[Bug 231659] 12-ALPHA6 r338900 crashes with IPsec on network load

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Sep 24 12:17:14 UTC 2018


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231659

            Bug ID: 231659
           Summary: 12-ALPHA6 r338900 crashes with IPsec on network load
           Product: Base System
           Version: CURRENT
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs at FreeBSD.org
          Reporter: lev at FreeBSD.org

I'm running network benchmarks with IPsec in transport mode. It is simple
"iperf3" run after setting up IPsec with "setkey".

Network adapter is igb (I210).

Here is backtrace

Fatal trap 9: general protection fault while in kernel mode
cpuid = 3; apic id = 06
instruction pointer     = 0x20:0xffffffff8077ae62
stack pointer           = 0x28:0xfffffe00004de280
frame pointer           = 0x28:0xfffffe00004de2a0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = resume, IOPL = 0
current process         = 0 (if_io_tqg_3)
[ thread pid 0 tid 100068 ]
Stopped at      intr_execute_handlers+0x12:     addq    $0x1,(%rax)
db> bt
Tracing pid 0 tid 100068 td 0xfffff80002970000
intr_execute_handlers() at intr_execute_handlers+0x12/frame 0xfffffe00004de2a0
lapic_handle_intr() at lapic_handle_intr+0x44/frame 0xfffffe00004de2c0
Xapic_isr1() at Xapic_isr1+0xd9/frame 0xfffffe00004de2c0
--- interrupt, rip = 0xffffffff80721d1a, rsp = 0xfffffe00004de390, rbp =
0xfffffe00004de3a0 ---
spinlock_exit() at spinlock_exit+0x3a/frame 0xfffffe00004de3a0
putchar() at putchar+0x14e/frame 0xfffffe00004de420
kvprintf() at kvprintf+0x106/frame 0xfffffe00004de540
vprintf() at vprintf+0x84/frame 0xfffffe00004de610
printf() at printf+0x43/frame 0xfffffe00004de670
trap_fatal() at trap_fatal+0x9d/frame 0xfffffe00004de6c0
trap() at trap+0x6d/frame 0xfffffe00004de7d0
calltrap() at calltrap+0x8/frame 0xfffffe00004de7d0
--- trap 0x9, rip = 0xffffffff804b13e9, rsp = 0xfffffe00004de8a0, rbp =
0xfffffe00004de8f0 ---
__rw_rlock_hard() at __rw_rlock_hard+0xb9/frame 0xfffffe00004de8f0
bpf_mtap() at bpf_mtap+0x46/frame 0xfffffe00004de970
ether_nh_input() at ether_nh_input+0xca/frame 0xfffffe00004de9c0
netisr_dispatch_src() at netisr_dispatch_src+0xa1/frame 0xfffffe00004dea20
ether_input() at ether_input+0x26/frame 0xfffffe00004dea40
_task_fn_rx() at _task_fn_rx+0x7ea/frame 0xfffffe00004deb30
gtaskqueue_run_locked() at gtaskqueue_run_locked+0xe3/frame 0xfffffe00004deb80
gtaskqueue_thread_loop() at gtaskqueue_thread_loop+0x88/frame
0xfffffe00004debb0
fork_exit() at fork_exit+0x76/frame 0xfffffe00004debf0
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00004debf0
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-bugs mailing list