From nobody Fri Apr 14 15:18:44 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Pyg843xxXz45Rbx for ; Fri, 14 Apr 2023 15:18:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Pyg842QBKz3lvr for ; Fri, 14 Apr 2023 15:18:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1681485524; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=JMIDp8QgC8Ea48kd33Cb5609vVxJtdAQwP5L7Z4peIA=; b=xEZbzqRSO39z1tX5HdsOEbWzaYz3JLYmsFmZZ8qtLf3tf/omVcy+jilrAAQZQkf60lfo0y v2ec+p8NmAeuaBCiRw+5a1Kefi4WmC2e5zu0KPOMaBkQ5QlZZABel1D6z84FFWBHJeqD4R mnMr85lFiqD9o13ue3f0ySlU3Toi+rNn/3I3SmpmWptKD6PqqGZd8E+3ytIiXNdnZOrGR3 mvf57Rjx1Vux1J1PtnMctwcLx84/yl3zom0LcAisQAReCT+07wEUI1smIfsSkLNAdsZUVG Q9kvOV9+Xu2x2MBkxs/cjBn4tGurJPDjlq0VQsa+wmr2pY17bhDtf7y/TQyl7A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1681485524; a=rsa-sha256; cv=none; b=HBEyH+IqF1iEuYOnm/fYvRSXWkaslmFxiFDa2TISAG+KuqjmM1p5gZGljX8HwyXL2rrGgd FFmIOcgZYv4o764P6Z+JdbJsm9f4tL4xwiCnq78+KQc4FTFdeVYhLEUCfJ5ZqQNA6cfVVF oASV8G0xYjXTeJtEZ8FvIMfsBiwtnrLsmd9rWuee8qdTjMWr9Q5bkiD4uKkRq6SgAm6M1Y JmSmDIiuu1DGWauAUH4ZU/QOjvrfp94QhGFAF78umhg7aEe7v6vZh0qfck3m918xvk83KH 1j6vLe60gQoJ0ER68MBroKxhVXZoFZAPxoR9ushX84TxtAnPxus5l5OJqG7d3A== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Pyg841WxpzVGd for ; Fri, 14 Apr 2023 15:18:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 33EFIiD8042943 for ; Fri, 14 Apr 2023 15:18:44 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 33EFIiNW042942 for bugs@FreeBSD.org; Fri, 14 Apr 2023 15:18:44 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 270841] fstat causes kernel panic with nullfs mount from NFS Date: Fri, 14 Apr 2023 15:18:44 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: henry.hu.sh@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270841 Bug ID: 270841 Summary: fstat causes kernel panic with nullfs mount from NFS Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: henry.hu.sh@gmail.com So my setup is like this: /mnt/nashome - NFS mount /mnt/nashome/doc -> $HOME/doc - nullfs mount I'm running a fairly recent head (1400083). I can try a newer one if needed. It seems like that I can always hit a kernel panic when I try to run lsof or fstat. If I remove all the nullfs mounts from NFS, there's no panic. Most kernel dumps seem to be garbage, but I got one which is kind of okay: Reading symbols from /usr/obj/usr/src/amd64.amd64/sys/MYKERNEL/kernel.full.= .. Unread portion of the kernel message buffer: Fatal double fault rip 0xffffffff888575e8 rsp 0xfffffe017d504fd0 rbp 0xfffffe017d505020 rax 0xfffff8011ca70800 rdx 0xffffffff888a2fe5 rbx 0xfffff8010b70f000 rcx 0 rsi 0xfffffe0152774000 rdi 0xfffff8011ca73600 r8 0xe r9 0x1 r10 0xfffff8011c7856b0 r11 0 r12 0 r13 0x32 r14 0xfffffe017bbd0e40 r15 0 rflags 0x10282 cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b fsbase 0x4d74bced120 gsbase 0xffffffff83016000 kgsbase 0 cpuid =3D 6; apic id =3D 18 panic: double fault cpuid =3D 6 time =3D 1681482613 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0039268= da0 vpanic() at vpanic+0x185/frame 0xfffffe0039268e00 panic() at panic+0x43/frame 0xfffffe0039268e60 dblfault_handler() at dblfault_handler+0x1ce/frame 0xfffffe0039268f20 Xdblfault() at Xdblfault+0xd7/frame 0xfffffe0039268f20 --- trap 0x17, rip =3D 0xffffffff888575e8, rsp =3D 0xfffffe017d504fd0, rbp = =3D 0xfffffe017d505020 --- re_8125_pad() at re_8125_pad+0x28/frame 0xfffffe017d505020 re_start() at re_start+0x3e7/frame 0xfffffe017d5070d0 if_transmit_default() at if_transmit_default+0xf5/frame 0xfffffe017d507120 ether_output_frame() at ether_output_frame+0xa3/frame 0xfffffe017d507150 ether_output() at ether_output+0x6bd/frame 0xfffffe017d5071d0 ip_output_send() at ip_output_send+0xa4/frame 0xfffffe017d507200 ip_output() at ip_output+0x1222/frame 0xfffffe017d507310 tcp_default_output() at tcp_default_output+0x1f60/frame 0xfffffe017d5074f0 tcp_usr_send() at tcp_usr_send+0x27b/frame 0xfffffe017d5075a0 sosend_generic() at sosend_generic+0x605/frame 0xfffffe017d507670 sosend() at sosend+0x3b/frame 0xfffffe017d5076a0 clnt_vc_call() at clnt_vc_call+0x511/frame 0xfffffe017d507800 clnt_reconnect_call() at clnt_reconnect_call+0x2e8/frame 0xfffffe017d5078c0 newnfs_request() at newnfs_request+0xa96/frame 0xfffffe017d507a70 nfscl_request() at nfscl_request+0x54/frame 0xfffffe017d507ac0 nfsrpc_accessrpc() at nfsrpc_accessrpc+0x11a/frame 0xfffffe017d507c60 nfs34_access_otw() at nfs34_access_otw+0x43/frame 0xfffffe017d507d90 nfs_access() at nfs_access+0x3d5/frame 0xfffffe017d507e20 vop_sigdefer() at vop_sigdefer+0x2b/frame 0xfffffe017d507e50 vn_dir_check_exec() at vn_dir_check_exec+0x4e/frame 0xfffffe017d507e90 nfs_lookup() at nfs_lookup+0x127/frame 0xfffffe017d5081b0 vop_sigdefer() at vop_sigdefer+0x2b/frame 0xfffffe017d5081e0 vfs_lookup() at vfs_lookup+0x44c/frame 0xfffffe017d508280 namei() at namei+0x1ff/frame 0xfffffe017d508300 vn_open_cred() at vn_open_cred+0x565/frame 0xfffffe017d508460 vop_stdvptocnp() at vop_stdvptocnp+0x1b4/frame 0xfffffe017d508710 vop_sigdefer() at vop_sigdefer+0x2b/frame 0xfffffe017d508740 vn_vptocnp() at vn_vptocnp+0x199/frame 0xfffffe017d5087b0 null_vptocnp() at null_vptocnp+0xb9/frame 0xfffffe017d508810 vn_vptocnp() at vn_vptocnp+0x199/frame 0xfffffe017d508880 vn_fullpath_dir() at vn_fullpath_dir+0xf9/frame 0xfffffe017d5088f0 vn_fullpath_any() at vn_fullpath_any+0x55/frame 0xfffffe017d508930 vn_fullpath() at vn_fullpath+0xd2/frame 0xfffffe017d508980 vn_fill_kinfo_vnode() at vn_fill_kinfo_vnode+0x42/frame 0xfffffe017d508a90 vn_fill_kinfo() at vn_fill_kinfo+0x45/frame 0xfffffe017d508ac0 kern_proc_filedesc_out() at kern_proc_filedesc_out+0x4b8/frame 0xfffffe017d508b50 sysctl_kern_proc_filedesc() at sysctl_kern_proc_filedesc+0x8c/frame 0xfffffe017d508bd0 sysctl_root_handler_locked() at sysctl_root_handler_locked+0x90/frame 0xfffffe017d508c20 sysctl_root() at sysctl_root+0x28a/frame 0xfffffe017d508ca0 userland_sysctl() at userland_sysctl+0x17e/frame 0xfffffe017d508d50 sys___sysctl() at sys___sysctl+0x5c/frame 0xfffffe017d508e00 amd64_syscall() at amd64_syscall+0x11a/frame 0xfffffe017d508f30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe017d508f30 --- syscall (202, FreeBSD ELF64, __sysctl), rip =3D 0x4d74d32178a, rsp =3D 0x4d74b8c0a68, rbp =3D 0x4d74b8c0aa0 --- Uptime: 1m42s Dumping 2044 out of 32486 MB: (CTRL-C to abort) ..1% (CTRL-C to abort) ..11% (CTRL-C to abort) (CTRL-C to abort) ..21%..31%..41%..51%..61%..71%..81%..9= 1% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:59 59 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (offsetof(stru= ct pcpu, (kgdb) where #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:59 #1 dump_savectx () at /usr/src/sys/kern/kern_shutdown.c:403 #2 0xffffffff807a64b8 in dumpsys (di=3D0x0) at /usr/src/sys/x86/include/dump.h:87 #3 doadump (textdump=3D1) at /usr/src/sys/kern/kern_shutdown.c:432 #4 kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:539 #5 0xffffffff807a6a23 in vpanic (fmt=3D0xffffffff80bc0f3f "double fault", ap=3D0xfffffe0039268e40) at /usr/src/sys/kern/kern_shutdown.c:983 #6 0xffffffff807a6823 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:907 #7 0xffffffff80b6d83e in dblfault_handler (frame=3D) at /usr/src/sys/amd64/amd64/trap.c:1014 #8 #9 0xffffffff888575e8 in ?? () from /boot/modules/if_re.ko Backtrace stopped: Cannot access memory at address 0xfffffe017d504fd0 (kgdb) It seems like that the stack is corrupted. --=20 You are receiving this mail because: You are the assignee for the bug.=