This was helpful Sergio- as you confirmed it's on GENERIC and you provided what you did. I generated static list, loaded it and triggered the crash. The stack trace (938 is
With this information PR can be opened.
I've opened a PR 279208 for it.
arp
command):
Code:
Sleeping thread (tid 100689, pid 938) owns a non-sleepable lock
KDB: stack backtrace of thread 100689:
#0 0xffffffff80b5028b at mi_switch+0xbb
#1 0xffffffff80ba044b at sleepq_catch_signals+0x2ab
#2 0xffffffff80ba0189 at sleepq_wait_sig+0x9
#3 0xffffffff80b4f9f3 at _sleep+0x1e3
#4 0xffffffff80be26ca at sbwait+0x6a
#5 0xffffffff80be85ec at soreceive_generic+0x2cc
#6 0xffffffff80bea45f at soreceive+0x2f
#7 0xffffffff80beef80 at kern_recvit+0x190
#8 0xffffffff80bef51f at sys_recvmsg+0x6f
#9 0xffffffff8100d119 at amd64_syscall+0x109
#10 0xffffffff80fe43db at fast_syscall_common+0xf8
panic: sleeping thread
cpuid = 7
time = 1716317361
KDB: stack backtrace:
#0 0xffffffff80b9009d at kdb_backtrace+0x5d
#1 0xffffffff80b431a2 at vpanic+0x132
#2 0xffffffff80b43063 at panic+0x43
#3 0xffffffff80ba8e9e at propagate_priority+0x29e
#4 0xffffffff80ba99e4 at turnstile_wait+0x314
#5 0xffffffff80b3e9c9 at __rw_rlock_hard+0x279
#6 0xffffffff80d8c2af at dump_lle+0x1f
#7 0xffffffff80c6c38c at htable_foreach_lle+0x5c
#8 0xffffffff80d8c234 at dump_llts_iface+0x54
#9 0xffffffff80d8bfcd at rtnl_handle_getneigh+0x20d
#10 0xffffffff80d882d2 at rtnl_handle_message+0x132
#11 0xffffffff80d85c0b at nl_taskqueue_handler+0x79b
#12 0xffffffff80ba5992 at taskqueue_run_locked+0x182
#13 0xffffffff80ba6c22 at taskqueue_thread_loop+0xc2
#14 0xffffffff80afdb7f at fork_exit+0x7f
#15 0xffffffff80fe4b2e at fork_trampoline+0xe
I've opened a PR 279208 for it.