trap.c:1076 #20 <signal handler called> #21 0x000000080030f0aa in ?? () Backtrace stopped: Cannot access memory at address 0x7fffffffea28 --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-233622-227>