From owner-freebsd-jail@freebsd.org Sun Jul 16 14:33:19 2017 Return-Path: Delivered-To: freebsd-jail@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 49786C08540 for ; Sun, 16 Jul 2017 14:33:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 273A57F846 for ; Sun, 16 Jul 2017 14:33:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v6GEXIjx021920 for ; Sun, 16 Jul 2017 14:33:19 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-jail@FreeBSD.org Subject: [Bug 213896] when starting vimage jails the kernel crashes Date: Sun, 16 Jul 2017 14:33:18 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: heinz@project-fifo.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-jail@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-jail@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Discussion about FreeBSD jail\(8\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Jul 2017 14:33:19 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D213896 Heinz N. Gies changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |heinz@project-fifo.net --- Comment #6 from Heinz N. Gies --- I'm having the same problem and can reliably reproduce it. I noticed it when testing vmadm (https://github.com/project-fifo/r-vmadm) a= nd starting and stopping a jail a few times. The basic steps for start are: rctl -a jail:d0f4fea3-e368-4346-b44c-50cfbcffa287:memoryuse:deny=3D1024M jail:d0f4fea3-e368-4346-b44c-50cfbcffa287:memorylocked:deny=3D1024M jail:d0f4fea3-e368-4346-b44c-50cfbcffa287:shmsize:deny=3D1024M jail:d0f4fea3-e368-4346-b44c-50cfbcffa287:pcpu:deny=3D100 jail:d0f4fea3-e368-4346-b44c-50cfbcffa287:maxproc:deny=3D2000 mount -t devfs devfs /zroot/jails/d0f4fea3-e368-4346-b44c-50cfbcffa287/root/dev mount -t devfs devfs /zroot/jails/d0f4fea3-e368-4346-b44c-50cfbcffa287/root/jail/dev jail -i -c persist name=3Dd0f4fea3-e368-4346-b44c-50cfbcffa287 path=3D/zroot/jails/d0f4fea3-e368-4346-b44c-50cfbcffa287/root host.hostuuid=3Dd0f4fea3-e368-4346-b44c-50cfbcffa287 host.hostname=3Dtest devfs_ruleset=3D4 securelevel=3D2 sysvmsg=3Dnew sysvsem=3Dnew sysvshm=3Dnew allow.raw_sockets children.max=3D1 vnet=3Dnew vnet.interface=3Depair0b exec.start=3D"/sbin/ifconfig epair0b name net0p; /sbin/ifconfig net0p.5 cre= ate vlan 5 vlandev net0p; /sbin/ifconfig net0p.5 name net0; /sbin/ifconfig net0 inet 192.168.1.234 255.255.255.0; /sbin/route add default -gateway 192.168.= 1.1; /sbin/ifconfig lo0 127.0.0.1 up; jail -c persist name=3Dd0f4fea3-e368-4346-b44c-50cfbcffa287 host.hostname=3Dtest path=3D/ja= il ip4=3Dinherit devfs_ruleset=3D4 securelevel=3D2 sysvmsg=3Dnew sysvsem=3Dnew= sysvshm=3Dnew allow.raw_sockets exec.start=3D'sh /etc/rc'" ifconfig epair0a name j1:net0 and destroying the jail the same way in reverse (stop, unmount, remove rctl entries dstrouy j1:net0) kernel is FreeBSD fifo-bsd 11.0-RELEASE-p1 with=20 which is the standard kenrel config plus nooptions SCTP # Stream Control Transmission Protocol options VIMAGE # VNET/Vimage support options RACCT # Resource containers options RCTL # same as above I've uploaded the kernel dump here https://www.dropbox.com/s/73mb8e64cb7zwbe/crash.tar.xz?dl=3D0 (it's too big= to attach) --=20 You are receiving this mail because: You are the assignee for the bug.=