[Bug 212118] [vimage]: Fatal trap 12 | rename epair with vlan
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Aug 24 17:42:34 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212118
Bug ID: 212118
Summary: [vimage]: Fatal trap 12 | rename epair with vlan
Product: Base System
Version: 11.0-RC1
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: freebsd-bugs at FreeBSD.org
Reporter: R100500B at gmail.com
Created attachment 174020
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=174020&action=edit
core.txt
Bind vlan from jail with vnet to epair, when second pair from host system was
renamed cause Fatal trap 12. Bug occurs randomly (sometimes first try,
sometimes 20 or more). To reproduce see script below.
<code>
#!/usr/local/bin/bash
create_destroy_jail() {
echo " * Create epair"
ifconfig epair create
echo "* Rename 1 epair"
ifconfig epair0a name repara
ifconfig bridge0 addm repara
ifconfig repara up
echo " * Create jail"
jail -i -c name=test vnet persist
echo " * Bind epair"
ifconfig epair0b vnet test
echo " * jail: create valn"
jexec test ifconfig vlan create
echo " * jail: configure valn"
jexec test ifconfig vlan0 192.168.200.2/24 vlandev epair0b vlan 10 <---
This step cause fatal trap
echo " * Destroy jail"
jail -r test
echo " * Destroy epair"
ifconfig repara destroy
}
for i in {1..50}; do
echo " [$i]"
create_destroy_jail
echo " [$i]"
done
</code>
Fatal trap 12: page fault while in kernel mode
cpuid = 3; apic id = 03
fault virtual address = 0x10
fault code = supervisor read data, page not present
instruction pointer = 0x20:0xffffffff8284ae4d
stack pointer = 0x28:0xfffffe023710b620
frame pointer = 0x28:0xfffffe023710b680
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 12 (irq269: igb0:que 3)
(kgdb) bt
#0 doadump (textdump=1) at pcpu.h:221
#1 0xffffffff80afaabf in kern_reboot (howto=260) at
/usr/src/sys/kern/kern_shutdown.c:366
#2 0xffffffff80afb08b in vpanic (fmt=<value optimized out>, ap=<value
optimized out>) at /usr/src/sys/kern/kern_shutdown.c:759
#3 0xffffffff80afaec3 in panic (fmt=0x0) at
/usr/src/sys/kern/kern_shutdown.c:690
#4 0xffffffff8039f857 in db_panic (addr=<value optimized out>,
have_addr=false, count=0, modif=0x0) at /usr/src/sys/ddb/db_command.c:473
#5 0xffffffff8039eda9 in db_command (cmd_table=<value optimized out>) at
/usr/src/sys/ddb/db_command.c:440
#6 0xffffffff8039eb04 in db_command_loop () at
/usr/src/sys/ddb/db_command.c:493
#7 0xffffffff803a1b0b in db_trap (type=<value optimized out>, code=<value
optimized out>) at /usr/src/sys/ddb/db_main.c:251
#8 0xffffffff80b477e3 in kdb_trap (type=<value optimized out>, code=<value
optimized out>, tf=<value optimized out>) at /usr/src/sys/kern/subr_kdb.c:654
#9 0xffffffff80ff0430 in trap_fatal (frame=0xfffffe023710b570, eva=16) at
/usr/src/sys/amd64/amd64/trap.c:836
#10 0xffffffff80ff0663 in trap_pfault (frame=0xfffffe023710b570, usermode=0) at
/usr/src/sys/amd64/amd64/trap.c:691
#11 0xffffffff80fefc0d in trap (frame=0xfffffe023710b570) at
/usr/src/sys/amd64/amd64/trap.c:442
#12 0xffffffff80fd2db1 in calltrap () at
/usr/src/sys/amd64/amd64/exception.S:236
#13 0xffffffff8284ae4d in epair_transmit (ifp=0xfffff800127ec800,
m=0xfffff8007c4a5000) at /usr/src/sys/modules/if_epair/../../net/if_epair.c:499
#14 0xffffffff8282362a in bridge_enqueue (sc=0xfffff800129f5c00, dst_ifp=<value
optimized out>, m=<value optimized out>)
at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:1919
#15 0xffffffff82823939 in bridge_broadcast (sc=<value optimized out>,
src_if=<value optimized out>, m=<value optimized out>, runfilt=1)
at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2573
#16 0xffffffff82825fdf in bridge_forward (sc=0xfffff800129f5c00,
sbif=0xfffff80012a30e00, m=0xffffffff8284b301) at
/usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2233
#17 0xffffffff82824ffd in bridge_input (ifp=<value optimized out>, m=<value
optimized out>) at /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:2353
#18 0xffffffff80c10367 in ether_nh_input (m=<value optimized out>) at
/usr/src/sys/net/if_ethersubr.c:604
#19 0xffffffff80c27c8f in netisr_dispatch_src (proto=5, source=<value optimized
out>, m=0xbae400) at /usr/src/sys/net/netisr.c:1121
#20 0xffffffff80c0f914 in ether_input (ifp=<value optimized out>, m=0x0) at
/usr/src/sys/net/if_ethersubr.c:759
#21 0xffffffff82599da8 in igb_rxeof (count=366148096) at
/usr/src/sys/modules/igb/../../dev/e1000/if_igb.c:4957
#22 0xffffffff825991f8 in igb_msix_que (arg=0xfffff800054d8938) at
/usr/src/sys/modules/igb/../../dev/e1000/if_igb.c:1612
#23 0xffffffff80ab35ff in intr_event_execute_handlers (p=<value optimized out>,
ie=<value optimized out>) at /usr/src/sys/kern/kern_intr.c:1262
#24 0xffffffff80ab3c16 in ithread_loop (arg=<value optimized out>) at
/usr/src/sys/kern/kern_intr.c:1275
#25 0xffffffff80ab0105 in fork_exit (callout=0xffffffff80ab3b50 <ithread_loop>,
arg=0xfffff800070b35a0, frame=0xfffffe023710bac0) at
/usr/src/sys/kern/kern_fork.c:1038
#26 0xffffffff80fd32ee in fork_trampoline () at
/usr/src/sys/amd64/amd64/exception.S:611
#27 0x0000000000000000 in ?? ()
(kgdb) list *0xffffffff8284ae4d
0xffffffff8284ae4d is in epair_transmit (bpf.h:1487).
1482 struct bpf_if_ext *ext;
1483
1484 ext = (struct bpf_if_ext *)bpf;
1485 if (!LIST_EMPTY(&ext->bif_dlist))
1486 return (1);
1487 return (0);
1488 }
1489
1490 #define BPF_TAP(_ifp,_pkt,_pktlen) do { \
1491 if (bpf_peers_present((_ifp)->if_bpf)) \
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-bugs
mailing list