Bug 192272 - Running many nmap processes in parallel results in panic
Summary: Running many nmap processes in parallel results in panic
Status: New
Alias: None
Product: Base System
Classification: Unclassified
Component: kern (show other bugs)
Version: 10.0-STABLE
Hardware: amd64 Any
: --- Affects Many People
Assignee: freebsd-bugs mailing list
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-07-30 12:13 UTC by Trond Davidsen
Modified: 2019-09-24 20:10 UTC (History)
2 users (show)

See Also:


Attachments
/var/crash/core.txt.0 (50.32 KB, text/plain)
2014-07-30 12:13 UTC, Trond Davidsen
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Trond Davidsen 2014-07-30 12:13:34 UTC
Created attachment 145156 [details]
/var/crash/core.txt.0

When running many nmap processes in parallel, the system reboots almost instantly.

Jul 30 13:27:46 dannyl savecore: reboot after panic: sleeping thread

We have tried different generations of Dell PE servers with bxe/bce/em network drivers.  We use the GENERIC kernel.
Comment 1 Ed Maste freebsd_committer 2014-07-30 13:07:30 UTC
from attached core.txt:

panic: sleeping thread

GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "amd64-marcel-freebsd"...

Unread portion of the kernel message buffer:
Sleeping thread (tid 100368, pid 853) owns a non-sleepable lock
KDB: stack backtrace of thread 100368:
#0 0xffffffff808fb5e9 at mi_switch+0x179
#1 0xffffffff809379e2 at sleepq_switch+0x152
#2 0xffffffff80937843 at sleepq_wait+0x43
#3 0xffffffff808faef6 at _sleep+0x366
#4 0xffffffff809b2634 at filt_bpfread+0xe4
#5 0xffffffff808b882a at knote+0xca
#6 0xffffffff809af220 at catchpacket+0x750
#7 0xffffffff809af4e7 at bpf_mtap+0x1e7
#8 0xffffffff80480349 at bce_start_locked+0x769
#9 0xffffffff8047dc5f at bce_start+0x2f
#10 0xffffffff809bb22a at if_transmit+0x10a
#11 0xffffffff809bd005 at ether_output+0x5a5
#12 0xffffffff80a2d7fe at ip_output+0x107e
#13 0xffffffff80a2f090 at rip_output+0x300
#14 0xffffffff8096e8d5 at sosend_generic+0x405
#15 0xffffffff80974cdb at kern_sendit+0x20b
#16 0xffffffff80974fd9 at sendit+0x129
#17 0xffffffff80974e9d at sys_sendto+0x4d
panic: sleeping thread
cpuid = 2
KDB: stack backtrace:
#0 0xffffffff8092b0c0 at kdb_backtrace+0x60
#1 0xffffffff808f2546 at vpanic+0x126
#2 0xffffffff808f25d3 at panic+0x43
#3 0xffffffff8093d5bd at propagate_priority+0x2fd
#4 0xffffffff8093dead at turnstile_wait+0x36d
#5 0xffffffff808ddef6 at __mtx_lock_sleep+0x2b6
#6 0xffffffff808ddb92 at __mtx_lock_flags+0x102
#7 0xffffffff8047dc57 at bce_start+0x27
#8 0xffffffff809bb22a at if_transmit+0x10a
#9 0xffffffff809bd005 at ether_output+0x5a5
#10 0xffffffff80a2d7fe at ip_output+0x107e
#11 0xffffffff80a2f090 at rip_output+0x300
#12 0xffffffff8096e8d5 at sosend_generic+0x405
#13 0xffffffff80974cdb at kern_sendit+0x20b
#14 0xffffffff80974fd9 at sendit+0x129
#15 0xffffffff80974e9d at sys_sendto+0x4d
#16 0xffffffff80cf4e18 at amd64_syscall+0x278
#17 0xffffffff80cd8f2b at Xfast_syscall+0xfb