From nobody Sun Jul 02 18:45:03 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QvHzh4ysqz4lQyj for ; Sun, 2 Jul 2023 18:45:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QvHzg6rqsz4KSR for ; Sun, 2 Jul 2023 18:45:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1688323504; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=yQzojMXFBZ3AjukC3O5fU2Fn6LF/rh8rQe4gC2Q73jw=; b=XM9lGmB87TH1hHJp998vuL0Tmw3twAQpRDKB5P/ElevWbpKk0lQUJI8XnsODeMVMwVQPc0 n8ZuTzs5N0dC0Qt6ZcxRyhINy3EIo+aQvdzC9UGAB2SjKhm3DZphnWS4vcddh6rRxWW7bm Xpb9JXhzqjjDWzFOVjXD6NWdofzMce/X0V17o5eBm8Kma6c4UbkmH282A78pH9wVBoQaIZ mDLHVGBdPltXnCQW3vNNh27+KaE7gzx3Rm77xKVeSx9oN/4YqWVk7g2VrpPlU5FSVEPfS2 uwAozLRX7RYEliaIK7QXlIelZhsMBz72khgrBYW6CGIFuS7rqubjc2lQ1/vdhw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1688323504; a=rsa-sha256; cv=none; b=o/t9tVxLezgvQ7qvvHMKWBlFD1KM+g4fTv+0oxTfaAeAI2adjn0amAQZzUd7//FmqKkRjF AFMjHG/BIJeoJrMoJEZBdsqrsg0cbOVcJ7rHVCl+cTTwxGq9XiDew+DlQwjscuPbLMS/pZ hmZVhpXPWZB9xilGIGMKjSRJfaS0VH/WcFYNdujcUe3AEIpAvjr50n0CkogebdqlWs1pFM fSi0dA/N2+DIgWn5IQG1p73zjPKg6Ntc5WMZVRbPsODGtL8sjHZEeCdYEbLEYw25KsaUfK E20MCLI1ZSOObzORpZmJ6eW83YF5UDIEGdkhKDNug7Y429Tz/udAH1LCW/83MA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QvHzg4KtvzKSJ for ; Sun, 2 Jul 2023 18:45:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 362Ij3qX046107 for ; Sun, 2 Jul 2023 18:45:03 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 362Ij3b4046106 for net@FreeBSD.org; Sun, 2 Jul 2023 18:45:03 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272319] FreeBSD kernel crash on MPD5 restart with PPP configuration. Date: Sun, 02 Jul 2023 18:45:03 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ny2007ltd@gmail.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272319 --- Comment #19 from ny --- I have tested patch under FreeBSD 13.2 / amd64. Now mpd5 restart - no any crashes. On telnet 127.0.0.1 57 - no connect, but new crash: Unread portion of the kernel message buffer: panic: _mtx_lock_sleep: recursed on non-recursive mutex socket @ /usr/src/sys/netgraph/ng_ksocket.c:1196 cpuid =3D 0 time =3D 1688330477 KDB: stack backtrace: #0 0xffffffff80c423a5 at kdb_backtrace+0x65 #1 0xffffffff80bf5ff1 at vpanic+0x151 #2 0xffffffff80bf5df3 at panic+0x43 #3 0xffffffff80bd176c at __mtx_lock_sleep+0x43c #4 0xffffffff80bd12b5 at __mtx_lock_flags+0xe5 #5 0xffffffff82d37d53 at ng_ksocket_accept+0x33 #6 0xffffffff80c99806 at solisten_wakeup+0x26 #7 0xffffffff80dc7037 at tcp_do_segment+0x15b7 #8 0xffffffff80dc4ddb at tcp_input_with_port+0xddb #9 0xffffffff80dc59ab at tcp_input+0xb #10 0xffffffff80db628b at ip_input+0x18b #11 0xffffffff80d38cd1 at swi_net+0x1a1 #12 0xffffffff80bb2de9 at ithread_loop+0x279 #13 0xffffffff80bafcc0 at fork_exit+0x80 #14 0xffffffff8108df2e at fork_trampoline+0xe Uptime: 1m46s Dumping 175 out of 2004 MB:..10%..19%..28%..37%..46%..55%..64%..73%..82%..9= 1% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (offsetof(stru= ct pcpu, (kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown.c:396 #2 0xffffffff80bf5bff in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:484 #3 0xffffffff80bf605e in vpanic (fmt=3D,=20 ap=3Dap@entry=3D0xfffffe00037339c0) at /usr/src/sys/kern/kern_shutdown.= c:923 #4 0xffffffff80bf5df3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:847 #5 0xffffffff80bd176c in __mtx_lock_sleep (c=3Dc@entry=3D0xfffff8000d95d01= 8,=20 v=3D18446741874752305408, opts=3Dopts@entry=3D0,=20 file=3Dfile@entry=3D0xffffffff82d39567 "/usr/src/sys/netgraph/ng_ksocke= t.c",=20 line=3Dline@entry=3D1196) at /usr/src/sys/kern/kern_mutex.c:546 #6 0xffffffff80bd12b5 in __mtx_lock_flags (c=3D0xfffff8000d95d018,=20 opts=3D,=20 file=3D0xffffffff82d39567 "/usr/src/sys/netgraph/ng_ksocket.c", line=3D= 1196) at /usr/src/sys/kern/kern_mutex.c:284 #7 0xffffffff82d37d53 in ng_ksocket_accept (priv=3D0xfffff80014246180,=20 priv@entry=3D) at /usr/src/sys/netgraph/ng_ksocket.c:1196 #8 0xffffffff80c99806 in solisten_wakeup (sol=3D0xfffff8000d95d000,=20 sol@entry=3D0xfffff8000deb257c) at /usr/src/sys/kern/uipc_socket.c:985 #9 0xffffffff80c9fee8 in soisconnected (so=3Dso@entry=3D0xfffff8000d961b10) at /usr/src/sys/kern/uipc_socket.c:4053 #10 0xffffffff80dc7037 in tcp_do_segment (m=3D0xfffff8000deb2500,=20 m@entry=3D,=20 th=3D0xfffff8000deb257c,=20 th@entry=3D,=20 so=3D,=20 so@entry=3D,=20 tp=3D0xfffffe0094589ca8,=20 tp@entry=3D,=20 drop_hdrlen=3D52,=20 drop_hdrlen@entry=3D,=20 tlen=3D,=20 tlen@entry=3D,=20 iptos=3D16 '\020',=20 iptos@entry=3D) at /usr/src/sys/netinet/tcp_input.c:2469 #11 0xffffffff80dc4ddb in tcp_input_with_port (mp=3Dmp@entry=3D,=20 offp=3Doffp@entry=3D, proto=3D, port=3Dport= @entry=3D0) at /usr/src/sys/netinet/tcp_input.c:1180 #12 0xffffffff80dc59ab in tcp_input (mp=3D,=20 mp@entry=3D,=20 offp=3D,=20 offp@entry=3D,=20 proto=3D,=20 proto@entry=3D) at /usr/src/sys/netinet/tcp_input.c:1509 #13 0xffffffff80db628b in ip_input (m=3D0x0,=20 m@entry=3D) at /usr/src/sys/netinet/ip_input.c:840 #14 0xffffffff80d38cd1 in netisr_process_workstream_proto ( nwsp=3D0xffffffff82b876c0, proto=3D1) at /usr/src/sys/net/netisr.c:919 #15 swi_net (arg=3D0xffffffff82b876c0) at /usr/src/sys/net/netisr.c:966 #16 0xffffffff80bb2de9 in intr_event_execute_handlers (ie=3D0xfffff800034cd= 500,=20 p=3D) at /usr/src/sys/kern/kern_intr.c:1169 #17 ithread_execute_handlers (ie=3D0xfffff800034cd500, p=3D) at /usr/src/sys/kern/kern_intr.c:1182 #18 ithread_loop (arg=3Darg@entry=3D0xfffff800034704c0) at /usr/src/sys/kern/kern_intr.c:1270 #19 0xffffffff80bafcc0 in fork_exit ( callout=3D0xffffffff80bb2b70 , arg=3D0xfffff800034704c0,= =20 frame=3D0xfffffe0003733f40) at /usr/src/sys/kern/kern_fork.c:1093 #20 (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=