[Bug 272965] armv7 'Alignment Fault' on read panic during udp_input for kyua's sys/netinet6/exthdr:exthdr ; other udp_input related panics
Date: Sun, 06 Aug 2023 05:25:30 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272965 Mark Millard <marklmi26-fbsd@yahoo.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|armv7 'Alignment Fault' on |armv7 'Alignment Fault' on |read panic for kyua's |read panic during udp_input |sys/netinet6/exthdr:exthdr |for kyua's |: an example |sys/netinet6/exthdr:exthdr | |; other udp_input related | |panics --- Comment #1 from Mark Millard <marklmi26-fbsd@yahoo.com> --- (In reply to Mark Millard from comment #0) sys/netpfil/pf/dup:dup_to also gets a udp_input failure . . . # /usr/bin/kyua test -k /usr/tests/Kyuafile sys/netpfil/pf/dup:dup_to sys/netpfil/pf/dup:dup_to -> Fatal kernel mode data abort: 'Alignment Fault' on read trapframe: 0xe01e7b00 FSR=00000001, FAR=e30b480e, spsr=20000013 r0 =00000000, r1 =00000001, r2 =00000001, r3 =00000134 r4 =00000000, r5 =00000134, r6 =e30b480e, r7 =e30b4822 r8 =00000134, r9 =c0918b04, r10=00000014, r11=e01e7c28 r12=00000000, ssp=e01e7b90, slr=c04534f4, pc =c048b34c panic: Fatal abort cpuid = 3 time = 1691299238 KDB: stack backtrace: db_trace_self() at db_trace_self pc = 0xc05ecde4 lr = 0xc0079c70 (db_trace_self_wrapper+0x30) sp = 0xe01e78b8 fp = 0xe01e79d0 db_trace_self_wrapper() at db_trace_self_wrapper+0x30 pc = 0xc0079c70 lr = 0xc02e99a0 (vpanic+0x140) sp = 0xe01e79d8 fp = 0xe01e79f8 r4 = 0x00000100 r5 = 0x00000000 r6 = 0xc07597e2 r7 = 0xc0aeaec8 vpanic() at vpanic+0x140 pc = 0xc02e99a0 lr = 0xc02e9780 (doadump) sp = 0xe01e7a00 fp = 0xe01e7a04 r4 = 0xe01e7b00 r5 = 0x00000013 r6 = 0xe30b480e r7 = 0x00000001 r8 = 0x00000001 r9 = 0xe087a7c0 r10 = 0xe30b480e doadump() at doadump pc = 0xc02e9780 lr = 0xc0611184 (abort_align) sp = 0xe01e7a0c fp = 0xe01e7a38 r4 = 0xe30b480e r5 = 0xe01e7a04 r6 = 0xc02e9780 r10 = 0xe01e7a0c abort_align() at abort_align pc = 0xc0611184 lr = 0xc06111f8 (abort_align+0x74) sp = 0xe01e7a40 fp = 0xe01e7a58 r4 = 0x00000013 r10 = 0xe30b480e abort_align() at abort_align+0x74 pc = 0xc06111f8 lr = 0xc0610e18 (abort_handler+0x498) sp = 0xe01e7a60 fp = 0xe01e7af8 r4 = 0x00000000 r10 = 0xe30b480e abort_handler() at abort_handler+0x498 pc = 0xc0610e18 lr = 0xc05ef6ac (exception_exit) sp = 0xe01e7b00 fp = 0xe01e7c28 r4 = 0x00000000 r5 = 0x00000134 r6 = 0xe30b480e r7 = 0xe30b4822 r8 = 0x00000134 r9 = 0xc0918b04 r10 = 0x00000014 exception_exit() at exception_exit pc = 0xc05ef6ac lr = 0xc04534f4 (ip_input+0x404) sp = 0xe01e7b90 fp = 0xe01e7c28 r0 = 0x00000000 r1 = 0x00000001 r2 = 0x00000001 r3 = 0x00000134 r4 = 0x00000000 r5 = 0x00000134 r6 = 0xe30b480e r7 = 0xe30b4822 r8 = 0x00000134 r9 = 0xc0918b04 r10 = 0x00000014 r12 = 0x00000000 udp_input() at udp_input+0x1c0 pc = 0xc048b34c lr = 0xc04534f4 (ip_input+0x404) sp = 0xe01e7c30 fp = 0xe01e7c70 r4 = 0x00000001 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x01000193 r8 = 0xe30b480e r9 = 0xc094a938 r10 = 0x00000014 ip_input() at ip_input+0x404 pc = 0xc04534f4 lr = 0xc04235bc (netisr_dispatch_src+0x100) sp = 0xe01e7c78 fp = 0xe01e7ca0 r4 = 0x00000084 r5 = 0xe304c700 r6 = 0x00000000 r7 = 0xc0b5a2f8 r8 = 0x00000000 r9 = 0xc57f72c0 r10 = 0x00000008 netisr_dispatch_src() at netisr_dispatch_src+0x100 pc = 0xc04235bc lr = 0xc041a384 (ether_demux+0x1bc) sp = 0xe01e7ca8 fp = 0xe01e7cc0 r4 = 0xe304c700 r5 = 0x00000001 r6 = 0xdb791000 r7 = 0x5e4a6f28 r8 = 0x00000000 r9 = 0xc57f72c0 r10 = 0x00000008 ether_demux() at ether_demux+0x1bc pc = 0xc041a384 lr = 0xc041bb68 (ether_nh_input+0x3dc) sp = 0xe01e7cc8 fp = 0xe01e7cf0 r4 = 0xdb791000 r5 = 0xe304c700 r6 = 0xe30b4800 r10 = 0x00000008 ether_nh_input() at ether_nh_input+0x3dc pc = 0xc041bb68 lr = 0xc04235bc (netisr_dispatch_src+0x100) sp = 0xe01e7cf8 fp = 0xe01e7d20 r4 = 0x0000017b r5 = 0xe304c700 r6 = 0x00000000 r7 = 0xc0b5a378 r8 = 0x5e4a6f28 r9 = 0xc57f72c0 r10 = 0x00000000 netisr_dispatch_src() at netisr_dispatch_src+0x100 pc = 0xc04235bc lr = 0xc041a808 (ether_input+0xec) sp = 0xe01e7d28 fp = 0xe01e7d60 r4 = 0xdb791000 r5 = 0x00000000 r6 = 0xe304c700 r7 = 0x00000000 r8 = 0x5e4a6f28 r9 = 0xc57f72c0 r10 = 0x00000000 ether_input() at ether_input+0xec pc = 0xc041a808 lr = 0xe0ad410c ($a.10+0xbc) sp = 0xe01e7d68 fp = 0xe01e7d90 r4 = 0xdb791000 r5 = 0xe0f39800 r6 = 0x00000000 r7 = 0xe304c700 r8 = 0xe0ac34d3 r9 = 0xe0f39810 r10 = 0x00000000 $a.10() at $a.10+0xbc pc = 0xe0ad410c lr = 0xc03504dc (taskqueue_run_locked+0xb8) sp = 0xe01e7d98 fp = 0xe01e7de0 r4 = 0xdb737000 r5 = 0xdb737050 r6 = 0xe0f3982c r7 = 0x00000001 r8 = 0x00000001 r9 = 0xc0768ff7 r10 = 0x00000000 taskqueue_run_locked() at taskqueue_run_locked+0xb8 pc = 0xc03504dc lr = 0xc0351560 (taskqueue_thread_loop+0x108) sp = 0xe01e7de8 fp = 0xe01e7e18 r4 = 0x00000000 r5 = 0xdb737000 r6 = 0xdb737040 r7 = 0xc073cb53 r8 = 0xdb737050 r9 = 0x00000100 r10 = 0xc0afde44 taskqueue_thread_loop() at taskqueue_thread_loop+0x108 pc = 0xc0351560 lr = 0xc02a384c (fork_exit+0xa0) sp = 0xe01e7e20 fp = 0xe01e7e38 r4 = 0xe087a7c0 r5 = 0xc0ada560 r6 = 0xc0351458 r7 = 0xe0ae4f94 r8 = 0xe01e7e40 r9 = 0xc0afab7c fork_exit() at fork_exit+0xa0 pc = 0xc02a384c lr = 0xc05ef640 (swi_exit) sp = 0xe01e7e40 fp = 0x00000000 r4 = 0xc0351458 r5 = 0xe0ae4f94 r6 = 0xc0942429 r7 = 0xc72f21d0 r8 = 0xc0ada900 r10 = 0xc0afde44 swi_exit() at swi_exit pc = 0xc05ef640 lr = 0xc05ef640 (swi_exit) sp = 0xe01e7e40 fp = 0x00000000 KDB: enter: panic [ thread pid 0 tid 100261 ] -- You are receiving this mail because: You are the assignee for the bug.