[Bug 231659] 12-ALPHA6 r338900 crashes with IPsec on network load
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Sep 24 12:17:14 UTC 2018
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231659
Bug ID: 231659
Summary: 12-ALPHA6 r338900 crashes with IPsec on network load
Product: Base System
Version: CURRENT
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: bugs at FreeBSD.org
Reporter: lev at FreeBSD.org
I'm running network benchmarks with IPsec in transport mode. It is simple
"iperf3" run after setting up IPsec with "setkey".
Network adapter is igb (I210).
Here is backtrace
Fatal trap 9: general protection fault while in kernel mode
cpuid = 3; apic id = 06
instruction pointer = 0x20:0xffffffff8077ae62
stack pointer = 0x28:0xfffffe00004de280
frame pointer = 0x28:0xfffffe00004de2a0
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = resume, IOPL = 0
current process = 0 (if_io_tqg_3)
[ thread pid 0 tid 100068 ]
Stopped at intr_execute_handlers+0x12: addq $0x1,(%rax)
db> bt
Tracing pid 0 tid 100068 td 0xfffff80002970000
intr_execute_handlers() at intr_execute_handlers+0x12/frame 0xfffffe00004de2a0
lapic_handle_intr() at lapic_handle_intr+0x44/frame 0xfffffe00004de2c0
Xapic_isr1() at Xapic_isr1+0xd9/frame 0xfffffe00004de2c0
--- interrupt, rip = 0xffffffff80721d1a, rsp = 0xfffffe00004de390, rbp =
0xfffffe00004de3a0 ---
spinlock_exit() at spinlock_exit+0x3a/frame 0xfffffe00004de3a0
putchar() at putchar+0x14e/frame 0xfffffe00004de420
kvprintf() at kvprintf+0x106/frame 0xfffffe00004de540
vprintf() at vprintf+0x84/frame 0xfffffe00004de610
printf() at printf+0x43/frame 0xfffffe00004de670
trap_fatal() at trap_fatal+0x9d/frame 0xfffffe00004de6c0
trap() at trap+0x6d/frame 0xfffffe00004de7d0
calltrap() at calltrap+0x8/frame 0xfffffe00004de7d0
--- trap 0x9, rip = 0xffffffff804b13e9, rsp = 0xfffffe00004de8a0, rbp =
0xfffffe00004de8f0 ---
__rw_rlock_hard() at __rw_rlock_hard+0xb9/frame 0xfffffe00004de8f0
bpf_mtap() at bpf_mtap+0x46/frame 0xfffffe00004de970
ether_nh_input() at ether_nh_input+0xca/frame 0xfffffe00004de9c0
netisr_dispatch_src() at netisr_dispatch_src+0xa1/frame 0xfffffe00004dea20
ether_input() at ether_input+0x26/frame 0xfffffe00004dea40
_task_fn_rx() at _task_fn_rx+0x7ea/frame 0xfffffe00004deb30
gtaskqueue_run_locked() at gtaskqueue_run_locked+0xe3/frame 0xfffffe00004deb80
gtaskqueue_thread_loop() at gtaskqueue_thread_loop+0x88/frame
0xfffffe00004debb0
fork_exit() at fork_exit+0x76/frame 0xfffffe00004debf0
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00004debf0
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-bugs
mailing list