https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278422
Bug ID: 278422
Summary: kernel panic related to IPv4 routes populated by bird2
when dxr routing algorithm used
Product: Base System
Version: 14.0-RELEASE
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: [email protected]
Reporter: [email protected]
While researching bug 278394, Marek recommended:
net.route.algo.inet.algo=dxr
Using that caused a kernel panic:
Fatal trap 9: general protection fault while in kernel mode
cpuid = 0; apic id = 00
instruction pointer = 0x20:0xffffffff80cb316b
stack pointer = 0x0:0xfffffe000374fd00
frame pointer = 0x0:0xfffffe000374fd10
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 2 (clock (0))
rdi: deadc0dedeadc0de rsi: fffffe000374fd28 rdx: 000000000009f272
rcx: 000000000009f271 r8: 0000000000000f1c r9: 000000000009f271
rax: deadc0dedeadc0de rbx: fffffe000374fd28 rbp: fffffe000374fd10
r10: 0000000000004f93 r11: 0000000000800000 r12: fffffe00a133b000
r13: 0000000000000003 r14: deadc0dedeadc0de r15: 0000000000000f1c
trap number = 9
panic: general protection fault
cpuid = 0
time = 1713406520
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe000374fa40
vpanic() at vpanic+0x132/frame 0xfffffe000374fb70
panic() at panic+0x43/frame 0xfffffe000374fbd0
trap_fatal() at trap_fatal+0x40c/frame 0xfffffe000374fc30
calltrap() at calltrap+0x8/frame 0xfffffe000374fc30
--- trap 0x9, rip = 0xffffffff80cb316b, rsp = 0xfffffe000374fd00, rbp =
0xfffffe000374fd10 ---
fib_get_rtable_info() at fib_get_rtable_info+0x1b/frame 0xfffffe000374fd10
dxr_change_rib_batch() at dxr_change_rib_batch+0x272/frame 0xfffffe000374fd70
apply_rtable_changes() at apply_rtable_changes+0x2a/frame 0xfffffe000374fda0
handle_fd_callout() at handle_fd_callout+0x167/frame 0xfffffe000374fe00
softclock_call_cc() at softclock_call_cc+0x14e/frame 0xfffffe000374fec0
softclock_thread() at softclock_thread+0xc6/frame 0xfffffe000374fef0
fork_exit() at fork_exit+0x82/frame 0xfffffe000374ff30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe000374ff30
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---
--
You are receiving this mail because:
You are the assignee for the bug.