https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=294984
Bug ID: 294984
Summary: Kernel panic in udp6_send when underlying interface
disappears
Product: Base System
Version: 15.0-RELEASE
Hardware: Any
OS: Any
Status: New
Severity: Affects Some People
Priority: ---
Component: kern
Assignee: [email protected]
Reporter: [email protected]
When restarting netif, I can reproduce a kernel panic that seems to be related
to the underlying network interface disappearing according to bz@ (see
discussion in https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=279717):
Below is what it prints before it writes the dump (please note below is iOS
picture text recognition which I tried to manually correct, but if something
doesn't make any sense it might be my mistake).
I also have a crash dump in /var/crash which I could provide.
<<<
Fatal trap 12: page fault while in kernel mode
cpuid = 12; apic id = 0c
fault virtual address = 0x10
fault code = supervisor read data, page not present
instruction pointer = 0x20:0xffffffff80d8e305
stack pointer = 0x28:0xfffffe0250efda10
frame pointer = 0x28:0xfffffe0250efda40
code segment = base Øxø, limit Oxfffff, type @x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 4804 (pool-2387)
rdi: fffff80017747000 rsi: 000000000000001c rdx: fffff80b45542278
rcx: fffff80017747000 r8: fffffe0250efd9c0 r9: 0000000000000018
rax: 0000000000000000 rbx: 0000000000000000 rbp: fffffe0250efda40
r10: 0000001000000000 r11: fffff8027d498260 r12: fffff8011869fc94
r13: fffff8011869fc00 r14: fffffe0250efda1c r15: fffff80666969380
trap number = 12
panic: page fault
cpuid = 12
time = 1777799864
KDB: stack backtrace:
#0 Uxffffffff80bbelad at kdb_backtrace+0x5d
#1 0xffffffff80b71536 at vpanic+0x136
#2 0xffffffff80b713f3 at panic+0x43
#3 0xffffffff81079fa9 at trap_pfault+0x3c9
#4 0xffffffff81050028 at calltrap+0x8
#5 0xffffffff80dabd1a at udp6_send+0x69a
#6 0xffffffff80c18bcc at sosend_dgram+0x2fc
#7 0xffffffff80c19b7f at sousrsend+0x5f
#8 0xffffffff80c21b70 at kern_sendit+0x1c0
#9 0xffffffff80c21e98 at sendit+0x1a8
#10 0xffffffff80c21cdd at sys_sendto+0x4d
#11 0xffffffff8107a8e6 at amd64_syscal1+0x126
#12 0xffffffff8105091b at fast_syscall_common+0xf8
>>>
--
You are receiving this mail because:
You are the assignee for the bug.