[Bug 276674] The panic occurs when the network opens net.inet.tcp.cc.algorithm=htcp

From: <bugzilla-noreply_at_freebsd.org>
Date: Sun, 28 Jan 2024 02:05:42 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=276674

            Bug ID: 276674
           Summary: The panic occurs when the network opens
                    net.inet.tcp.cc.algorithm=htcp
           Product: Base System
           Version: 13.2-STABLE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: bin
          Assignee: bugs@FreeBSD.org
          Reporter: admin@support.od.ua

Created attachment 248024
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=248024&action=edit
Crash dump file

VPS in OVH.
FreeBSD 13.2-STABLE 2cd20d9bc SUPPORT-13-2-0 amd64

The panic occurs when the network opens net.inet.tcp.cc.algorithm=htcp

sysctl options are also used:
net.inet.tcp.cc.htcp.rtt_scaling=1
net.inet.tcp.delayed_ack=0

After applying the option
net.inet.tcp.cc.algorithm=newreno
the panic disappeared.


cpuid        = 0
dynamic pcpu = 0x115b000
curthread    = 0xfffff8000478b740: pid 12 tid 100063 critnest 1 "irq25:
virtio_pci0"
curpcb       = 0xfffff8000478bc50
fpcurthread  = none
idlethread   = 0xfffff80004472740: tid 100003 "idle: cpu0"
self         = 0xffffffff83210000
curpmap      = 0xffffffff82368138
tssp         = 0xffffffff83210384
rsp0         = 0xfffffe0044c4e000
kcr3         = 0xffffffffffffffff
ucr3         = 0xffffffffffffffff
scr3         = 0x0
gs32p        = 0xffffffff83210404
ldt          = 0xffffffff83210444
tss          = 0xffffffff83210434
curvnet      = 0xfffff8000416f280
db:0:kdb.enter.panic>  bt
Tracing pid 12 tid 100063 td 0xfffff8000478b740
kdb_enter() at 0xffffffff80d34547 = kdb_enter+0x37/frame 0xfffffe0044c4d650
vpanic() at 0xffffffff80ce6ac3 = vpanic+0x183/frame 0xfffffe0044c4d6a0
panic() at 0xffffffff80ce6933 = panic+0x43/frame 0xfffffe0044c4d700
trap_fatal() at 0xffffffff812faacd = trap_fatal+0x38d/frame 0xfffffe0044c4d760
calltrap() at 0xffffffff812d0bb8 = calltrap+0x8/frame 0xfffffe0044c4d760
--- trap 0x12, rip = 0xffffffff82a732f1, rsp = 0xfffffe0044c4d838, rbp =
0xfffffe0044c4d840 ---
htcp_ack_received() at 0xffffffff82a732f1 = htcp_ack_received+0x231/frame
0xfffffe0044c4d840
cc_ack_received() at 0xffffffff80f5cadc = cc_ack_received+0x28c/frame
0xfffffe0044c4d8a0
tcp_do_segment() at 0xffffffff80f61590 = tcp_do_segment+0x2be0/frame
0xfffffe0044c4d970
tcp_input_with_port() at 0xffffffff80f5dc2d = tcp_input_with_port+0xabd/frame
0xfffffe0044c4dab0
tcp6_input_with_port() at 0xffffffff80f5d10a = tcp6_input_with_port+0x6a/frame
0xfffffe0044c4dae0
tcp6_input() at 0xffffffff80f5e47b = tcp6_input+0xb/frame 0xfffffe0044c4daf0
ip6_input() at 0xffffffff80fb11a4 = ip6_input+0x9b4/frame 0xfffffe0044c4dbd0
netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame
0xfffffe0044c4dc20
ether_demux() at 0xffffffff80e37bc9 = ether_demux+0x149/frame
0xfffffe0044c4dc50
ether_nh_input() at 0xffffffff80e38ee9 = ether_nh_input+0x379/frame
0xfffffe0044c4dcb0
netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame
0xfffffe0044c4dd00
ether_input() at 0xffffffff80e37f39 = ether_input+0x69/frame 0xfffffe0044c4dd60
vtnet_rxq_eof() at 0xffffffff80a93f2f = vtnet_rxq_eof+0x72f/frame
0xfffffe0044c4de20
ithread_loop() at 0xffffffff80ca3957 = ithread_loop+0x257/frame
0xfffffe0044c4def0
fork_exit() at 0xffffffff80ca039d = fork_exit+0x7d/frame 0xfffffe0044c4df30
fork_trampoline() at 0xffffffff812d1c2e = fork_trampoline+0xe/frame
0xfffffe0044c4df30
--- trap 0xa57f2f0d, rip = 0xb1378a3faf069d41, rsp = 0x7a5d5f3c4604970a, rbp =
0x2b154069806bd89e ---

-- 
You are receiving this mail because:
You are the assignee for the bug.