containers / podman

Podman: A tool for managing OCI containers and pods.
https://podman.io
Apache License 2.0
23.13k stars 2.36k forks source link

gvproxy process exited after a while #22053

Open benoitf opened 6 months ago

benoitf commented 6 months ago

Issue Description

hello,

my podman machine was working fine for several days in a row this morning it looks like it's no longer responding

podman machine ls says that the machine is running

NAME                     VM TYPE     CREATED     LAST UP            CPUS        MEMORY      DISK SIZE
podman-machine-default*  applehv     6 days ago  Currently running  6           2GiB        100GiB

or with JSON format

podman machine ls --format=json                                                                                                                                                                                                    [
    {
        "Name": "podman-machine-default",
        "Default": true,
        "Created": "2024-03-08T20:10:29.552074+01:00",
        "Running": true,
        "Starting": false,
        "LastUp": "2024-03-10T20:55:33.85675+01:00",
        "Stream": "default",
        "VMType": "applehv",
        "CPUs": 6,
        "Memory": "2147483648",
        "DiskSize": "107374182400",
        "Port": 50650,
        "RemoteUsername": "core",
        "IdentityPath": "/Users/benoitf/.local/share/containers/podman/machine/machine",
        "UserModeNetworking": true
    }
]%

and I have the vfkit process running

benoitf          77589   0.1  0.1 413894432  59408 s009  S    Sun08PM  16:15.24 /opt/podman/bin/vfkit --cpus 6 --memory 2048 --bootloader efi,variable-store=/Users/benoitf/.local/share/containers/podman/machine/applehv/efi-bl-podman-machine-default,create --device virtio-blk,path=/Users/benoitf/.local/share/containers/podman/machine/applehv/podman-machine-default-arm64.raw --device virtio-rng --device virtio-serial,logFilePath=/var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default.log --device virtio-vsock,port=1025,socketURL=/var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default.sock,listen --device virtio-net,unixSocketPath=/var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock,mac=5a:94:ef:e4:0c:ee --device virtio-fs,sharedDir=/Users,mountTag=Users --device virtio-fs,sharedDir=/private,mountTag=private --device virtio-fs,sharedDir=/var/folders,mountTag=var-folders --restful-uri tcp://localhost:50691 --device virtio-gpu,width=800,height=600 --device virtio-input,pointing --device virtio-input,keyboard --gui

but gvproxy process is gone

Steps to reproduce the issue

I don't have really steps to reproduce :-/

I'm using --log-level=DEBUG to start the machine (to have the GUI being opened in case I'm losing connection to the machine)

Describe the results you received

gvproxy is no longer there

Describe the results you expected

gvproxy process still there

podman info output

podman 5 RC6

Podman in a container

No

Privileged Or Rootless

None

Upstream Latest Release

Yes

Additional environment details

Additional environment details

Additional information

Here is the last lines of the content of the gvproxy.log file

time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 198 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..184..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..164..] Version=4 IHL=5 TOS=0 Length=184 Id=13194 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51041 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..132..] SrcPort=17915 DstPort=22(ssh) Seq=1581379690 Ack=2440878007 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=63227 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195777/735472998 0x529fab412bd66d66)] Padding=[]}\n- Layer 4 (132 bytes) = Payload\t132 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 182 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..168..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..148..] Version=4 IHL=5 TOS=0 Length=168 Id=13195 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51056 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..116..] SrcPort=17915 DstPort=22(ssh) Seq=1581379822 Ack=2440878007 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=8372 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195778/735472998 0x529fab422bd66d66)] Padding=[]}\n- Layer 4 (116 bytes) = Payload\t116 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:ee DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=9057 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=38926 SrcIP=192.168.127.2 DstIP=192.168.127.1 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=22(ssh) DstPort=17915 Seq=2440878007 Ack=1581379938 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=2285 Checksum=22642 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:735473000/1386195777 0x2bd66d68529fab41)] Padding=[]}\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 118 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..104..] SrcMAC=5a:94:ef:e4:0c:ee DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..84..] Version=4 IHL=5 TOS=0 Length=104 Id=9058 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=38873 SrcIP=192.168.127.2 DstIP=192.168.127.1 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..52..] SrcPort=22(ssh) DstPort=17915 Seq=2440878007 Ack=1581379938 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=2285 Checksum=34234 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:735473000/1386195777 0x2bd66d68529fab41)] Padding=[]}\n- Layer 4 (52 bytes) = Payload\t52 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=13196 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51171 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=17915 DstPort=22(ssh) Seq=1581379938 Ack=2440878059 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=16383 Checksum=8490 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195779/735473000 0x529fab432bd66d68)] Padding=[]}\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 182 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..168..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..148..] Version=4 IHL=5 TOS=0 Length=168 Id=13197 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51054 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..116..] SrcPort=17915 DstPort=22(ssh) Seq=1581379938 Ack=2440878059 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=25103 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195781/735473000 0x529fab452bd66d68)] Padding=[]}\n- Layer 4 (116 bytes) = Payload\t116 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 198 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..184..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..164..] Version=4 IHL=5 TOS=0 Length=184 Id=13198 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51037 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..132..] SrcPort=17915 DstPort=22(ssh) Seq=1581380054 Ack=2440878059 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=40810 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195781/735473000 0x529fab452bd66d68)] Padding=[]}\n- Layer 4 (132 bytes) = Payload\t132 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:ee DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=9059 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=38924 SrcIP=192.168.127.2 DstIP=192.168.127.1 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=22(ssh) DstPort=17915 Seq=2440878059 Ack=1581380186 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=2285 Checksum=22335 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:735473003/1386195781 0x2bd66d6b529fab45)] Padding=[]}\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 118 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..104..] SrcMAC=5a:94:ef:e4:0c:ee DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..84..] Version=4 IHL=5 TOS=0 Length=104 Id=9060 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=38871 SrcIP=192.168.127.2 DstIP=192.168.127.1 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..52..] SrcPort=22(ssh) DstPort=17915 Seq=2440878059 Ack=1581380186 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=2285 Checksum=60804 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:735473003/1386195781 0x2bd66d6b529fab45)] Padding=[]}\n- Layer 4 (52 bytes) = Payload\t52 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=13199 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51168 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=17915 DstPort=22(ssh) Seq=1581380186 Ack=2440878111 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=16383 Checksum=8184 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195782/735473003 0x529fab462bd66d6b)] Padding=[]}\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 182 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..168..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..148..] Version=4 IHL=5 TOS=0 Length=168 Id=13200 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51051 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..116..] SrcPort=17915 DstPort=22(ssh) Seq=1581380186 Ack=2440878111 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=24717 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195782/735473003 0x529fab462bd66d6b)] Padding=[]}\n- Layer 4 (116 bytes) = Payload\t116 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 198 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..184..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..164..] Version=4 IHL=5 TOS=0 Length=184 Id=13201 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51034 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..132..] SrcPort=17915 DstPort=22(ssh) Seq=1581380302 Ack=2440878111 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=24567 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195782/735473003 0x529fab462bd66d6b)] Padding=[]}\n- Layer 4 (132 bytes) = Payload\t132 byte(s)\n"
time="2024-03-14T20:55:23+01:00" level=error msg="cannot receive packets from /Users/benoitf/Library/Application Support/vfkit/net-77589-104881704.sock, disconnecting: cannot read size from socket: read unixgram /var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock: use of closed network connection"
time="2024-03-14T20:55:23+01:00" level=error msg="write unixgram /var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock->/Users/benoitf/Library/Application Support/vfkit/net-77589-104881704.sock: sendto: no buffer space available"
time="2024-03-14T20:55:23+01:00" level=error msg="error closing unixgram:///var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock: \"close unixgram /var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock: use of closed network connection\""
time="2024-03-14T20:55:23+01:00" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=5a:94:ef:e4:0c:ee EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=13202 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=51165 SrcIP=192.168.127.1 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=17915 DstPort=22(ssh) Seq=1581380434 Ack=2440878111 DataOffset=8 FIN=true SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=16384 Checksum=7934 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:1386195782/735473003 0x529fab462bd66d6b)] Padding=[]}\n"
time="2024-03-14T20:55:23+01:00" level=error msg="Couldn't reestablish ssh connection: 192.168.127.2: Connection to bastion host (192.168.127.2) failed: context canceled"
time="2024-03-14T20:55:23+01:00" level=error msg="gvproxy exiting: cannot read size from socket: read unixgram /var/folders/_s/rlbw3qg15vx0j6vr4l7kd1hm0000gn/T/podman/podman-machine-default-gvproxy.sock: use of closed network connection"
-rw-r--r--@   1 benoitf  staff   6.7G Mar 14 20:55 gvproxy.log
srwxr-xr-x@   1 benoitf  staff     0B Mar 10 20:55 podman-machine-default-gvproxy.sock
-rw-------@   1 benoitf  staff   864B Mar 10 20:55 podman-machine-default.log
srwxr-xr-x@   1 benoitf  staff     0B Mar 10 20:55 podman-machine-default.sock

it's also strange, last time it has written something to the file is 4 days after the startup of the machine Mar 10 20:55 --> Mar 14 20:55

First lines of the file:

time="2024-03-10T20:55:36+01:00" level=info msg="gvproxy version v0.7.3"
time="2024-03-10T20:55:36+01:00" level=info msg="waiting for clients..."
time="2024-03-10T20:55:36+01:00" level=info msg="PACKET: 42 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..28..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=ff:ff:ff:ff:ff:ff EthernetType=ARP Length=0}\n- Layer 2 (28 bytes) = ARP\t{Contents=[..28..] Payload=[] AddrType=Ethernet Protocol=IPv4 HwAddressSize=6 ProtAddressSize=4 Operation=1 SourceHwAddress=[..6..] SourceProtAddress=[192, 168, 127, 1] DstHwAddress=[..6..] DstProtAddress=[192, 168, 127, 2]}\n"
github-actions[bot] commented 5 months ago

A friendly reminder that this issue had no activity for 30 days.