https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231659
Bug ID: 231659 Summary: 12-ALPHA6 r338900 crashes with IPsec on network load Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: b...@freebsd.org Reporter: l...@freebsd.org I'm running network benchmarks with IPsec in transport mode. It is simple "iperf3" run after setting up IPsec with "setkey". Network adapter is igb (I210). Here is backtrace Fatal trap 9: general protection fault while in kernel mode cpuid = 3; apic id = 06 instruction pointer = 0x20:0xffffffff8077ae62 stack pointer = 0x28:0xfffffe00004de280 frame pointer = 0x28:0xfffffe00004de2a0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = resume, IOPL = 0 current process = 0 (if_io_tqg_3) [ thread pid 0 tid 100068 ] Stopped at intr_execute_handlers+0x12: addq $0x1,(%rax) db> bt Tracing pid 0 tid 100068 td 0xfffff80002970000 intr_execute_handlers() at intr_execute_handlers+0x12/frame 0xfffffe00004de2a0 lapic_handle_intr() at lapic_handle_intr+0x44/frame 0xfffffe00004de2c0 Xapic_isr1() at Xapic_isr1+0xd9/frame 0xfffffe00004de2c0 --- interrupt, rip = 0xffffffff80721d1a, rsp = 0xfffffe00004de390, rbp = 0xfffffe00004de3a0 --- spinlock_exit() at spinlock_exit+0x3a/frame 0xfffffe00004de3a0 putchar() at putchar+0x14e/frame 0xfffffe00004de420 kvprintf() at kvprintf+0x106/frame 0xfffffe00004de540 vprintf() at vprintf+0x84/frame 0xfffffe00004de610 printf() at printf+0x43/frame 0xfffffe00004de670 trap_fatal() at trap_fatal+0x9d/frame 0xfffffe00004de6c0 trap() at trap+0x6d/frame 0xfffffe00004de7d0 calltrap() at calltrap+0x8/frame 0xfffffe00004de7d0 --- trap 0x9, rip = 0xffffffff804b13e9, rsp = 0xfffffe00004de8a0, rbp = 0xfffffe00004de8f0 --- __rw_rlock_hard() at __rw_rlock_hard+0xb9/frame 0xfffffe00004de8f0 bpf_mtap() at bpf_mtap+0x46/frame 0xfffffe00004de970 ether_nh_input() at ether_nh_input+0xca/frame 0xfffffe00004de9c0 netisr_dispatch_src() at netisr_dispatch_src+0xa1/frame 0xfffffe00004dea20 ether_input() at ether_input+0x26/frame 0xfffffe00004dea40 _task_fn_rx() at _task_fn_rx+0x7ea/frame 0xfffffe00004deb30 gtaskqueue_run_locked() at gtaskqueue_run_locked+0xe3/frame 0xfffffe00004deb80 gtaskqueue_thread_loop() at gtaskqueue_thread_loop+0x88/frame 0xfffffe00004debb0 fork_exit() at fork_exit+0x76/frame 0xfffffe00004debf0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00004debf0 --- trap 0, rip = 0, rsp = 0, rbp = 0 --- -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ freebsd-bugs@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"