From owner-freebsd-jail@freebsd.org Sun Jan 31 12:27:11 2021 Return-Path: Delivered-To: freebsd-jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 695CF4F36EE for ; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4DT9Ll2NVkz3HdR for ; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 51C144F3472; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) Delivered-To: jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 518484F37CD for ; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DT9Ll1lVXz3HVH for ; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2F1CC340 for ; Sun, 31 Jan 2021 12:27:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 10VCRBmC083609 for ; Sun, 31 Jan 2021 12:27:11 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 10VCRB5t083608 for jail@FreeBSD.org; Sun, 31 Jan 2021 12:27:11 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: jail@FreeBSD.org Subject: [Bug 238326] Kernel crash on jail stop (VIMAGE/VNET) Date: Sun, 31 Jan 2021 12:27:10 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: trashcan@ellael.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: jail@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-jail@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "Discussion about FreeBSD jail\(8\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 31 Jan 2021 12:27:11 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238326 --- Comment #21 from Michael Grimm --- I am experiencing those crashes for a while now, and they continue to happen even after migrating from 12-STABLE to 13-STABLE recently. Note: I did try every recommendation regarding jail shutdown in /etc/jail.c= onf, and whether removing vnet before final shutdown or not, doesen't prevent th= ose random crashes. Here my relevant part of /etc/jail.conf regarding the the panic message following below. ------------- /etc/rc.conf ------------------ # # host dependent global settings # $ip4prefixLOCAL =3D "10.10.10=E2=80=9C; $ip6prefixLOCAL =3D "fd00:e:e:e=E2=80=9C; # # global jail settings # $MTU =3D "mtu 1490"; host.hostname =3D "${name}"; path =3D "/usr/home/jails/${name}"; mount.fstab =3D "/etc/fstab.${name}"; exec.consolelog =3D "/var/log/jail_${name}_console.log"; vnet =3D "new"; vnet.interface =3D "epair${jailID}b"; exec.clean; mount.devfs; persist; # # network settings to apply/destroy during start/stop of every jail # exec.prestart =3D "sleep 2"; exec.prestart +=3D "/sbin/ifconfig epair${jailID} create up ${MTU= }"; exec.prestart +=3D "/sbin/ifconfig bridge0 addm epair${jailID}a"; exec.prestart +=3D "/sbin/ifconfig epair${jailID}a"; exec.start =3D "/sbin/sysctl net.inet6.ip6.dad_count=3D0"; exec.start +=3D "/sbin/ifconfig lo0 127.0.0.1 up"; exec.start +=3D "/sbin/ifconfig epair${jailID}b inet ${ip4_add= r} ${MTU}"; exec.start +=3D "/sbin/ifconfig epair${jailID}b inet6 ${ip6_ad= dr} ${MTU}"; exec.start +=3D "/sbin/route add default -gateway ${ip4prefixLOCAL}.254"; exec.start +=3D "/sbin/route add -inet6 default -gateway ${ip6prefixLOCAL}::254"; exec.stop =3D "/sbin/route del default"; exec.stop +=3D "/sbin/route del -inet6 default"; exec.stop +=3D "/bin/sh /etc/rc.shutdown"; # testing: reported to prevent from crashing (BUT: will crash as well!) #exec.poststop =3D "/sbin/ifconfig epair${jailID}a -vnet ${jailID= }"; exec.poststop +=3D "/sbin/ifconfig epair${jailID}a destroy"; # # individual jail settings # [snip] jail5 { $jailID =3D 5; $ip4_addr =3D ${ip4prefixLOCAL}.5; $ip6_addr =3D ${ip6prefixLOCAL}::5/64; exec.start +=3D "/bin/sh /etc/rc"; } jail6 { $jailID =3D 6; $ip4_addr =3D ${ip4prefixLOCAL}.6; $ip6_addr =3D ${ip6prefixLOCAL}::6/64; exec.start +=3D "/bin/sh /etc/rc"; } ------------- /var/log/messages ------------------- Jan 30 20:02:42 mer-waases kernel: epair5a: link state changed = to DOWN Jan 30 20:02:42 mer-waases kernel: epair5b: link state changed = to DOWN Jan 30 20:02:42 mer-waases kernel: in6_purgeaddr: err=3D65, destination address delete failed Jan 30 20:02:42 mer-waases kernel: Freed UMA keg (rtentry) was = not empty (1 items). Lost 1 pages of memory. Jan 30 20:02:47 mer-waases kernel: epair6a: link state changed = to DOWN Jan 30 20:02:47 mer-waases kernel: epair6b: link state changed = to DOWN Jan 30 20:02:48 mer-waases kernel: in6_purgeaddr: err=3D65, destination address delete failed Jan 30 20:02:48 mer-waases kernel: Freed UMA keg (rtentry) was = not empty (1 items). Lost 1 pages of memory. Jan 30 20:03:33 mer-waases syslogd: restart Jan 30 20:03:33 mer-waases syslogd: kernel boot file is /boot/kernel/kernel Jan 30 20:03:33 mer-waases kernel: Jan 30 20:03:33 mer-waases syslogd: last message repeated 1 tim= es Jan 30 20:03:33 mer-waases kernel: Fatal trap 12: page fault wh= ile in kernel mode Jan 30 20:03:33 mer-waases kernel: cpuid =3D 0; apic id =3D 00 Jan 30 20:03:33 mer-waases kernel: fault virtual address =3D= 0x0 Jan 30 20:03:33 mer-waases kernel: fault code =3D supervisor write data, page not present Jan 30 20:03:33 mer-waases kernel: instruction pointer =3D 0x20:0xffffffff80c668be Jan 30 20:03:33 mer-waases kernel: stack pointer =3D 0x28:0xfffffe000e9e86c0 Jan 30 20:03:33 mer-waases kernel: frame pointer =3D 0x28:0xfffffe000e9e8700 Jan 30 20:03:33 mer-waases kernel: code segment =3D= base 0x0, limit 0xfffff, type 0x1b Jan 30 20:03:33 mer-waases kernel: =3D DPL 0, = pres 1, long 1, def32 0, gran 1 Jan 30 20:03:33 mer-waases kernel: processor eflags =3D interru= pt enabled, resume, IOPL =3D 0 Jan 30 20:03:33 mer-waases kernel: current process =3D= 12 (swi1: netisr 0) Jan 30 20:03:33 mer-waases kernel: trap number =3D= 12 Jan 30 20:03:33 mer-waases kernel: panic: page fault Jan 30 20:03:33 mer-waases kernel: cpuid =3D 0 Jan 30 20:03:33 mer-waases kernel: time =3D 1612033371 Jan 30 20:03:33 mer-waases kernel: KDB: stack backtrace: Jan 30 20:03:33 mer-waases kernel: #0 0xffffffff80c44f65 at kdb_backtrace+0x65 Jan 30 20:03:33 mer-waases kernel: #1 0xffffffff80bf7bf1 at vpanic+0x181 Jan 30 20:03:33 mer-waases kernel: #2 0xffffffff80bf7a63 at panic+0x43 Jan 30 20:03:33 mer-waases kernel: #3 0xffffffff8102b237 at trap_fatal+0x387 Jan 30 20:03:33 mer-waases kernel: #4 0xffffffff8102b28f at trap_pfault+0x4f Jan 30 20:03:33 mer-waases kernel: #5 0xffffffff8102a8ed at trap+0x27d Jan 30 20:03:33 mer-waases kernel: #6 0xffffffff810019e8 at calltrap+0x8 Jan 30 20:03:33 mer-waases kernel: #7 0xffffffff80c914fe at sowakeup+0x1e Jan 30 20:03:33 mer-waases kernel: #8 0xffffffff80dcc0f6 at udp_append+0x236 Jan 30 20:03:33 mer-waases kernel: #9 0xffffffff80dcbc1c at udp_input+0x73c Jan 30 20:03:33 mer-waases kernel: #10 0xffffffff80d9c3c5 at ip_input+0x125 Jan 30 20:03:33 mer-waases kernel: #11 0xffffffff80d2c27a at netisr_dispatch_src+0xca Jan 30 20:03:33 mer-waases kernel: #12 0xffffffff80d10c78 at ether_demux+0x138 Jan 30 20:03:33 mer-waases kernel: #13 0xffffffff80d12011 at ether_nh_input+0x351 Jan 30 20:03:33 mer-waases kernel: #14 0xffffffff80d2c27a at netisr_dispatch_src+0xca Jan 30 20:03:33 mer-waases kernel: #15 0xffffffff80d110c9 at ether_input+0x69 Jan 30 20:03:33 mer-waases kernel: #16 0xffffffff80d2ca1b at swi_net+0x12b Jan 30 20:03:33 mer-waases kernel: #17 0xffffffff80bb8e6d at ithread_loop+0x24d Jan 30 20:03:33 mer-waases kernel: Uptime: 4h47m14s Jan 30 20:03:33 mer-waases kernel: Automatic reboot in 15 secon= ds - press a key on the console to abort Jan 30 20:03:33 mer-waases kernel: Rebooting... Jan 30 20:03:33 mer-waases kernel: ---<>--- HTH, Michael --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-jail@freebsd.org Mon Feb 1 07:59:17 2021 Return-Path: Delivered-To: freebsd-jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3D14B4F4395 for ; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4DTgM914wWz4tLg for ; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 252464F4394; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) Delivered-To: jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 24EDA4F4419 for ; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DTgM90VJrz4tJX for ; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0207317963 for ; Mon, 1 Feb 2021 07:59:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 1117xGkL031450 for ; Mon, 1 Feb 2021 07:59:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 1117xGkj031449 for jail@FreeBSD.org; Mon, 1 Feb 2021 07:59:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: jail@FreeBSD.org Subject: [Bug 238326] Kernel crash on jail stop (VIMAGE/VNET) Date: Mon, 01 Feb 2021 07:59:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zlei.huang@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: jail@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-jail@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "Discussion about FreeBSD jail\(8\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 01 Feb 2021 07:59:17 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238326 --- Comment #22 from Zhenlei Huang --- (In reply to Kyle Evans from comment #20) Steps to reproduce the kernel panic: Host environment: FreeBSD 12.2 Guest fresh install with kernel debug symbols, VMware Fusion 12.1.0, hardware configured with 4 Processor cores and 1G memory, system updated to 12.2-RELEASE-p3. Host and jail's /etc/rc.conf: ------------- rc.conf ------------------ # The jails share this rc.conf, let's disable the syslog service syslogd_enable=3D"NO" #syslogd_flags=3D"-ss" sendmail_enable=3D"NONE" hostname=3D"" ifconfig_em0=3D"DHCP" dumpdev=3D"AUTO" zfs_enable=3D"YES" ---------------------------------------- Host's /etc/jail.conf: ------------ jail.conf ----------------- # template for all test jails # it is convenient to share host's filesystem path =3D "/"; exec.clean; vnet =3D new; vnet.interface =3D "epair${ifnum}b"; exec.prepare =3D "/sbin/ifconfig epair${ifnum} create"; exec.prepare +=3D "/sbin/ifconfig epair${ifnum}a inet 192.168.${ifnum}.1/24= up"; exec.start =3D "/bin/sh /etc/rc"; # I've no ideas why opening and binding a socket would trigger the kernel p= anic more likely :( exec.start +=3D "/usr/sbin/daemon /usr/bin/nc -l 0.0.0.0 9999"; exec.start +=3D "/sbin/ifconfig epair${ifnum}b inet 192.168.${ifnum}.2/24"; exec.start +=3D "/sbin/route add default 192.168.${ifnum}.1"; exec.stop =3D "/bin/sh /etc/rc.shutdown"; exec.poststop +=3D "/sbin/ifconfig epair${ifnum}a destroy"; test1 { $ifnum =3D 10; } # with more jails it seems crash the host more likely test2 { $ifnum =3D 20; } ---------------------------------------- Then repeat stopping and starting jail service, the host crashes about once= in 2 or 3 times. # service jail onestart && service jail onestop ... The kernel panic message: Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 04 fault virtual address =3D 0x410 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80b9f237 stack pointer =3D 0x28:0xfffffe0015b55370 frame pointer =3D 0x28:0xfffffe0015b553f0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 93087 (ifconfig) trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1612193992 KDB: stack backtrace: #0 0xffffffff80c0aa85 at kdb_backtrace+0x65 #1 0xffffffff80bbed3b at vpanic+0x17b #2 0xffffffff80bbebb3 at panic+0x43 #3 0xffffffff8108e911 at trap_fatal+0x391 #4 0xffffffff8108e96f at trap_pfault+0x4f #5 0xffffffff8108dfb6 at trap+0x286 #6 0xffffffff81066938 at calltrap+0x8 #7 0xffffffff80bb9591 at _rm_rlock_hard+0x3c1 #8 0xffffffff80ce5ce6 at rtinit+0x2a6 #9 0xffffffff80d3873e at in_scrubprefix+0x29e #10 0xffffffff80d5001d at rip_ctlinput+0x8d #11 0xffffffff80c4922c at pfctlinput+0x5c #12 0xffffffff80cbb4fa at if_down+0x12a #13 0xffffffff80cb90d0 at if_detach_internal+0x150 #14 0xffffffff80cb8df0 at if_detach+0x50 #15 0xffffffff82b1ebb1 at epair_clone_destroy+0x81 #16 0xffffffff80cc0c4d at if_clone_destroyif+0xdd #17 0xffffffff80cc0b12 at if_clone_destroy+0x1a2 Uptime: 1m22s Dumping 160 out of 982 MB:..10%..20%..30%..40%..50%..60%..70%..80%..90%..10= 0% To be clear, after update to 12.2-RELEASE-p3, it's difficult to crash the h= ost without the below line in jail.conf: exec.start +=3D "/usr/sbin/daemon /usr/bin/nc -l 0.0.0.0 9999"; I'll attach full core text dump later. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-jail@freebsd.org Mon Feb 1 08:04:10 2021 Return-Path: Delivered-To: freebsd-jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BE0F94F4951 for ; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4DTgSp4bFCz4v5m for ; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 9D63B4F49FF; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) Delivered-To: jail@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9D25A4F4950 for ; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DTgSp3sfBz4vGw for ; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7632017D9C for ; Mon, 1 Feb 2021 08:04:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 11184Aj6035363 for ; Mon, 1 Feb 2021 08:04:10 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 11184AAA035362 for jail@FreeBSD.org; Mon, 1 Feb 2021 08:04:10 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: jail@FreeBSD.org Subject: [Bug 238326] Kernel crash on jail stop (VIMAGE/VNET) Date: Mon, 01 Feb 2021 08:04:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zlei.huang@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: jail@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-jail@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "Discussion about FreeBSD jail\(8\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 01 Feb 2021 08:04:10 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238326 --- Comment #23 from Zhenlei Huang --- Created attachment 222062 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D222062&action= =3Dedit Kernel panic core text dump --=20 You are receiving this mail because: You are the assignee for the bug.=