From owner-freebsd-stable@freebsd.org Sun Jul 26 17:21:37 2020 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C174C36616E for ; Sun, 26 Jul 2020 17:21:37 +0000 (UTC) (envelope-from peter.blok@bsd4all.org) Received: from smtpq1.tb.mail.iss.as9143.net (smtpq1.tb.mail.iss.as9143.net [212.54.42.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BF8qh6btfz3ZKf for ; Sun, 26 Jul 2020 17:21:36 +0000 (UTC) (envelope-from peter.blok@bsd4all.org) Received: from [212.54.42.135] (helo=smtp11.tb.mail.iss.as9143.net) by smtpq1.tb.mail.iss.as9143.net with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jzkL6-0001yn-Hm for freebsd-stable@freebsd.org; Sun, 26 Jul 2020 19:21:32 +0200 Received: from 94-209-85-88.cable.dynamic.v4.ziggo.nl ([94.209.85.88] helo=wan0.bsd4all.org) by smtp11.tb.mail.iss.as9143.net with esmtp (Exim 4.90_1) (envelope-from ) id 1jzkL6-0004wP-Dm for freebsd-stable@freebsd.org; Sun, 26 Jul 2020 19:21:32 +0200 Received: from newnas.bsd4all.local (localhost [127.0.0.1]) by wan0.bsd4all.org (Postfix) with ESMTP id E80C0D8 for ; Sun, 26 Jul 2020 19:21:31 +0200 (CEST) X-Virus-Scanned: amavisd-new at bsd4all.org Received: from wan0.bsd4all.org ([127.0.0.1]) by newnas.bsd4all.local (newnas.bsd4all.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CyMiwkyTGUq3 for ; Sun, 26 Jul 2020 19:21:31 +0200 (CEST) Received: from [192.168.1.65] (unknown [192.168.1.65]) by wan0.bsd4all.org (Postfix) with ESMTPSA id 556E938 for ; Sun, 26 Jul 2020 19:21:31 +0200 (CEST) From: peter.blok@bsd4all.org Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\)) Subject: Crash in stable 363430 and higher Message-Id: Date: Sun, 26 Jul 2020 19:21:30 +0200 To: freebsd-stable@freebsd.org X-Mailer: Apple Mail (2.3608.120.23.2.1) X-SourceIP: 94.209.85.88 X-Ziggo-spambar: / X-Ziggo-spamscore: 0.0 X-Ziggo-spamreport: CMAE Analysis: v=2.3 cv=Qdn9QvTv c=1 sm=1 tr=0 a=LYXyOGYQqFYBMgK+Y6iqTg==:17 a=IkcTkHD0fZMA:10 a=_RQrkK6FrEwA:10 a=lyoKUVSbbQ_4LzDPBaMA:9 a=QEXdDO2ut3YA:10 X-Ziggo-Spam-Status: No X-Spam-Status: No X-Spam-Flag: No X-Rspamd-Queue-Id: 4BF8qh6btfz3ZKf X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of peter.blok@bsd4all.org designates 212.54.42.164 as permitted sender) smtp.mailfrom=peter.blok@bsd4all.org X-Spamd-Result: default: False [-2.56 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; RWL_MAILSPIKE_VERYGOOD(0.00)[212.54.42.164:from]; RCVD_COUNT_FIVE(0.00)[6]; ARC_NA(0.00)[]; MV_CASE(0.50)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.97)[-0.971]; RECEIVED_SPAMHAUS_PBL(0.00)[94.209.85.88:received]; DMARC_NA(0.00)[bsd4all.org]; R_SPF_ALLOW(-0.20)[+a:smtp.ziggo.nl/16]; NEURAL_HAM_SHORT(-0.66)[-0.655]; FROM_NO_DN(0.00)[]; NEURAL_HAM_MEDIUM(-1.04)[-1.037]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:33915, ipnet:212.54.32.0/20, country:NL]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[212.54.42.164:from] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2020 17:21:37 -0000 Hi, I=E2=80=99m getting the following crash during startup. It seems = strongswan is setting a reqid. Commit r363430 is on if_bridge. The IPSec interfaces are not bridged at = all, so I=E2=80=99m clueless to why this crash relates to this commit. = The only commonality is that the crash is Epoch related and the commit = as well. (kgdb) list 418 * Propagate our priority to any other waiters = to prevent us 419 * from starving them. They will have their = original priority 420 * restore on exit from epoch_wait(). 421 */ 422 curwaittd =3D tdwait->et_td; 423 if (!TD_IS_INHIBITED(curwaittd) && = curwaittd->td_priority > td->td_priority) { 424 critical_enter(); 425 thread_unlock(td); 426 thread_lock(curwaittd); 427 sched_prio(curwaittd, td->td_priority); (kgdb) p/x tdwait $3 =3D 0xfffffe0075dca778 (kgdb) p/x tdwait->et_td $4 =3D 0x806 (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=3D) at = /usr/src/sys/kern/kern_shutdown.c:371 #2 0xffffffff8064d335 in kern_reboot (howto=3D260) at = /usr/src/sys/kern/kern_shutdown.c:451 #3 0xffffffff8064d773 in vpanic (fmt=3D, ap=3D) at /usr/src/sys/kern/kern_shutdown.c:880 #4 0xffffffff8064d593 in panic (fmt=3D) at = /usr/src/sys/kern/kern_shutdown.c:807 #5 0xffffffff809cc3d1 in trap_fatal (frame=3D0xfffffe00c8a0e6f0, = eva=3D3094) at /usr/src/sys/amd64/amd64/trap.c:925 #6 0xffffffff809cc42f in trap_pfault (frame=3D0xfffffe00c8a0e6f0, = usermode=3D, signo=3D, ucode=3D) at /usr/src/sys/amd64/amd64/trap.c:743 #7 0xffffffff809cba76 in trap (frame=3D0xfffffe00c8a0e6f0) at = /usr/src/sys/amd64/amd64/trap.c:407 #8 #9 epoch_block_handler_preempt (global=3D, cr=3D, arg=3D) at /usr/src/sys/kern/subr_epoch.c:423 #10 0xffffffff803677fd in epoch_block (global=3D0xfffff800020be600, = cr=3D0xfffffe0075db9a00, cb=3D0xffffffff80692320 = , ct=3D0x0) at = /usr/src/sys/contrib/ck/src/ck_epoch.c:416 #11 ck_epoch_synchronize_wait (global=3D0xfffff800020be600, = cb=3D, ct=3D) at = /usr/src/sys/contrib/ck/src/ck_epoch.c:465 #12 0xffffffff806921da in epoch_wait_preempt (epoch=3D0xfffff800020be600) = at /usr/src/sys/kern/subr_epoch.c:513 #13 0xffffffff80761687 in ipsec_set_reqid (sc=3D0xfffff8004261e200, = reqid=3D103) at /usr/src/sys/net/if_ipsec.c:964 #14 ipsec_ioctl (ifp=3D, cmd=3D, = data=3D) at /usr/src/sys/net/if_ipsec.c:764 #15 0xffffffff807527ef in ifioctl (so=3D0xfffff8011d766000, = cmd=3D2149607841, data=3D0xfffffe00c8a0ea10 "btcd", td=3D) at /usr/src/sys/net/if.c:3147 #16 0xffffffff806b5f47 in fo_ioctl (fp=3D0xfffff800194846e0, = com=3D2149607841, data=3D0x0, active_cred=3D0x0, td=3D0xfffff80122379740) = at /usr/src/sys/sys/file.h:337 #17 kern_ioctl (td=3D0xffffffff80692320 , = fd=3D, com=3D2149607841, data=3D0x0) at = /usr/src/sys/kern/sys_generic.c:805 #18 0xffffffff806b5bea in sys_ioctl (td=3D0xfffff80122379740, = uap=3D0xfffff80122379b00) at /usr/src/sys/kern/sys_generic.c:713 #19 0xffffffff809ccf87 in syscallenter (td=3D0xfffff80122379740) at = /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:144 #20 amd64_syscall (td=3D0xfffff80122379740, traced=3D0) at = /usr/src/sys/amd64/amd64/trap.c:1167 #21 #22 0x000000080044e0da in ?? () Backtrace stopped: Cannot access memory at address 0x7fffffffe1a8 Any pointers?=