[Bug 284457] periodic pf panic on busy jailhost
Date: Thu, 30 Jan 2025 06:39:18 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=284457
Bug ID: 284457
Summary: periodic pf panic on busy jailhost
Product: Base System
Version: 13.4-STABLE
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: bugs@FreeBSD.org
Reporter: thomas@gibfest.dk
Hello,
I recently (late december) upgraded a jailhost from 13-STABLE-e6bb702fc to
13-STABLE-11c7eb30cc and since then it has been regularly panicing.
The latest panic can be seen here:
Jan 29 21:06:17 hash1 kernel: Fatal trap 9: general protection fault while in
kernel mode
Jan 29 21:06:17 hash1 kernel: cpuid = 5; apic id = 0a
Jan 29 21:06:17 hash1 kernel: instruction pointer =
0x20:0xffffffff810ae8d0
Jan 29 21:06:17 hash1 kernel: stack pointer =
0x28:0xfffffe0115b6c6e0
Jan 29 21:06:17 hash1 kernel: frame pointer =
0x28:0xfffffe0115b6c6e0
Jan 29 21:06:17 hash1 kernel: code segment = base 0x0, limit
0xfffff, type 0x1b
Jan 29 21:06:17 hash1 kernel: = DPL 0, pres 1, long 1, def32
0, gran 1
Jan 29 21:06:17 hash1 kernel: processor eflags = interrupt enabled, resume,
IOPL = 0
Jan 29 21:06:17 hash1 kernel: current process = 0 (if_io_tqg_5)
Jan 29 21:06:17 hash1 kernel: trap number = 9
Jan 29 21:06:17 hash1 kernel: panic: general protection fault
Jan 29 21:06:17 hash1 kernel: cpuid = 5
Jan 29 21:06:17 hash1 kernel: time = 1738184402
Jan 29 21:06:17 hash1 kernel: KDB: stack backtrace:
Jan 29 21:06:17 hash1 kernel: #0 0xffffffff80c42835 at kdb_backtrace+0x65
Jan 29 21:06:17 hash1 kernel: #1 0xffffffff80bf6182 at vpanic+0x182
Jan 29 21:06:17 hash1 kernel: #2 0xffffffff80bf5ff3 at panic+0x43
Jan 29 21:06:17 hash1 kernel: #3 0xffffffff810b3169 at trap_fatal+0x389
Jan 29 21:06:17 hash1 kernel: #4 0xffffffff8108a968 at calltrap+0x8
Jan 29 21:06:17 hash1 kernel: #5 0xffffffff82f430e0 at pf_find_state+0xb0
Jan 29 21:06:17 hash1 kernel: #6 0xffffffff82f45118 at pf_test_state_tcp+0x1b8
Jan 29 21:06:17 hash1 kernel: #7 0xffffffff82f441f1 at pf_test+0xee1
Jan 29 21:06:17 hash1 kernel: #8 0xffffffff82f63654 at pf_check_in+0x24
Jan 29 21:06:17 hash1 kernel: #9 0xffffffff80d33a36 at pfil_run_hooks+0xc6
Jan 29 21:06:17 hash1 kernel: #10 0xffffffff80dabdaf at ip_input+0x41f
Jan 29 21:06:17 hash1 kernel: #11 0xffffffff80d30c3f at
netisr_dispatch_src+0x9f
Jan 29 21:06:17 hash1 kernel: #12 0xffffffff80d14ae9 at ether_demux+0x159
Jan 29 21:06:17 hash1 kernel: #13 0xffffffff80d15daf at ether_nh_input+0x33f
Jan 29 21:06:17 hash1 kernel: #14 0xffffffff80d30c3f at
netisr_dispatch_src+0x9f
Jan 29 21:06:17 hash1 kernel: #15 0xffffffff80d14e46 at ether_input+0x56
Jan 29 21:06:17 hash1 kernel: #16 0xffffffff80dc2464 at tcp_lro_flush+0x2d4
Jan 29 21:06:17 hash1 kernel: #17 0xffffffff80dc27b3 at tcp_lro_flush_all+0x1b3
Jan 29 21:06:17 hash1 kernel: Timeout initializing vt_vga
The last panic before this was on Jan 20th so about 10 days before. I don't
have a paste of earlier panics but they also mentioned pf. When it happens
again I will update this PR with another backtrace.
The server is a jailhost with a handful of jails, one of which is a busy
webserver with around 20 million hits per day, for the https://ip.tyk.nu
service. So the firewall sees a lot of sessions.
Let me know if I can do or add anything else to help.
Thanks! :)
--
You are receiving this mail because:
You are the assignee for the bug.