From owner-freebsd-bugs@freebsd.org Fri Aug 10 09:17:36 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A079310637DE for ; Fri, 10 Aug 2018 09:17:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 2B3DB812B4 for ; Fri, 10 Aug 2018 09:17:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id E422710637DD; Fri, 10 Aug 2018 09:17:35 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A9DFD10637DC for ; Fri, 10 Aug 2018 09:17:35 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3DC4C812B3 for ; Fri, 10 Aug 2018 09:17:35 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 72208234DB for ; Fri, 10 Aug 2018 09:17:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w7A9HYnU068662 for ; Fri, 10 Aug 2018 09:17:34 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w7A9HYDb068656 for bugs@FreeBSD.org; Fri, 10 Aug 2018 09:17:34 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 230498] Fatal trap 12: page fault while in kernel mode in sysctl_dumpentry from sysctl NET_RT_DUMP Date: Fri, 10 Aug 2018 09:17:34 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ian@niw.com.au X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Aug 2018 09:17:36 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230498 Bug ID: 230498 Summary: Fatal trap 12: page fault while in kernel mode in sysctl_dumpentry from sysctl NET_RT_DUMP Product: Base System Version: 11.2-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ian@niw.com.au We have seen a repeatable kernel panic that seems to originate from a sysctl route table dump (as used in netstat -r) This is occuring daily since upgrade from 10.3 to 11.2 stable. There is an unstabl link causing a reasonable number of routing table updates. Backtrace shows Fatal trap 12: page fault while in kernel mode cpuid =3D 4; apic id =3D 08 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80950356 stack pointer =3D 0x28:0xfffffe084f5353e0 frame pointer =3D 0x28:0xfffffe084f535520 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 9837 (nsgproxy) trap number =3D 12 panic: page fault cpuid =3D 4 Uptime: 1d1h14m45s Dumping 1712 out of 32431 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..= 91% #0 doadump (textdump=3D) at pcpu.h:230 230 pcpu.h: No such file or directory. in pcpu.h (kgdb) bt #0 doadump (textdump=3D) at pcpu.h:230 #1 0xffffffff8082b16b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:383 #2 0xffffffff8082b557 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:776 #3 0xffffffff8082b3d3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:707 #4 0xffffffff80bb66d7 in trap_fatal (frame=3D0xfffffe084f535320, eva=3D0) = at /usr/src/sys/amd64/amd64/trap.c:877 #5 0xffffffff80bb6a5b in trap_pfault (frame=3D0xfffffe084f535320, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:787 #6 0xffffffff80bb5f88 in trap (frame=3D0xfffffe084f535320) at /usr/src/sys/amd64/amd64/trap.c:415 #7 0xffffffff80b97aac in calltrap () at /usr/src/sys/amd64/amd64/exception.S:231 #8 0xffffffff80950356 in sysctl_dumpentry (rn=3D0xfffff8012bf4b410, vw=3D0xfffffe084f535688) at /usr/src/sys/net/rtsock.c:1559 #9 0xffffffff8094acc0 in rn_walktree (h=3D, f=3D, w=3D) at /usr/src/sys/net/radix.c:1094 #10 0xffffffff8094fcdf in sysctl_rtsock (oidp=3D, arg1=3D, arg2=3D, req=3D) at /usr/src/sys/net/rtsock.c:1916 #11 0xffffffff8083854b in sysctl_root_handler_locked (oid=3D0xffffffff81433= 718, arg1=3D0xfffffe084f535908, arg2=3D5, req=3D0xfffffe084f535840, tracker=3D0xfffffe084f5357b8) at /usr/src/sys/kern/kern_sysctl.c:165 #12 0xffffffff80837da1 in sysctl_root (arg1=3D0xfffffe084f535908, arg2=3D5)= at /usr/src/sys/kern/kern_sysctl.c:1913 #13 0xffffffff808382c6 in userland_sysctl (td=3D, name=3D0xfffffe084f535900, namelen=3D7, old=3D0x8039e7540, oldlenp=3D, inkernel=3D, new=3D0x0, newlen=3D0, retval=3D0xfffffe084f535968, flags=3D0) at /usr/src/sys/kern/kern_sysctl.c:= 2009 #14 0xffffffff8083814f in sys___sysctl (td=3D0xfffff802b8974000, uap=3D0xfffff802b8974538) at /usr/src/sys/kern/kern_sysctl.c:1943 #15 0xffffffff80bb77e8 in amd64_syscall (td=3D0xfffff802b8974000, traced=3D= 0) at subr_syscall.c:132 #16 0xffffffff80b9838d in fast_syscall_common () at /usr/src/sys/amd64/amd64/exception.S:494 --=20 You are receiving this mail because: You are the assignee for the bug.=