[Bug 264257] [tcp] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 20 Jul 2022 17:51:22 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264257
--- Comment #84 from Chad Smith <clearscreen@gmail.com> ---
(In reply to Richard Scheffenegger from comment #80)
Grabbed the netstat -s output from a recent crash file where the system had
been up for an hour before it crashed again, also posting some additional info.
We have a test bench set up and we are trying to reproduce this behavior on
LAN. It seems in perfect network conditions a massively parallel iperf run
across a bridged interface for 24 hours does not trigger this. Looking for
ideas on how to simulate internet-like network conditions. Short of hooking the
other end of our test bench up to an internet connection in another city I am
out of ideas. Open to suggestions.
# uname -a
FreeBSD 13.1-RELEASE FreeBSD 13.1-RELEASE releng/13.1-n250148-fc952ac2212
GENERIC amd64
Fatal trap 12: page fault while in kernel mode
cpuid = 4; apic id = 04
fault virtual address = 0x10
fault code = supervisor read data, page not present
instruction pointer = 0x20:0xffffffff8234a783
stack pointer = 0x0:0xfffffe00c45a5a50
frame pointer = 0x0:0xfffffe00c45a5a60
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 0 (if_io_tqg_4)
trap number = 12
panic: page fault
cpuid = 4
time = 1657212869
KDB: stack backtrace:
#0 0xffffffff80c69465 at kdb_backtrace+0x65
#1 0xffffffff80c1bb1f at vpanic+0x17f
#2 0xffffffff80c1b993 at panic+0x43
#3 0xffffffff810afdf5 at trap_fatal+0x385
#4 0xffffffff810afe4f at trap_pfault+0x4f
#5 0xffffffff81087528 at calltrap+0x8
#6 0xffffffff80d55ec7 at pfil_run_hooks+0x97
#7 0xffffffff8239af37 at bridge_pfil+0x497
#8 0xffffffff8239d5a3 at bridge_forward+0x323
#9 0xffffffff8239cef1 at bridge_input+0x4c1
#10 0xffffffff80d380fd at ether_nh_input+0x21d
#11 0xffffffff80d53089 at netisr_dispatch_src+0xb9
#12 0xffffffff80d372d9 at ether_input+0x69
#13 0xffffffff80d4f4d7 at iflib_rxeof+0xc27
#14 0xffffffff80d49b22 at _task_fn_rx+0x72
#15 0xffffffff80c67e9d at gtaskqueue_run_locked+0x15d
#16 0xffffffff80c67b12 at gtaskqueue_thread_loop+0xc2
#17 0xffffffff80bd8a5e at fork_exit+0x7e
------------------------------------------------------------------------
netstat -s
tcp:
144916 packets sent
10016 data packets (765551 bytes)
0 data packets (0 bytes) retransmitted
0 data packets unnecessarily retransmitted
0 resends initiated by MTU discovery
133061 ack-only packets (306 delayed)
0 URG only packets
0 window probe packets
7 window update packets
1832 control packets
275476 packets received
13046 acks (for 767206 bytes)
17 duplicate acks
0 UDP tunneled pkts
0 UDP tunneled pkt cnt with errors
0 acks for unsent data
269667 packets (337208234 bytes) received in-sequence
17 completely duplicate packets (1304 bytes)
0 old duplicate packets
0 packets with some dup. data (0 bytes duped)
13 out-of-order packets (16952 bytes)
0 packets (0 bytes) of data after window
0 window probes
0 window update packets
0 packets received after close
0 discarded for bad checksums
0 discarded for bad header offset fields
0 discarded because packet too short
0 discarded due to full reassembly queue
177 connection requests
1561 connection accepts
0 bad connection attempts
0 listen queue overflows
0 ignored RSTs in the windows
1661 connections established (including accepts)
6 times used RTT from hostcache
6 times used RTT variance from hostcache
0 times used slow-start threshold from hostcache
1680 connections closed (including 0 drops)
6 connections updated cached RTT on close
6 connections updated cached RTT variance on close
0 connections updated cached ssthresh on close
3 embryonic connections dropped
13046 segments updated rtt (of 9912 attempts)
74 retransmit timeouts
0 connections dropped by rexmit timeout
0 persist timeouts
0 connections dropped by persist timeout
0 Connections (fin_wait_2) dropped because of timeout
0 keepalive timeouts
0 keepalive probes sent
0 connections dropped by keepalive
254 correct ACK header predictions
260118 correct data packet header predictions
1561 syncache entries added
0 retransmitted
0 dupsyn
0 dropped
1561 completed
0 bucket overflow
0 cache overflow
0 reset
0 stale
0 aborted
0 badack
0 unreach
0 zone failures
1561 cookies sent
0 cookies received
1 hostcache entry added
0 bucket overflow
0 SACK recovery episodes
0 segment rexmits in SACK recovery episodes
0 byte rexmits in SACK recovery episodes
0 SACK options (SACK blocks) received
0 SACK options (SACK blocks) sent
0 SACK scoreboard overflow
0 packets with ECN CE bit set
0 packets with ECN ECT(0) bit set
0 packets with ECN ECT(1) bit set
0 successful ECN handshakes
0 times ECN reduced the congestion window
0 packets with matching signature received
0 packets with bad signature received
0 times failed to make signature due to no SA
0 times unexpected signature received
0 times no signature provided by segment
0 Path MTU discovery black hole detection activations
0 Path MTU discovery black hole detection min MSS activations
0 Path MTU discovery black hole detection failures
154 times connection in TIME-WAIT responded with ACK
0 times connection in TIME-WAIT was actively recycled
0 times connection in TIME-WAIT responded with RST
TCP connection count by state:
0 connections in CLOSED state
8 connections in LISTEN state
0 connections in SYN_SENT state
0 connections in SYN_RCVD state
6 connections in ESTABLISHED state
0 connections in CLOSE_WAIT state
0 connections in FIN_WAIT_1 state
0 connections in CLOSING state
0 connections in LAST_ACK state
0 connections in FIN_WAIT_2 state
64 connections in TIME_WAIT state
udp:
288632 datagrams received
0 with incomplete header
0 with bad data length field
0 with bad checksum
0 with no checksum
13740 dropped due to no socket
2422 broadcast/multicast datagrams undelivered
0 dropped due to full socket buffers
0 not for hashed pcb
272470 delivered
179590 datagrams output
0 times multicast source filter matched
ip:
648231 total packets received
0 bad header checksums
0 with size smaller than minimum
0 with data size < data length
0 with ip length > max ip packet size
0 with header length < data size
0 with data length < header length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (dup or out of space)
0 fragments dropped after timeout
0 packets reassembled ok
564854 packets for this host
75426 packets for unknown/unsupported protocol
0 packets forwarded (0 packets fast forwarded)
7951 packets not forwardable
0 packets received for unknown multicast group
0 redirects sent
324597 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
2 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 tunneling packets that can't find gif
0 datagrams with bad address in header
icmp:
75428 calls to icmp_error
0 errors not generated in response to an icmp message
Output histogram:
echo reply: 80
destination unreachable: 2
0 messages with bad code fields
0 messages less than the minimum length
0 messages with bad checksum
0 messages with bad length
0 multicast echo requests ignored
0 multicast timestamp requests ignored
Input histogram:
destination unreachable: 65
echo: 80
80 message responses generated
0 invalid return addresses
0 no return routes
arp:
3 ARP requests sent
1 ARP request failed to sent
72 ARP replies sent
20625 ARP requests received
773 ARP replies received
74733 ARP packets received
0 total packets dropped due to no ARP entry
0 ARP entrys timed out
0 Duplicate IPs seen
ip6:
0 total packets received
0 with size smaller than minimum
0 with data size < data length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (dup or out of space)
0 fragments dropped after timeout
0 fragments that exceeded limit
0 atomic fragments
0 packets reassembled ok
0 packets for this host
0 packets forwarded
0 packets not forwardable
0 redirects sent
0 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
0 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 packets that violated scope rules
0 multicast packets which we don't join
Mbuf statistics:
0 one mbuf
0 one ext mbuf
0 two or more ext mbuf
0 packets whose headers are not contiguous
0 tunneling packets that can't find gif
0 packets discarded because of too many headers
0 failures of source address selection
icmp6:
0 calls to icmp6_error
0 errors not generated in response to an icmp6 message
0 errors not generated because of rate limitation
0 messages with bad code fields
0 messages < minimum length
0 bad checksums
0 messages with bad length
Histogram of error messages to be generated:
0 no route
0 administratively prohibited
0 beyond scope
0 address unreachable
0 port unreachable
0 packet too big
0 time exceed transit
0 time exceed reassembly
0 erroneous header field
0 unrecognized next header
0 unrecognized option
0 redirect
0 unknown
0 message responses generated
0 messages with too many ND options
0 messages with bad ND options
0 bad neighbor solicitation messages
0 bad neighbor advertisement messages
0 bad router solicitation messages
0 bad router advertisement messages
0 bad redirect messages
0 default routers overflows
0 prefix overflows
0 neighbour entries overflows
0 redirect overflows
0 messages with invalid hop limit
0 path MTU changes
rip6:
0 messages received
0 checksum calculations on inbound
0 messages with bad checksum
0 messages dropped due to no socket
0 multicast messages dropped due to no socket
0 messages dropped due to full socket buffers
0 delivered
0 datagrams output
pfkey:
0 requests sent from userland
0 bytes sent from userland
0 messages with invalid length field
0 messages with invalid version field
0 messages with invalid message type field
0 messages too short
0 messages with memory allocation failure
0 messages with duplicate extension
0 messages with invalid extension type
0 messages with invalid sa type
0 messages with invalid address extension
0 requests sent to userland
0 bytes sent to userland
0 messages toward single socket
0 messages toward all sockets
0 messages toward registered sockets
0 messages with memory allocation failure
--
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.