Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 May 2022 08:31:43 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 264273] FreeBSD 13 nginx kernel panic probably sendfile
Message-ID:  <bug-264273-227-GvACH6H5pj@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-264273-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-264273-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D264273

--- Comment #1 from BB Lister <bblister@gmail.com> ---
The sysctl net.inet.tcp.tso=3D0  did not help. Another panic (a bit differe=
nt)
occured, as shown bellow.
I reverted the change
sysctl net.inet.tcp.tso=3D1
and I have disabled sendfile now in nginx (sendfile off; in http{} of nginx=
).

The new panic message with  net.inet.tcp.tso=3D0 and senfile enabled is:

May 27 11:12:33 arch kernel: Fatal trap 12: page fault while in kernel mode
May 27 11:12:33 arch kernel: cpuid =3D 0; apic id =3D 00
May 27 11:12:33 arch kernel: fault virtual address      =3D 0x148
May 27 11:12:33 arch kernel: fault code         =3D supervisor read data, p=
age
not present
May 27 11:12:33 arch kernel: instruction pointer        =3D
0x20:0xffffffff81086c80
May 27 11:12:33 arch kernel: stack pointer              =3D
0x28:0xfffffe0073be2060
May 27 11:12:33 arch kernel: frame pointer              =3D
0x28:0xfffffe0073be2060
May 27 11:12:33 arch kernel: code segment               =3D base 0x0, limit
0xfffff, type 0x1b
May 27 11:12:33 arch kernel:                    =3D DPL 0, pres 1, long 1, =
def32
0, gran 1
May 27 11:12:33 arch kernel: processor eflags   =3D interrupt enabled, resu=
me,
IOPL =3D 0
May 27 11:12:33 arch kernel: current process            =3D 12 (swi1: netis=
r 0)
May 27 11:12:33 arch kernel: trap number                =3D 12
May 27 11:12:33 arch kernel: panic: page fault
May 27 11:12:33 arch kernel: cpuid =3D 0
May 27 11:12:33 arch kernel: time =3D 1653634930
May 27 11:12:33 arch kernel: KDB: stack backtrace:
May 27 11:12:33 arch kernel: #0 0xffffffff80c57535 at kdb_backtrace+0x65
May 27 11:12:33 arch kernel: #1 0xffffffff80c09f11 at vpanic+0x181
May 27 11:12:33 arch kernel: #2 0xffffffff80c09d83 at panic+0x43
May 27 11:12:33 arch kernel: #3 0xffffffff8108b1a7 at trap_fatal+0x387
May 27 11:12:33 arch kernel: #4 0xffffffff8108b1ff at trap_pfault+0x4f
May 27 11:12:33 arch kernel: #5 0xffffffff8108a85d at trap+0x27d
May 27 11:12:33 arch kernel: #6 0xffffffff81061f08 at calltrap+0x8
May 27 11:12:33 arch kernel: #7 0xffffffff80c9c38f at m_pullup+0x1af
May 27 11:12:33 arch kernel: #8 0xffffffff821172bf at ipfw_chk+0x3fcf
May 27 11:12:33 arch kernel: #9 0xffffffff8211905c at ipfw_check_frame+0x13c
May 27 11:12:33 arch kernel: #10 0xffffffff80d422c7 at pfil_run_hooks+0x97
May 27 11:12:33 arch kernel: #11 0xffffffff80d23bf4 at ether_output_frame+0=
x94
May 27 11:12:33 arch kernel: #12 0xffffffff80d23b08 at ether_output+0x6b8
May 27 11:12:33 arch kernel: #13 0xffffffff80db3ca5 at ip_output_send+0x75
May 27 11:12:33 arch kernel: #14 0xffffffff80db3ac2 at ip_output+0x12b2
May 27 11:12:33 arch kernel: #15 0xffffffff80dc9ab4 at tcp_output+0x1b04
May 27 11:12:33 arch kernel: #16 0xffffffff80dc127b at tcp_do_segment+0x2c9b
May 27 11:12:33 arch kernel: #17 0xffffffff80dbd81e at tcp_input+0xabe

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-264273-227-GvACH6H5pj>