[Bug 264273] FreeBSD 13 nginx kernel panic probably sendfile
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 264273] FreeBSD 13 nginx kernel panic probably sendfile"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 27 May 2022 08:31:43 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264273 --- Comment #1 from BB Lister <bblister@gmail.com> --- The sysctl net.inet.tcp.tso=0 did not help. Another panic (a bit different) occured, as shown bellow. I reverted the change sysctl net.inet.tcp.tso=1 and I have disabled sendfile now in nginx (sendfile off; in http{} of nginx). The new panic message with net.inet.tcp.tso=0 and senfile enabled is: May 27 11:12:33 arch kernel: Fatal trap 12: page fault while in kernel mode May 27 11:12:33 arch kernel: cpuid = 0; apic id = 00 May 27 11:12:33 arch kernel: fault virtual address = 0x148 May 27 11:12:33 arch kernel: fault code = supervisor read data, page not present May 27 11:12:33 arch kernel: instruction pointer = 0x20:0xffffffff81086c80 May 27 11:12:33 arch kernel: stack pointer = 0x28:0xfffffe0073be2060 May 27 11:12:33 arch kernel: frame pointer = 0x28:0xfffffe0073be2060 May 27 11:12:33 arch kernel: code segment = base 0x0, limit 0xfffff, type 0x1b May 27 11:12:33 arch kernel: = DPL 0, pres 1, long 1, def32 0, gran 1 May 27 11:12:33 arch kernel: processor eflags = interrupt enabled, resume, IOPL = 0 May 27 11:12:33 arch kernel: current process = 12 (swi1: netisr 0) May 27 11:12:33 arch kernel: trap number = 12 May 27 11:12:33 arch kernel: panic: page fault May 27 11:12:33 arch kernel: cpuid = 0 May 27 11:12:33 arch kernel: time = 1653634930 May 27 11:12:33 arch kernel: KDB: stack backtrace: May 27 11:12:33 arch kernel: #0 0xffffffff80c57535 at kdb_backtrace+0x65 May 27 11:12:33 arch kernel: #1 0xffffffff80c09f11 at vpanic+0x181 May 27 11:12:33 arch kernel: #2 0xffffffff80c09d83 at panic+0x43 May 27 11:12:33 arch kernel: #3 0xffffffff8108b1a7 at trap_fatal+0x387 May 27 11:12:33 arch kernel: #4 0xffffffff8108b1ff at trap_pfault+0x4f May 27 11:12:33 arch kernel: #5 0xffffffff8108a85d at trap+0x27d May 27 11:12:33 arch kernel: #6 0xffffffff81061f08 at calltrap+0x8 May 27 11:12:33 arch kernel: #7 0xffffffff80c9c38f at m_pullup+0x1af May 27 11:12:33 arch kernel: #8 0xffffffff821172bf at ipfw_chk+0x3fcf May 27 11:12:33 arch kernel: #9 0xffffffff8211905c at ipfw_check_frame+0x13c May 27 11:12:33 arch kernel: #10 0xffffffff80d422c7 at pfil_run_hooks+0x97 May 27 11:12:33 arch kernel: #11 0xffffffff80d23bf4 at ether_output_frame+0x94 May 27 11:12:33 arch kernel: #12 0xffffffff80d23b08 at ether_output+0x6b8 May 27 11:12:33 arch kernel: #13 0xffffffff80db3ca5 at ip_output_send+0x75 May 27 11:12:33 arch kernel: #14 0xffffffff80db3ac2 at ip_output+0x12b2 May 27 11:12:33 arch kernel: #15 0xffffffff80dc9ab4 at tcp_output+0x1b04 May 27 11:12:33 arch kernel: #16 0xffffffff80dc127b at tcp_do_segment+0x2c9b May 27 11:12:33 arch kernel: #17 0xffffffff80dbd81e at tcp_input+0xabe -- You are receiving this mail because: You are the assignee for the bug.