[Bug 256882] [routing][fib_algo][dxr][dpdk_lpm4] kernel panic

From: <bugzilla-noreply_at_freebsd.org>
Date: Tue, 29 Jun 2021 10:31:42 +0000
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256882

            Bug ID: 256882
           Summary: [routing][fib_algo][dxr][dpdk_lpm4] kernel panic
           Product: Base System
           Version: 13.0-STABLE
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs_at_FreeBSD.org
          Reporter: konrad.kreciwilk_at_korbank.pl

I have DELL R630 with ccX (Chelsio T62100-SO-CR) agreggated with lagg0 and
vlans on it. I move all vlans to JAIL (VNET). There works bird which received
full feed (900k prefixes). Sysctl for JAIL:

net.route.algo.inet.algo="dxr"
net.route.algo.inet6.algo="dpdk_lpm6"
net.inet.ip.forwarding="1"
net.inet6.ip6.forwarding="1"
net.inet.ip.redirect="0"
net.inet.udp.blackhole="1"
net.inet.tcp.blackhole="2"
net.inet.icmp.drop_redirect="1"


After a few day crash has occurred:


Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 02


Fatal trap 12: page fault while in kernel mode

fault virtual address   = 0x401050168
cpuid = 3; apic id = 06



fault virtual address   = 0x0
Fatal trap 12: page fault while in kernel mode

cpuid = 0; Fatal trap 12: page fault while in kernel mode
apic id = 00
cpuid = 9; fault virtual address        = 0x0
apic id = 12
fault code              = supervisor read data, page not present
fault virtual address   = 0x0
instruction pointer     = 0x20:0xffffffff80d88f94
fault code              = supervisor read data, page not present
stack pointer           = 0x28:0xfffffe00ff3ed650

instruction pointer     = 0x20:0xffffffff80d88f94

stack pointer           = 0x28:0xfffffe00ff529650
Fatal trap 12: page fault while in kernel mode
frame pointer           = 0x28:0xfffffe00ff529650
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 12 (irq147: t6nex1:0a9)
trap number             = 12
panic: page fault
cpuid = 9
time = 1624957922
KDB: stack backtrace:
#0 0xffffffff80cb0515 at kdb_backtrace+0x65
#1 0xffffffff80c643b1 at vpanic+0x181
#2 0xffffffff80c64223 at panic+0x43
#3 0xffffffff810ee277 at trap_fatal+0x387
#4 0xffffffff810ee2cf at trap_pfault+0x4f
#5 0xffffffff810ed923 at trap+0x253
#6 0xffffffff810c53b8 at calltrap+0x8
#7 0xffffffff80e0ccf9 at ip_tryforward+0x6d9
#8 0xffffffff80e0f066 at ip_input+0x356
#9 0xffffffff80d993fa at netisr_dispatch_src+0xca
#10 0xffffffff80d7d988 at ether_demux+0x148
#11 0xffffffff80d7ed0c at ether_nh_input+0x34c
#12 0xffffffff80d993fa at netisr_dispatch_src+0xca
#13 0xffffffff80d7ddd9 at ether_input+0x69
#14 0xffffffff80d7d971 at ether_demux+0x131
#15 0xffffffff80d7ed0c at ether_nh_input+0x34c
#16 0xffffffff80d993fa at netisr_dispatch_src+0xca
#17 0xffffffff80d7ddd9 at ether_input+0x69
Uptime: 3d9h43m58s
Dumping 5134 out of 32631 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%



I used dpdk_lpm4 before and crashed also happened:


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x7a
fault code              = supervisor read data, page not present
instruction pointer     = 0x20:0xffffffff80df611e
stack pointer           = 0x0:0xfffffe00ff38d620
frame pointer           = 0x0:0xfffffe00ff38d640
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 12 (irq98: t6nex0:0a0)
trap number             = 12
panic: page fault
cpuid = 0
time = 1624658764
KDB: stack backtrace:
#0 0xffffffff80cab3c5 at kdb_backtrace+0x65
#1 0xffffffff80c5f231 at vpanic+0x181
#2 0xffffffff80c5f0a3 at panic+0x43
#3 0xffffffff810e2277 at trap_fatal+0x387
#4 0xffffffff810e22cf at trap_pfault+0x4f
#5 0xffffffff810e1923 at trap+0x253
#6 0xffffffff810b8ce8 at calltrap+0x8
#7 0xffffffff80e038ee at ip_findroute+0x1e
#8 0xffffffff80e03297 at ip_tryforward+0x247
#9 0xffffffff80e05a96 at ip_input+0x356
#10 0xffffffff80d8fe2a at netisr_dispatch_src+0xca
#11 0xffffffff80d74628 at ether_demux+0x148
#12 0xffffffff80d759ac at ether_nh_input+0x34c
#13 0xffffffff80d8fe2a at netisr_dispatch_src+0xca
#14 0xffffffff80d74a79 at ether_input+0x69
#15 0xffffffff80d74611 at ether_demux+0x131
#16 0xffffffff80d759ac at ether_nh_input+0x34c
#17 0xffffffff80d8fe2a at netisr_dispatch_src+0xca
Uptime: 23h9m10s
Dumping 4852 out of 32631 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%

------------------------------------------------------------------------

-- 
You are receiving this mail because:
You are the assignee for the bug.
Received on Tue Jun 29 2021 - 10:31:42 UTC

Original text of this message