[Bug 264273] FreeBSD 13 nginx kernel panic probably sendfile

From: <bugzilla-noreply_at_freebsd.org>
Date: Fri, 27 May 2022 08:31:43 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264273

--- Comment #1 from BB Lister <bblister@gmail.com> ---
The sysctl net.inet.tcp.tso=0  did not help. Another panic (a bit different)
occured, as shown bellow.
I reverted the change
sysctl net.inet.tcp.tso=1
and I have disabled sendfile now in nginx (sendfile off; in http{} of nginx).

The new panic message with  net.inet.tcp.tso=0 and senfile enabled is:

May 27 11:12:33 arch kernel: Fatal trap 12: page fault while in kernel mode
May 27 11:12:33 arch kernel: cpuid = 0; apic id = 00
May 27 11:12:33 arch kernel: fault virtual address      = 0x148
May 27 11:12:33 arch kernel: fault code         = supervisor read data, page
not present
May 27 11:12:33 arch kernel: instruction pointer        =
0x20:0xffffffff81086c80
May 27 11:12:33 arch kernel: stack pointer              =
0x28:0xfffffe0073be2060
May 27 11:12:33 arch kernel: frame pointer              =
0x28:0xfffffe0073be2060
May 27 11:12:33 arch kernel: code segment               = base 0x0, limit
0xfffff, type 0x1b
May 27 11:12:33 arch kernel:                    = DPL 0, pres 1, long 1, def32
0, gran 1
May 27 11:12:33 arch kernel: processor eflags   = interrupt enabled, resume,
IOPL = 0
May 27 11:12:33 arch kernel: current process            = 12 (swi1: netisr 0)
May 27 11:12:33 arch kernel: trap number                = 12
May 27 11:12:33 arch kernel: panic: page fault
May 27 11:12:33 arch kernel: cpuid = 0
May 27 11:12:33 arch kernel: time = 1653634930
May 27 11:12:33 arch kernel: KDB: stack backtrace:
May 27 11:12:33 arch kernel: #0 0xffffffff80c57535 at kdb_backtrace+0x65
May 27 11:12:33 arch kernel: #1 0xffffffff80c09f11 at vpanic+0x181
May 27 11:12:33 arch kernel: #2 0xffffffff80c09d83 at panic+0x43
May 27 11:12:33 arch kernel: #3 0xffffffff8108b1a7 at trap_fatal+0x387
May 27 11:12:33 arch kernel: #4 0xffffffff8108b1ff at trap_pfault+0x4f
May 27 11:12:33 arch kernel: #5 0xffffffff8108a85d at trap+0x27d
May 27 11:12:33 arch kernel: #6 0xffffffff81061f08 at calltrap+0x8
May 27 11:12:33 arch kernel: #7 0xffffffff80c9c38f at m_pullup+0x1af
May 27 11:12:33 arch kernel: #8 0xffffffff821172bf at ipfw_chk+0x3fcf
May 27 11:12:33 arch kernel: #9 0xffffffff8211905c at ipfw_check_frame+0x13c
May 27 11:12:33 arch kernel: #10 0xffffffff80d422c7 at pfil_run_hooks+0x97
May 27 11:12:33 arch kernel: #11 0xffffffff80d23bf4 at ether_output_frame+0x94
May 27 11:12:33 arch kernel: #12 0xffffffff80d23b08 at ether_output+0x6b8
May 27 11:12:33 arch kernel: #13 0xffffffff80db3ca5 at ip_output_send+0x75
May 27 11:12:33 arch kernel: #14 0xffffffff80db3ac2 at ip_output+0x12b2
May 27 11:12:33 arch kernel: #15 0xffffffff80dc9ab4 at tcp_output+0x1b04
May 27 11:12:33 arch kernel: #16 0xffffffff80dc127b at tcp_do_segment+0x2c9b
May 27 11:12:33 arch kernel: #17 0xffffffff80dbd81e at tcp_input+0xabe

-- 
You are receiving this mail because:
You are the assignee for the bug.