From owner-freebsd-bugs@freebsd.org Fri Apr 24 11:41:41 2020 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2C6CD2B0694 for ; Fri, 24 Apr 2020 11:41:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 497shP0R8bz4CmW for ; Fri, 24 Apr 2020 11:41:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 0C9D22B0693; Fri, 24 Apr 2020 11:41:41 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0C60B2B0692 for ; Fri, 24 Apr 2020 11:41:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 497shN6fFzz4CmV for ; Fri, 24 Apr 2020 11:41:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DFB771D49D for ; Fri, 24 Apr 2020 11:41:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 03OBfenL072485 for ; Fri, 24 Apr 2020 11:41:40 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 03OBfeHX072484 for bugs@FreeBSD.org; Fri, 24 Apr 2020 11:41:40 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 245870] panic during startup of squid inside jail Date: Fri, 24 Apr 2020 11:41:40 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: freebsd@daemon.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Apr 2020 11:41:41 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D245870 Bug ID: 245870 Summary: panic during startup of squid inside jail Product: Base System Version: 12.1-STABLE Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: freebsd@daemon.de On a newly installed machine, starting squid in a jail leads to kernel pani= c: setfib 0 /usr/bin/env -i 'TERM=3Dscreen' 'HOME=3D/root' 'PATH=3D/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin' /usr/sbin/jail -l -u root -J /var/run/bwproxy1.jid /nfs/bfwproxy1/chroot IBD-SRV2237 172.17.149.32 /usr/local/etc/rc.d/squid start This leads directly to a panic. After reboot, I got this backtrace: root@ibd-srv2237: # kgdb /boot/kernel/kernel /localdisk/vmcore.0 GNU gdb (GDB) 9.1 [GDB v9.1 for FreeBSD] Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.1". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /boot/kernel/kernel... Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug... Unread portion of the kernel message buffer: panic: vm_fault_hold: fault on nofault entry, addr: 0xffffffff826e3000 cpuid =3D 4 time =3D 1587723711 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00005d1= ec0 vpanic() at vpanic+0x19d/frame 0xfffffe00005d1f10 panic() at panic+0x43/frame 0xfffffe00005d1f70 vm_fault_hold() at vm_fault_hold+0x26b9/frame 0xfffffe00005d20c0 vm_fault() at vm_fault+0x60/frame 0xfffffe00005d2100 trap_pfault() at trap_pfault+0x164/frame 0xfffffe00005d2160 trap() at trap+0x29f/frame 0xfffffe00005d2270 calltrap() at calltrap+0x8/frame 0xfffffe00005d2270 --- trap 0xc, rip =3D 0xffffffff826e3000, rsp =3D 0xfffffe00005d2348, rbp = =3D 0xfffffe00005d2380 --- _end() at 0xffffffff826e3000/frame 0xfffffe00005d2380 tcp_do_segment() at tcp_do_segment+0x1685/frame 0xfffffe00005d2470 tcp_input() at tcp_input+0xdc1/frame 0xfffffe00005d25e0 ip_input() at ip_input+0x13b/frame 0xfffffe00005d2690 netisr_dispatch_src() at netisr_dispatch_src+0xcf/frame 0xfffffe00005d26e0 ether_demux() at ether_demux+0x139/frame 0xfffffe00005d2710 ether_nh_input() at ether_nh_input+0x346/frame 0xfffffe00005d2770 netisr_dispatch_src() at netisr_dispatch_src+0xcf/frame 0xfffffe00005d27c0 ether_input() at ether_input+0x4b/frame 0xfffffe00005d27f0 tcp_lro_flush() at tcp_lro_flush+0x228/frame 0xfffffe00005d2810 tcp_lro_rx2() at tcp_lro_rx2+0x627/frame 0xfffffe00005d28b0 iflib_rxeof() at iflib_rxeof+0xa17/frame 0xfffffe00005d29a0 _task_fn_rx() at _task_fn_rx+0x75/frame 0xfffffe00005d29e0 gtaskqueue_run_locked() at gtaskqueue_run_locked+0x144/frame 0xfffffe00005d= 2a40 gtaskqueue_thread_loop() at gtaskqueue_thread_loop+0x98/frame 0xfffffe00005d2a70 fork_exit() at fork_exit+0x83/frame 0xfffffe00005d2ab0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00005d2ab0 --- trap 0, rip =3D 0, rsp =3D 0, rbp =3D 0 --- Uptime: 12m31s Dumping 4570 out of 130908 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%.= .91% __curthread () at /usr/src/sys/amd64/include/pcpu.h:234 234 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (OFFSETOF_CURTHREAD)); (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu.h:234 #1 doadump (textdump=3D1) at /usr/src/sys/kern/kern_shutdown.c:371 #2 0xffffffff80c508bd in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:451 #3 0xffffffff80c50d49 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:877 #4 0xffffffff80c50b43 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:804 #5 0xffffffff8101d649 in vm_fault_hold (map=3D0xfffff81080000000, vaddr=3D, fault_type=3D4 '\004', fault_flags=3D, m_hold=3D0x0) at /usr/src/sys/vm/vm_fault.c:614 #6 0xffffffff8101af40 in vm_fault (map=3D0xfffff81080000000, vaddr=3D, fault_type=3D4 '\004', fault_flags=3D0) at /usr/src/sys/vm/vm_fault.c= :562 #7 0xffffffff811bc5f4 in trap_pfault (frame=3D0xfffffe00005d2280, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:846 #8 0xffffffff811bbacf in trap (frame=3D0xfffffe00005d2280) at /usr/src/sys/amd64/amd64/trap.c:443 #9 #10 0xffffffff826e3000 in ?? () #11 0xffffffff80cf1ebc in soisconnected (so=3D0xfffff8108ede7368) at /usr/src/sys/kern/uipc_socket.c:3775 #12 0xffffffff80e82a05 in tcp_do_segment (m=3D0xfffff81082086500, th=3D0xfffff8108208657a, so=3D0xfffff8108ede7368, tp=3D0xfffff801f23f1000, drop_hdrlen=3D52, tlen=3D, iptos=3D0 '\000') at /usr/src/sys/netinet/tcp_input.c:2414 #13 0xffffffff80e80771 in tcp_input (mp=3D, offp=3D, proto=3D) at /usr/src/sys/netinet/tcp_input.c:1395 #14 0xffffffff80df976b in ip_input (m=3D0x0) at /usr/src/sys/netinet/ip_input.c:828 #15 0xffffffff80d85f6f in netisr_dispatch_src (proto=3D1, source=3D, m=3D0x0) at /usr/src/sys/net/netisr.c:1122 #16 0xffffffff80d63669 in ether_demux (ifp=3D0xfffff810822e3000, m=3D0x0) at /usr/src/sys/net/if_ethersubr.c:879 #17 0xffffffff80d648e6 in ether_input_internal (ifp=3D0xfffff810822e3000, m= =3D0x0) at /usr/src/sys/net/if_ethersubr.c:667 #18 ether_nh_input (m=3D) at /usr/src/sys/net/if_ethersubr.c= :697 #19 0xffffffff80d85f6f in netisr_dispatch_src (proto=3D5, source=3D, m=3D0x0) at /usr/src/sys/net/netisr.c:1122 #20 0xffffffff80d63a7b in ether_input (ifp=3D0xfffff810822e3000, m=3D0x0) at /usr/src/sys/net/if_ethersubr.c:787 #21 0xffffffff80e89418 in tcp_lro_flush (lc=3D0xfffffe00042615a8, le=3D0xfffffe00face13f0) at /usr/src/sys/netinet/tcp_lro.c:397 #22 0xffffffff80e89e37 in tcp_lro_rx2 (lc=3D, m=3D, csum=3D, use_hash=3D) at /usr/src/sys/netinet/tcp_lro.c:100 #23 0xffffffff80d826e7 in iflib_rxeof (rxq=3D, budget=3D) at /usr/src/sys/net/iflib.c:2829 #24 0xffffffff80d7cb95 in _task_fn_rx (context=3D0xfffffe0004261580) at /usr/src/sys/net/iflib.c:3775 #25 0xffffffff80c9c854 in gtaskqueue_run_locked (queue=3D0xfffff81080130e00= ) at /usr/src/sys/kern/subr_gtaskqueue.c:378 #26 0xffffffff80c9c4b8 in gtaskqueue_thread_loop (arg=3D) at /usr/src/sys/kern/subr_gtaskqueue.c:559 #27 0xffffffff80c0fe13 in fork_exit (callout=3D0xffffffff80c9c420 , arg=3D0xfffffe00043f7068, frame=3D0xfffffe00005d2= ac0) at /usr/src/sys/kern/kern_fork.c:1065 #28 Kernel is: root@ibd-srv2237: # uname -a FreeBSD IBD-SRV2237 12.1-RELEASE-p1 FreeBSD 12.1-RELEASE-p1 #0 r356505M: Mon Apr 6 11:11:18 CEST 2020 root@build11:/usr/obj/usr/src/amd64.amd64/sys= /M2=20 amd64 Sometimes squids start successfully but the first packet arriving on :3128 leads to the same panic, but most of the time just the startup causes it. --=20 You are receiving this mail because: You are the assignee for the bug.=