Re: sysctl -a panic on VIMAGE kernels

From: Patrick Kelsey <pkelsey_at_freebsd.org>
Date: Sun, 9 Aug 2015 22:18:20 -0400
On Sun, Aug 9, 2015 at 6:36 AM, Gleb Smirnoff <glebius_at_freebsd.org> wrote:

> On Sun, Aug 09, 2015 at 12:28:22PM +0200, Kristof Provost wrote:
> K> Hi,
> K>
> K> I’ve run into a reproducible panic on a VIMAGE kernel with ‘sysctl -a’.
> K>
> K> Relevant backtrace bits:
> K> #8  0xffffffff80e7dd28 in trap (frame=0xfffffe01f16b26a0)
> K>     at /usr/src/sys/amd64/amd64/trap.c:426
> K> #9  0xffffffff80e5e6a2 in calltrap ()
> K>     at /usr/src/sys/amd64/amd64/exception.S:235
> K> #10 0xffffffff80cea67d in uma_zone_get_cur (zone=0x0)
> K>     at /usr/src/sys/vm/uma_core.c:3006
> K> #11 0xffffffff80cec029 in sysctl_handle_uma_zone_cur (
> K>     oidp=0xffffffff818a7c90, arg1=0xfffffe00010c0438, arg2=0,
> K>     req=0xfffffe01f16b2868) at /usr/src/sys/vm/uma_core.c:3580
> K> #12 0xffffffff80a28614 in sysctl_root_handler_locked
> (oid=0xffffffff818a7c90,
> K>     arg1=0xfffffe00010c0438, arg2=0, req=0xfffffe01f16b2868)
> K>     at /usr/src/sys/kern/kern_sysctl.c:183
> K> #13 0xffffffff80a27d70 in sysctl_root (arg1=<value optimized out>,
> K>     arg2=<value optimized out>) at /usr/src/sys/kern/kern_sysctl.c:1694
> K> #14 0xffffffff80a28372 in userland_sysctl (td=0x0,
> name=0xfffffe01f16b2930,
> K>     namelen=<value optimized out>, old=<value optimized out>,
> K>     oldlenp=<value optimized out>, inkernel=<value optimized out>,
> K>     new=<value optimized out>, newlen=<value optimized out>,
> K>     retval=<value optimized out>, flags=0)
> K>     at /usr/src/sys/kern/kern_sysctl.c:1798
> K> #15 0xffffffff80a28144 in sys___sysctl (td=0xfffff8000b1e49a0,
> K>     uap=0xfffffe01f16b2a40) at /usr/src/sys/kern/kern_sysctl.c:1724
> K>
> K> In essence, what happens is that we end up in
> sysctl_handle_uma_zone_cur() and arg1 is a pointer to NULL,
> K> so we call uma_zone_get_cur(zone); with zone == NULL.
> K>
> K> There’s been a bit of churn around tcp_reass_zone, and I think the
> latest version is wrong.
> K> It marks the sysctl as CTLFLAG_VNET, but the exposed variable is not
> VNET_DEFINE().
> K>
> K> The following fixes it for me:
> K>
> K> diff --git a/sys/netinet/tcp_reass.c b/sys/netinet/tcp_reass.c
> K> index 77d8940..3913ef3 100644
> K> --- a/sys/netinet/tcp_reass.c
> K> +++ b/sys/netinet/tcp_reass.c
> K> _at__at_ -84,7 +84,7 _at__at_ SYSCTL_INT(_net_inet_tcp_reass, OID_AUTO,
> maxsegments, CTLFLAG_RDTUN,
> K>      "Global maximum number of TCP Segments in Reassembly Queue");
> K>
> K>  static uma_zone_t tcp_reass_zone;
> K> -SYSCTL_UMA_CUR(_net_inet_tcp_reass, OID_AUTO, cursegments,
> CTLFLAG_VNET,
> K> +SYSCTL_UMA_CUR(_net_inet_tcp_reass, OID_AUTO, cursegments, 0,
> K>      &tcp_reass_zone,
> K>      "Global number of TCP Segments currently in Reassembly Queue”);
>
> Right, if a variable isn't virtualized, the CTLFLAG_VNET must be removed.
>
> Patrick, how is your progress wuth improved reassembly?
>

Kristof, thanks for committing this patch.

Gleb, I expect to have a tcp reassembly patch up for review at some point
this week.

-Patrick
Received on Mon Aug 10 2015 - 00:18:21 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:59 UTC