From nobody Fri Jul 09 00:15:41 2021 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id A40641231B6D for ; Fri, 9 Jul 2021 00:15:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4GLYbK4BLHz3wWw for ; Fri, 9 Jul 2021 00:15:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7965521E3 for ; Fri, 9 Jul 2021 00:15:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 1690Ffx1016184 for ; Fri, 9 Jul 2021 00:15:41 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 1690FfuG016183 for bugs@FreeBSD.org; Fri, 9 Jul 2021 00:15:41 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 257067] panic: Assertion in_epoch(net_epoch_preempt) failed at /usr/src/sys/net/if_vlan.c:1185 Date: Fri, 09 Jul 2021 00:15:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: niels=freebsd@bakker.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D257067 Bug ID: 257067 Summary: panic: Assertion in_epoch(net_epoch_preempt) failed at /usr/src/sys/net/if_vlan.c:1185 Product: Base System Version: 13.0-STABLE Hardware: arm64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: niels=3Dfreebsd@bakker.net # cd /var/crash && kgdb /boot/kernel/kernel vmcore.last GNU gdb (GDB) 10.2 [GDB v10.2 for FreeBSD] Copyright (C) 2021 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd13.0". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /boot/kernel/kernel... Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug... Unread portion of the kernel message buffer: panic: Assertion in_epoch(net_epoch_preempt) failed at /usr/src/sys/net/if_vlan.c:1185 cpuid =3D 1 time =3D 1625786527 KDB: stack backtrace: #0 0xffffffff80bfece5 at kdb_backtrace+0x65 #1 0xffffffff80bb46d1 at vpanic+0x181 #2 0xffffffff80bb44a3 at panic+0x43 #3 0xffffffff80cd88de at vlan_transmit+0x1de #4 0xffffffff80cce39b at ether_output_frame+0xab #5 0xffffffff8210c6d8 at ng_apply_item+0xa8 #6 0xffffffff8210c45e at ng_snd_item+0x2ce #7 0xffffffff835247f2 at ng_pppoe_disconnect+0x152 #8 0xffffffff8210ac23 at ng_destroy_hook+0x1e3 #9 0xffffffff8210c729 at ng_apply_item+0xf9 #10 0xffffffff8210c45e at ng_snd_item+0x2ce #11 0xffffffff8210aae9 at ng_destroy_hook+0xa9 #12 0xffffffff8210a8c5 at ng_rmnode+0x65 #13 0xffffffff8210cb03 at ng_apply_item+0x4d3 #14 0xffffffff8210c45e at ng_snd_item+0x2ce #15 0xffffffff82f35dcf at ngc_send+0x1af #16 0xffffffff80c51c47 at sosend_generic+0x5f7 #17 0xffffffff80c51f56 at sosend+0x66 Uptime: 7d5h6m15s Dumping 3807 out of 16148 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..= 91% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (offsetof(stru= ct pcpu, (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:399 #2 0xffffffff80bb42fa in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:486 #3 0xffffffff80bb4740 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:919 #4 0xffffffff80bb44a3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:843 #5 0xffffffff80cd88de in vlan_transmit (ifp=3D0xfffff8003742e800, m=3D0xfffff8004de1a900) at /usr/src/sys/net/if_vlan.c:1185 #6 0xffffffff80cce39b in ether_output_frame (ifp=3D0xfffff8003742e800,=20 ifp@entry=3D, m=3D,=20 m@entry=3D) at /usr/src/sys/net/if_ethersubr.c:508 #7 0xffffffff8210c6d8 in ng_apply_item (node=3D, node@entry=3D0xfffff800423e8700,=20 item=3D, item@entry=3D0xfffff8038da1ad80, rw=3D0) at /usr/src/sys/netgraph/ng_base.c:2407 #8 0xffffffff8210c45e in ng_snd_item (item=3Ditem@entry=3D0xfffff8038da1ad= 80, flags=3Dflags@entry=3D0) at /usr/src/sys/netgraph/ng_base.c:2324 #9 0xffffffff835247f2 in ng_pppoe_disconnect (hook=3D0xfffff80037b6bf00,=20 hook@entry=3D) at /usr/src/sys/netgraph/ng_pppoe.c:2070 #10 0xffffffff8210ac23 in ng_destroy_hook (hook=3D0xfffff80037b6bf00,=20 hook@entry=3D) at /usr/src/sys/netgraph/ng_base.c:1224 #11 0xffffffff8210c729 in ng_apply_item (node=3D, node@entry=3D0xfffff80054599d00,=20 item=3D, item@entry=3D0xfffff800a06dad80, rw=3D1) at /usr/src/sys/netgraph/ng_base.c:2478 #12 0xffffffff8210c45e in ng_snd_item (item=3D0xfffff800a06dad80, flags=3D0, flags@entry=3D934723328) at /usr/src/sys/netgraph/ng_base.c:2324 #13 0xffffffff8210e471 in ng_send_fn1 (node=3D0x0, hook=3D, hook@entry=3D0xfffff80037b6bf00,=20 fn=3D, arg1=3D, arg1@entry=3D0x0, arg2=3D= -511, arg2@entry=3D0, flags=3D,=20 flags@entry=3D0) at /usr/src/sys/netgraph/ng_base.c:3730 #14 0xffffffff8210aae9 in ng_send_fn (node=3D, hook=3D0xfffff80037b6bf00, fn=3D,=20 arg1=3D0x0, arg2=3D0) at /usr/src/sys/netgraph/ng_base.c:3708 #15 ng_rmhook_self (hook=3D0xfffff80037b6bf00) at /usr/src/sys/netgraph/ng_base.c:1639 #16 ng_destroy_hook (hook=3D0xfffff80034c07380) at /usr/src/sys/netgraph/ng_base.c:1199 #17 0xffffffff8210a8c5 in ng_rmnode (node=3D0xfffff80037e6c500, dummy1=3D, dummy2=3D,=20 dummy3=3D) at /usr/src/sys/netgraph/ng_base.c:745 #18 0xffffffff8210cb03 in ng_generic_msg (here=3D0xfffff80037e6c500, item=3D0xfffff801210fd480,=20 lasthook=3D) at /usr/src/sys/netgraph/ng_base.c:2527 #19 ng_apply_item (node=3D, node@entry=3D0xfffff80037e6c500, item=3D,=20 item@entry=3D0xfffff801210fd480, rw=3D) at /usr/src/sys/netgraph/ng_base.c:2441 #20 0xffffffff8210c45e in ng_snd_item (item=3Ditem@entry=3D0xfffff801210fd4= 80, flags=3Dflags@entry=3D0) at /usr/src/sys/netgraph/ng_base.c:2324 #21 0xffffffff82f35dcf in ngc_send (so=3D,=20 so@entry=3D, flags=3D,=20 flags@entry=3D, m=3D0xfffff803d5b65400,=20 m@entry=3D, addr=3D,=20 addr@entry=3D, control=3D,=20 control@entry=3D, td=3D,=20 td@entry=3D) at /usr/src/sys/netgraph/ng_socket.c:345 #22 0xffffffff80c51c47 in sosend_generic (so=3D0xfffff80042011760,=20 so@entry=3D, addr=3D0xfffff80141708f80,=20 addr@entry=3D, uio=3D,=20 uio@entry=3D, top=3D0xfffff803d5b65400,=20 top@entry=3D, control=3D,=20 control@entry=3D, flags= =3D0,=20 flags@entry=3D, td=3D0xfffffe0110c06c80,=20 td@entry=3D) at /usr/src/sys/kern/uipc_socket.c:1755 #23 0xffffffff80c51f56 in sosend (so=3D, so@entry=3D0xfffff80042011760, addr=3D,=20 uio=3D, uio@entry=3D0xfffffe01112de9a8, top=3D, top@entry=3D0x0,=20 control=3Dcontrol@entry=3D0x0, flags=3D, flags@entry=3D0, td=3D0xfffffe0110c06c80) at /usr/src/sys/kern/uipc_socket.c:1805 #24 0xffffffff80c58ceb in kern_sendit (td=3D, td@entry=3D0xfffffe0110c06c80, s=3D5,=20 mp=3D, mp@entry=3D0xfffffe01112dea80, flags=3D0, control= =3D0x0, segflg=3Dsegflg@entry=3DUIO_USERSPACE) at /usr/src/sys/kern/uipc_syscalls.c:798 #25 0xffffffff80c5908b in sendit (td=3D0xfffffe0110c06c80, td@entry=3D, s=3D,=20 mp=3Dmp@entry=3D0xfffffe01112dea80, flags=3D) at /usr/src/sys/kern/uipc_syscalls.c:723 #26 0xffffffff80c58e9d in sys_sendto (td=3D,=20 td@entry=3D, uap=3D,=20 uap@entry=3D) at /usr/src/sys/kern/uipc_syscalls.c:841 #27 0xffffffff8101b59e in syscallenter (td=3D) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:189 #28 amd64_syscall (td=3D0xfffffe0110c06c80, traced=3D0) at /usr/src/sys/amd64/amd64/trap.c:1184 #29 #30 0x00000008008bf6da in ?? () Backtrace stopped: Cannot access memory at address 0x7fffdfffdab8 (kgdb) f 5 #5 0xffffffff80cd88de in vlan_transmit (ifp=3D0xfffff8003742e800, m=3D0xfffff8004de1a900) at /usr/src/sys/net/if_vlan.c:1185 1185 NET_EPOCH_ASSERT(); (kgdb) p *ifp $1 =3D {if_link =3D {cstqe_next =3D 0xfffff800378a3800}, if_clones =3D {le_= next =3D 0x0, le_prev =3D 0xfffff800378a3808},=20 if_groups =3D {cstqh_first =3D 0xfffff800422da7f0, cstqh_last =3D 0xfffff800422da7c8}, if_alloctype =3D 6 '\006',=20 if_numa_domain =3D 255 '\377', if_softc =3D 0xfffff800423d1e00, if_llsoft= c =3D 0x0,=20 if_l2com =3D 0xfffff800423e8700, if_dname =3D 0xffffffff8158fd60 "vlan", if_dunit =3D 0, if_index =3D 5,=20 if_index_reserved =3D 0, if_xname =3D "vlan0\000\000\000\000\000\000\000\000\000\000", if_description =3D 0x0,=20 if_flags =3D 34947, if_drv_flags =3D 64, if_capabilities =3D 524546, if_c= apenable =3D 524546, if_linkmib =3D 0x0,=20 if_linkmiblen =3D 0, if_refcount =3D 2, if_type =3D 135 '\207', if_addrle= n =3D 6 '\006', if_hdrlen =3D 4 '\004',=20 if_link_state =3D 2 '\002', if_mtu =3D 1508, if_metric =3D 0, if_baudrate= =3D 100000000, if_hwassist =3D 4119,=20 if_epoch =3D 18, if_lastchange =3D {tv_sec =3D 1625163373, tv_usec =3D 40= 5364}, if_snd =3D {ifq_head =3D 0x0,=20 ifq_tail =3D 0x0, ifq_len =3D 0, ifq_maxlen =3D 50, ifq_mtx =3D {lock_o= bject =3D { lo_name =3D 0xfffff8003742e858 "vlan0", lo_flags =3D 16973824, lo_d= ata =3D 0, lo_witness =3D 0x0},=20 mtx_lock =3D 0}, ifq_drv_head =3D 0x0, ifq_drv_tail =3D 0x0, ifq_drv_= len =3D 0, ifq_drv_maxlen =3D 0,=20 altq_type =3D 0, altq_flags =3D 0, altq_disc =3D 0x0, altq_ifp =3D 0xfffff8003742e800, altq_enqueue =3D 0x0,=20 altq_dequeue =3D 0x0, altq_request =3D 0x0, altq_clfier =3D 0x0, altq_c= lassify =3D 0x0, altq_tbr =3D 0x0,=20 altq_cdnr =3D 0x0}, if_linktask =3D {ta_link =3D {stqe_next =3D 0x0}, t= a_pending =3D 0, ta_priority =3D 0 '\000',=20 ta_flags =3D 0 '\000', ta_func =3D 0xffffffff80cc4270 ,=20 ta_context =3D 0xfffff8003742e800}, if_addmultitask =3D {ta_link =3D {s= tqe_next =3D 0x0}, ta_pending =3D 0,=20 ta_priority =3D 0 '\000', ta_flags =3D 0 '\000', ta_func =3D 0xffffffff= 80cc4580 ,=20 ta_context =3D 0xfffff8003742e800}, if_addr_lock =3D {lock_object =3D { lo_name =3D 0xffffffff81102568 "if_addr_lock", lo_flags =3D 16973824,= lo_data =3D 0, lo_witness =3D 0x0},=20 mtx_lock =3D 0}, if_addrhead =3D {cstqh_first =3D 0xfffff800423e8d00, c= stqh_last =3D 0xfffff800423e8d28},=20 if_multiaddrs =3D {cstqh_first =3D 0x0, cstqh_last =3D 0xfffff8003742e9d8= }, if_amcount =3D 0,=20 if_addr =3D 0xfffff800423e8d00, if_hw_addr =3D 0xfffff800422da7d0,=20 if_broadcastaddr =3D 0xffffffff8158ee70 "\377\377\377\377\377\377", if_afdata_lock =3D { lock_object =3D {lo_name =3D 0xffffffff81199fe8 "if_afdata", lo_flags = =3D 16973824, lo_data =3D 0,=20 lo_witness =3D 0x0}, mtx_lock =3D 0}, if_afdata =3D {0x0, 0x0, 0xfffff800422d03e0, 0x0 ,=20 0xfffff80037d20dc0, 0x0 }, if_afdata_initialized =3D = 2, if_fib =3D 0,=20 if_vnet =3D 0xfffff8000419d600, if_home_vnet =3D 0xfffff8000419d600, if_v= lantrunk =3D 0x0,=20 if_bpf =3D 0xfffff800423d1c80, if_pcount =3D 0, if_bridge =3D 0x0, if_lag= g =3D 0x0, if_pf_kif =3D 0x0, if_carp =3D 0x0,=20 if_label =3D 0x0, if_netmap =3D 0x0, if_output =3D 0xffffffff80cd9a00 ,=20 if_input =3D 0xffffffff80cce980 , if_bridge_input =3D 0x0, if_bridge_output =3D 0x0,=20 if_bridge_linkstate =3D 0x0, if_start =3D 0x0, if_ioctl =3D 0xffffffff80c= d8930 ,=20 if_init =3D 0xffffffff80cd86f0 , if_resolvemulti =3D 0xffffffff80cceb20 ,=20 if_qflush =3D 0xffffffff80cd8920 , if_transmit =3D 0xffffffff80cd8700 ,=20 if_reassign =3D 0xffffffff80cced00 ,=20 if_get_counter =3D 0xffffffff80cc46a0 ,=20 if_requestencap =3D 0xffffffff80ccec30 , if_counters = =3D {0xfffffe018dcf6228,=20 0xfffffe018dcf6220, 0xfffffe018dcf6218, 0xfffffe018dcf6210, 0xfffffe018dcf6208, 0xfffffe018dcf6200,=20 0xfffffe018dcf61f8, 0xfffffe018dcf61f0, 0xfffffe018dcf61e8, 0xfffffe018dcf61e0, 0xfffffe018dcf61d8,=20 0xfffffe018dcf61d0}, if_hw_tsomax =3D 65518, if_hw_tsomaxsegcount =3D 3= 5, if_hw_tsomaxsegsize =3D 2048,=20 if_snd_tag_alloc =3D 0xffffffff80cd8ff0 ,=20 if_snd_tag_modify =3D 0xffffffff80cd90f0 ,=20 if_snd_tag_query =3D 0xffffffff80cd9110 ,=20 if_snd_tag_free =3D 0xffffffff80cd9130 ,=20 if_next_snd_tag =3D 0xffffffff80cd9180 ,=20 if_ratelimit_query =3D 0xffffffff80cd9190 , if_ratelimit_setup =3D 0x0,=20 if_pcp =3D 0 '\000', if_debugnet_methods =3D 0x0, if_epoch_ctx =3D {data = =3D {0x0, 0x0}}, if_ispare =3D {0, 0, 0, 0}} (kgdb)=20 This host runs FreeBSD stable/13-n246143-6aee7855180-dirty from a week and a half ago, GENERIC but with INVARIANTS enabled. Interface alc0 has a VLAN interface vlan0 over which mpd5 runs PPPoE to my ISP, which had an outage, = thus a LCP echo request timeout occurred; the panic occurred as mpd was in the process of tearing down its ng0 interface. Its last log message was: Jul 9 01:22:01 server mpd[997]: [P] LCP: LayerDown --=20 You are receiving this mail because: You are the assignee for the bug.=