Date: Fri, 01 Feb 2019 23:37:20 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 235411] sys.netpfil.pf.fragmentation.v6 panics after r343631 Message-ID: <bug-235411-227@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235411 Bug ID: 235411 Summary: sys.netpfil.pf.fragmentation.v6 panics after r343631 Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: lwhsu@FreeBSD.org It seems that after r343631, execute test case sys.netpfil.pf.fragmentation= .v6 results kernel panic: root@:/usr/tests/sys/netpfil/pf # kyua test fragmentation:v6 fragmentation:v6 -> lock order reversal: 1st 0xffffffff82095820 allprison (allprison) @ /usr/src/sys/kern/kern_jail.c:966 2nd 0xffffffff820c3840 vnet_sysinit_sxlock (vnet_sysinit_sxlock) @ /usr/src/sys/net/vnet.c:575 stack backtrace: #0 0xffffffff80c450b3 at witness_debugger+0x73 #1 0xffffffff80c44e03 at witness_checkorder+0xac3 #2 0xffffffff80be7398 at _sx_slock_int+0x68 #3 0xffffffff80d0c7e7 at vnet_alloc+0x117 #4 0xffffffff80ba2912 at kern_jail_set+0x1b32 #5 0xffffffff80ba4290 at sys_jail_set+0x40 #6 0xffffffff810aee96 at amd64_syscall+0x276 #7 0xffffffff810882dd at fast_syscall_common+0x101 Fatal trap 12: page fault while in kernel mode cpuid =3D 1; apic id =3D 01 fault virtual address =3D 0x10 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80e2e4f0 stack pointer =3D 0x28:0xfffffe00242b3590 frame pointer =3D 0x28:0xfffffe00242b36e0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 12 (swi1: netisr 0) trap number =3D 12 panic: page fault cpuid =3D 1 time =3D 1549063497 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00242b3= 250 vpanic() at vpanic+0x1b4/frame 0xfffffe00242b32b0 panic() at panic+0x43/frame 0xfffffe00242b3310 trap_fatal() at trap_fatal+0x369/frame 0xfffffe00242b3360 trap_pfault() at trap_pfault+0x62/frame 0xfffffe00242b33b0 trap() at trap+0x2bb/frame 0xfffffe00242b34c0 calltrap() at calltrap+0x8/frame 0xfffffe00242b34c0 --- trap 0xc, rip =3D 0xffffffff80e2e4f0, rsp =3D 0xfffffe00242b3590, rbp = =3D 0xfffffe00242b36e0 --- ip6_forward() at ip6_forward+0x4a0/frame 0xfffffe00242b36e0 ip6_input() at ip6_input+0xdfe/frame 0xfffffe00242b37d0 netisr_dispatch_src() at netisr_dispatch_src+0xa2/frame 0xfffffe00242b3840 ether_demux() at ether_demux+0x16f/frame 0xfffffe00242b3870 ether_nh_input() at ether_nh_input+0x408/frame 0xfffffe00242b38d0 netisr_dispatch_src() at netisr_dispatch_src+0xa2/frame 0xfffffe00242b3940 ether_input() at ether_input+0x73/frame 0xfffffe00242b3970 epair_nh_sintr() at epair_nh_sintr+0x19/frame 0xfffffe00242b3990 swi_net() at swi_net+0x189/frame 0xfffffe00242b3a10 ithread_loop() at ithread_loop+0x187/frame 0xfffffe00242b3a70 fork_exit() at fork_exit+0x84/frame 0xfffffe00242b3ab0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00242b3ab0 --- trap 0, rip =3D 0, rsp =3D 0, rbp =3D 0 --- Other kdb information is available at: https://gist.github.com/80eec9493d5ecfcbd123a308e2b8d4cc --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235411-227>