[Bug 263474] [sctp] netperf causes panic: panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 263474] [sctp] netperf causes panic: panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 263474] [sctp] netperf causes panic: panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 22 Apr 2022 21:18:25 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263474 Bug ID: 263474 Summary: [sctp] netperf causes panic: panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920 Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: bdrewery@FreeBSD.org On head 5678114cd8b310bd6f0a5699f036fc5b18addd65 (March 8th 2022) This was during high CPU load from a Poudriere package build occurring at the same time. # netserver Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC # netperf -t SCTP_STREAM -H 127.0.0.1 SCTP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 127.0.0.1 () port 0 AF_INET : histogram : interval : dirty data : demo client_loop: send disconnect: Broken pipe panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920 Tracing pid 12 tid 100161 td 0xfffffe0087502e40 kdb_enter() at kdb_enter+0x37/frame 0xfffffe013eb92460 vpanic() at vpanic+0x1b0/frame 0xfffffe013eb924b0 panic() at panic+0x43/frame 0xfffffe013eb92510 thread_lock_flags_() at thread_lock_flags_+0x180/frame 0xfffffe013eb92580 propagate_priority() at propagate_priority+0x99/frame 0xfffffe013eb925c0 turnstile_wait() at turnstile_wait+0x380/frame 0xfffffe013eb92610 __mtx_lock_sleep() at __mtx_lock_sleep+0x1d9/frame 0xfffffe013eb926a0 __mtx_lock_flags() at __mtx_lock_flags+0xe5/frame 0xfffffe013eb926f0 sctp_express_handle_sack() at sctp_express_handle_sack+0x8b8/frame 0xfffffe013eb927f0 sctp_process_control() at sctp_process_control+0x98f/frame 0xfffffe013eb92b30 sctp_common_input_processing() at sctp_common_input_processing+0x514/frame 0xfffffe013eb92ca0 sctp_input_with_port() at sctp_input_with_port+0x1fb/frame 0xfffffe013eb92d70 sctp_input() at sctp_input+0x10/frame 0xfffffe013eb92d80 ip_input() at ip_input+0x25e/frame 0xfffffe013eb92de0 swi_net() at swi_net+0x191/frame 0xfffffe013eb92e60 ithread_loop() at ithread_loop+0x279/frame 0xfffffe013eb92ef0 fork_exit() at fork_exit+0x80/frame 0xfffffe013eb92f30 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe013eb92f30 --- trap 0, rip = 0, rsp = 0, rbp = 0 --- 0 59382 6553 21 -72 0 18868 6536 sctp-tcb L+ - 0:06.47 [netperf] #16 0xffffffff80be6c79 in __mtx_lock_sleep (c=c@entry=0xfffff80131013cb8, v=<optimized out>, opts=<optimized out>, opts@entry=0, file=<optimized out>, file@entry=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c", line=line@entry=4138) at /usr/src/sys/kern/kern_mutex.c:668 #17 0xffffffff80be6a25 in __mtx_lock_flags (c=0xfffff80131013cb8, opts=-2127852512, file=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c", line=4138) at /usr/src/sys/kern/kern_mutex.c:284 #18 0xffffffff835d8868 in sctp_express_handle_sack (stcb=0xfffffe01fd755ad0, cumack=cumack@entry=1851645892, rwnd=1860207, abort_now=abort_now@entry=0xfffffe013eb92a80, ecne_seen=0) at /usr/src/sys/netinet/sctp_indata.c:4138 #19 0xffffffff835e280f in sctp_process_control (m=<optimized out>, m@entry=0xfffff80a0e562400, iphlen=<optimized out>, iphlen@entry=20, offset=<optimized out>, offset@entry=0xfffffe013eb92bd8, length=<optimized out>, length@entry=48, src=<optimized out>, src@entry=0xfffffe013eb92d30, dst=dst@entry=0xfffffe013eb92d20, sh=0xfffff80a0e56246c, ch=<optimized out>, inp=<optimized out>, stcb=0x10, netp=0xfffffe013eb92be0, fwd_tsn_seen=0xfffffe013eb92bac, mflowtype=191 '\277', mflowid=3372267024, fibnum=<optimized out>, vrf_id=0, port=0) at /usr/src/sys/netinet/sctp_input.c:4758 #20 0xffffffff835e15c4 in sctp_common_input_processing ( mm=mm@entry=0xfffffe013eb92d10, iphlen=<optimized out>, iphlen@entry=20, offset=32, length=length@entry=48, src=src@entry=0xfffffe013eb92d30, dst=dst@entry=0xfffffe013eb92d20, sh=0xfffff80a0e56246c, ch=0xfffff80a0e562478, compute_crc=0 '\000', ecn_bits=0 '\000', mflowtype=191 '\277', mflowid=3372267024, fibnum=0, vrf_id=0, port=0) at /usr/src/sys/netinet/sctp_input.c:5413 #21 0xffffffff835e3b7b in sctp_input_with_port (i_pak=<optimized out>, off=20, port=port@entry=0) at /usr/src/sys/netinet/sctp_input.c:5724 #22 0xffffffff835e3bc0 in sctp_input (mp=<optimized out>, offp=<optimized out>, proto=<optimized out>) at /usr/src/sys/netinet/sctp_input.c:5785 #23 0xffffffff80dda15e in ip_input (m=0xfffff8096dd51d00) at /usr/src/sys/netinet/ip_input.c:840 #24 0xffffffff80d59661 in netisr_process_workstream_proto ( nwsp=<optimized out>, proto=<optimized out>) at /usr/src/sys/net/netisr.c:928 #25 swi_net (arg=<optimized out>) at /usr/src/sys/net/netisr.c:975 #26 0xffffffff80bc6889 in intr_event_execute_handlers (ie=0xfffff8010207c200, p=<optimized out>) at /usr/src/sys/kern/kern_intr.c:1205 #27 ithread_execute_handlers (ie=0xfffff8010207c200, p=<optimized out>) at /usr/src/sys/kern/kern_intr.c:1218 #28 ithread_loop (arg=<optimized out>, arg@entry=0xfffff80102512060) at /usr/src/sys/kern/kern_intr.c:1306 #29 0xffffffff80bc2f20 in fork_exit ( callout=0xffffffff80bc6610 <ithread_loop>, arg=0xfffff80102512060, frame=0xfffffe013eb92f40) at /usr/src/sys/kern/kern_fork.c:1102 #30 <signal handler called> -- You are receiving this mail because: You are the assignee for the bug.