[Bug 263474] [sctp] netperf causes panic: panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920

From: <bugzilla-noreply_at_freebsd.org>
Date: Fri, 22 Apr 2022 21:18:25 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263474

            Bug ID: 263474
           Summary: [sctp] netperf causes panic: panic: Assertion v != tid
                    failed at /usr/src/sys/kern/kern_mutex.c:920
           Product: Base System
           Version: CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: bdrewery@FreeBSD.org

On head 5678114cd8b310bd6f0a5699f036fc5b18addd65 (March 8th 2022)

This was during high CPU load from a Poudriere package build occurring at the
same time.

# netserver
Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC
# netperf -t SCTP_STREAM -H 127.0.0.1
SCTP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 127.0.0.1 () port 0
AF_INET : histogram : interval : dirty data : demo
client_loop: send disconnect: Broken pipe

panic: Assertion v != tid failed at /usr/src/sys/kern/kern_mutex.c:920

Tracing pid 12 tid 100161 td 0xfffffe0087502e40
kdb_enter() at kdb_enter+0x37/frame 0xfffffe013eb92460
vpanic() at vpanic+0x1b0/frame 0xfffffe013eb924b0
panic() at panic+0x43/frame 0xfffffe013eb92510
thread_lock_flags_() at thread_lock_flags_+0x180/frame 0xfffffe013eb92580
propagate_priority() at propagate_priority+0x99/frame 0xfffffe013eb925c0
turnstile_wait() at turnstile_wait+0x380/frame 0xfffffe013eb92610
__mtx_lock_sleep() at __mtx_lock_sleep+0x1d9/frame 0xfffffe013eb926a0
__mtx_lock_flags() at __mtx_lock_flags+0xe5/frame 0xfffffe013eb926f0
sctp_express_handle_sack() at sctp_express_handle_sack+0x8b8/frame
0xfffffe013eb927f0
sctp_process_control() at sctp_process_control+0x98f/frame 0xfffffe013eb92b30
sctp_common_input_processing() at sctp_common_input_processing+0x514/frame
0xfffffe013eb92ca0
sctp_input_with_port() at sctp_input_with_port+0x1fb/frame 0xfffffe013eb92d70
sctp_input() at sctp_input+0x10/frame 0xfffffe013eb92d80
ip_input() at ip_input+0x25e/frame 0xfffffe013eb92de0
swi_net() at swi_net+0x191/frame 0xfffffe013eb92e60
ithread_loop() at ithread_loop+0x279/frame 0xfffffe013eb92ef0
fork_exit() at fork_exit+0x80/frame 0xfffffe013eb92f30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe013eb92f30
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---


    0 59382  6553 21 -72  0   18868   6536 sctp-tcb L+    -        0:06.47
[netperf]


#16 0xffffffff80be6c79 in __mtx_lock_sleep (c=c@entry=0xfffff80131013cb8,
    v=<optimized out>, opts=<optimized out>, opts@entry=0,
    file=<optimized out>,
    file@entry=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c",
    line=line@entry=4138) at /usr/src/sys/kern/kern_mutex.c:668
#17 0xffffffff80be6a25 in __mtx_lock_flags (c=0xfffff80131013cb8,
    opts=-2127852512,
    file=0xffffffff83638a9c "/usr/src/sys/netinet/sctp_indata.c", line=4138)
    at /usr/src/sys/kern/kern_mutex.c:284
#18 0xffffffff835d8868 in sctp_express_handle_sack (stcb=0xfffffe01fd755ad0,
    cumack=cumack@entry=1851645892, rwnd=1860207,
    abort_now=abort_now@entry=0xfffffe013eb92a80, ecne_seen=0)
    at /usr/src/sys/netinet/sctp_indata.c:4138
#19 0xffffffff835e280f in sctp_process_control (m=<optimized out>,
    m@entry=0xfffff80a0e562400, iphlen=<optimized out>, iphlen@entry=20,
    offset=<optimized out>, offset@entry=0xfffffe013eb92bd8,
    length=<optimized out>, length@entry=48, src=<optimized out>,
    src@entry=0xfffffe013eb92d30, dst=dst@entry=0xfffffe013eb92d20,
    sh=0xfffff80a0e56246c, ch=<optimized out>, inp=<optimized out>,
    stcb=0x10, netp=0xfffffe013eb92be0, fwd_tsn_seen=0xfffffe013eb92bac,
    mflowtype=191 '\277', mflowid=3372267024, fibnum=<optimized out>,
    vrf_id=0, port=0) at /usr/src/sys/netinet/sctp_input.c:4758
#20 0xffffffff835e15c4 in sctp_common_input_processing (
    mm=mm@entry=0xfffffe013eb92d10, iphlen=<optimized out>, iphlen@entry=20,
    offset=32, length=length@entry=48, src=src@entry=0xfffffe013eb92d30,
    dst=dst@entry=0xfffffe013eb92d20, sh=0xfffff80a0e56246c,
    ch=0xfffff80a0e562478, compute_crc=0 '\000', ecn_bits=0 '\000',
    mflowtype=191 '\277', mflowid=3372267024, fibnum=0, vrf_id=0, port=0)
    at /usr/src/sys/netinet/sctp_input.c:5413
#21 0xffffffff835e3b7b in sctp_input_with_port (i_pak=<optimized out>,
    off=20, port=port@entry=0) at /usr/src/sys/netinet/sctp_input.c:5724
#22 0xffffffff835e3bc0 in sctp_input (mp=<optimized out>,
    offp=<optimized out>, proto=<optimized out>)
    at /usr/src/sys/netinet/sctp_input.c:5785
#23 0xffffffff80dda15e in ip_input (m=0xfffff8096dd51d00)
    at /usr/src/sys/netinet/ip_input.c:840
#24 0xffffffff80d59661 in netisr_process_workstream_proto (
    nwsp=<optimized out>, proto=<optimized out>)
    at /usr/src/sys/net/netisr.c:928
#25 swi_net (arg=<optimized out>) at /usr/src/sys/net/netisr.c:975
#26 0xffffffff80bc6889 in intr_event_execute_handlers (ie=0xfffff8010207c200,
    p=<optimized out>) at /usr/src/sys/kern/kern_intr.c:1205
#27 ithread_execute_handlers (ie=0xfffff8010207c200, p=<optimized out>)
    at /usr/src/sys/kern/kern_intr.c:1218
#28 ithread_loop (arg=<optimized out>, arg@entry=0xfffff80102512060)
    at /usr/src/sys/kern/kern_intr.c:1306
#29 0xffffffff80bc2f20 in fork_exit (
    callout=0xffffffff80bc6610 <ithread_loop>, arg=0xfffff80102512060,
    frame=0xfffffe013eb92f40) at /usr/src/sys/kern/kern_fork.c:1102
#30 <signal handler called>

-- 
You are receiving this mail because:
You are the assignee for the bug.