https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=294984

            Bug ID: 294984
           Summary: Kernel panic in udp6_send when underlying interface
                    disappears
           Product: Base System
           Version: 15.0-RELEASE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: kern
          Assignee: [email protected]
          Reporter: [email protected]

When restarting netif, I can reproduce a kernel panic that seems to be related
to the underlying network interface disappearing according to bz@ (see
discussion in https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=279717):

Below is what it prints before it writes the dump (please note below is iOS
picture text recognition which I tried to manually correct, but if something
doesn't make any sense it might be my mistake).

I also have a crash dump in /var/crash which I could provide.

<<<
Fatal trap 12: page fault while in kernel mode

cpuid = 12; apic id = 0c

fault virtual address = 0x10
fault code = supervisor read data, page not present

instruction pointer = 0x20:0xffffffff80d8e305

stack pointer = 0x28:0xfffffe0250efda10

frame pointer = 0x28:0xfffffe0250efda40

code segment = base Øxø, limit Oxfffff, type @x1b
             = DPL 0, pres 1, long 1, def32 0, gran 1

processor eflags = interrupt enabled, resume, IOPL = 0

current process = 4804 (pool-2387)

rdi: fffff80017747000 rsi: 000000000000001c rdx: fffff80b45542278
rcx: fffff80017747000 r8: fffffe0250efd9c0 r9: 0000000000000018
rax: 0000000000000000 rbx: 0000000000000000 rbp: fffffe0250efda40
r10: 0000001000000000 r11: fffff8027d498260 r12: fffff8011869fc94
r13: fffff8011869fc00 r14: fffffe0250efda1c r15: fffff80666969380
trap number = 12
panic: page fault
cpuid = 12
time = 1777799864
KDB: stack backtrace:
#0 Uxffffffff80bbelad at kdb_backtrace+0x5d
#1 0xffffffff80b71536 at vpanic+0x136
#2 0xffffffff80b713f3 at panic+0x43
#3 0xffffffff81079fa9 at trap_pfault+0x3c9
#4 0xffffffff81050028 at calltrap+0x8
#5 0xffffffff80dabd1a at udp6_send+0x69a
#6 0xffffffff80c18bcc at sosend_dgram+0x2fc
#7 0xffffffff80c19b7f at sousrsend+0x5f
#8 0xffffffff80c21b70 at kern_sendit+0x1c0
#9 0xffffffff80c21e98 at sendit+0x1a8
#10 0xffffffff80c21cdd at sys_sendto+0x4d
#11 0xffffffff8107a8e6 at amd64_syscal1+0x126
#12 0xffffffff8105091b at fast_syscall_common+0xf8
>>>

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to