https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263474
Bug ID: 263474
Summary: [sctp] netperf causes panic: panic: Assertion v != tid
failed at /usr/src/sys/kern/kern_mutex.c:920
Product: Base System
Version: CURRENT
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: [email protected]
Reporter: [email protected]
On head 5678114cd8b310bd6f0a5699f036fc5b18addd65 (March 8th 2022)
This was during high CPU load from a Poudriere package build occurring at the
same time.
# netserver
Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC
# netperf -t SCTP_STREAM -H 127.0.0.1
SCTP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 127.0.0.1 () port 0
AF_INET : histogram : interval : dirty data : demo
client_loop: send disconnect: Broken pipe
panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920
Tracing pid 12 tid 100161 td 0xfffffe0087502e40
kdb_enter() at kdb_enter+0x37/frame 0xfffffe013eb92460
vpanic() at vpanic+0x1b0/frame 0xfffffe013eb924b0
panic() at panic+0x43/frame 0xfffffe013eb92510
thread_lock_flags_() at thread_lock_flags_+0x180/frame 0xfffffe013eb92580
propagate_priority() at propagate_priority+0x99/frame 0xfffffe013eb925c0
turnstile_wait() at turnstile_wait+0x380/frame 0xfffffe013eb92610
__mtx_lock_sleep() at __mtx_lock_sleep+0x1d9/frame 0xfffffe013eb926a0
__mtx_lock_flags() at __mtx_lock_flags+0xe5/frame 0xfffffe013eb926f0
sctp_express_handle_sack() at sctp_express_handle_sack+0x8b8/frame
0xfffffe013eb927f0
sctp_process_control() at sctp_process_control+0x98f/frame 0xfffffe013eb92b30
sctp_common_input_processing() at sctp_common_input_processing+0x514/frame
0xfffffe013eb92ca0
sctp_input_with_port() at sctp_input_with_port+0x1fb/frame 0xfffffe013eb92d70
sctp_input() at sctp_input+0x10/frame 0xfffffe013eb92d80
ip_input() at ip_input+0x25e/frame 0xfffffe013eb92de0
swi_net() at swi_net+0x191/frame 0xfffffe013eb92e60
ithread_loop() at ithread_loop+0x279/frame 0xfffffe013eb92ef0
fork_exit() at fork_exit+0x80/frame 0xfffffe013eb92f30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe013eb92f30
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---
0 59382 6553 21 -72 0 18868 6536 sctp-tcb L+ - 0:06.47
[netperf]
#16 0xffffffff80be6c79 in __mtx_lock_sleep (c=c@entry=0xfffff80131013cb8,
v=<optimized out>, opts=<optimized out>, opts@entry=0,
file=<optimized out>,
file@entry=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c",
line=line@entry=4138) at /usr/src/sys/kern/kern_mutex.c:668
#17 0xffffffff80be6a25 in __mtx_lock_flags (c=0xfffff80131013cb8,
opts=-2127852512,
file=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c", line=4138)
at /usr/src/sys/kern/kern_mutex.c:284
#18 0xffffffff835d8868 in sctp_express_handle_sack (stcb=0xfffffe01fd755ad0,
cumack=cumack@entry=1851645892, rwnd=1860207,
abort_now=abort_now@entry=0xfffffe013eb92a80, ecne_seen=0)
at /usr/src/sys/netinet/sctp_indata.c:4138
#19 0xffffffff835e280f in sctp_process_control (m=<optimized out>,
m@entry=0xfffff80a0e562400, iphlen=<optimized out>, iphlen@entry=20,
offset=<optimized out>, offset@entry=0xfffffe013eb92bd8,
length=<optimized out>, length@entry=48, src=<optimized out>,
src@entry=0xfffffe013eb92d30, dst=dst@entry=0xfffffe013eb92d20,
sh=0xfffff80a0e56246c, ch=<optimized out>, inp=<optimized out>,
stcb=0x10, netp=0xfffffe013eb92be0, fwd_tsn_seen=0xfffffe013eb92bac,
mflowtype=191 '\277', mflowid=3372267024, fibnum=<optimized out>,
vrf_id=0, port=0) at /usr/src/sys/netinet/sctp_input.c:4758
#20 0xffffffff835e15c4 in sctp_common_input_processing (
mm=mm@entry=0xfffffe013eb92d10, iphlen=<optimized out>, iphlen@entry=20,
offset=32, length=length@entry=48, src=src@entry=0xfffffe013eb92d30,
dst=dst@entry=0xfffffe013eb92d20, sh=0xfffff80a0e56246c,
ch=0xfffff80a0e562478, compute_crc=0 '\000', ecn_bits=0 '\000',
mflowtype=191 '\277', mflowid=3372267024, fibnum=0, vrf_id=0, port=0)
at /usr/src/sys/netinet/sctp_input.c:5413
#21 0xffffffff835e3b7b in sctp_input_with_port (i_pak=<optimized out>,
off=20, port=port@entry=0) at /usr/src/sys/netinet/sctp_input.c:5724
#22 0xffffffff835e3bc0 in sctp_input (mp=<optimized out>,
offp=<optimized out>, proto=<optimized out>)
at /usr/src/sys/netinet/sctp_input.c:5785
#23 0xffffffff80dda15e in ip_input (m=0xfffff8096dd51d00)
at /usr/src/sys/netinet/ip_input.c:840
#24 0xffffffff80d59661 in netisr_process_workstream_proto (
nwsp=<optimized out>, proto=<optimized out>)
at /usr/src/sys/net/netisr.c:928
#25 swi_net (arg=<optimized out>) at /usr/src/sys/net/netisr.c:975
#26 0xffffffff80bc6889 in intr_event_execute_handlers (ie=0xfffff8010207c200,
p=<optimized out>) at /usr/src/sys/kern/kern_intr.c:1205
#27 ithread_execute_handlers (ie=0xfffff8010207c200, p=<optimized out>)
at /usr/src/sys/kern/kern_intr.c:1218
#28 ithread_loop (arg=<optimized out>, arg@entry=0xfffff80102512060)
at /usr/src/sys/kern/kern_intr.c:1306
#29 0xffffffff80bc2f20 in fork_exit (
callout=0xffffffff80bc6610 <ithread_loop>, arg=0xfffff80102512060,
frame=0xfffffe013eb92f40) at /usr/src/sys/kern/kern_fork.c:1102
#30 <signal handler called>
--
You are receiving this mail because:
You are the assignee for the bug.