[Bug 260393] Page Fault tcp_output/tcp_input

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 22 Dec 2021 13:59:39 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260393

--- Comment #48 from Dobri Dobrev <ddobrev85@gmail.com> ---
(In reply to Hans Petter Selasky from comment #47)

Here is from frame 10:

(kgdb)  frame 10
#10 0xffffffff80dcd382 in tcp_do_segment (m=<optimized out>, th=<optimized
out>, so=<optimized out>, tp=0xfffffe0251638870, drop_hdrlen=40,
tlen=<optimized out>, iptos=0 '\000') at /usr/src/sys/netinet/tcp_input.c:2822
warning: Source file is more recent than executable.
2822                                                    tcp_sack_partialack(tp,
th);
(kgdb) print /x *tp->t_inpcb
$1 = {inp_hash = {cle_next = 0x0, cle_prev = 0xfffffe02092fde90},
inp_pcbgrouphash = {cle_next = 0x0, cle_prev = 0x0}, inp_lock = {lock_object =
{lo_name = 0xffffffff8117b820, lo_flags = 0x56b0000, lo_data = 0x0, lo_witness
= 0x0}, 
    rw_lock = 0xfffffe00d6bd4560}, inp_hpts = {tqe_next = 0x0, tqe_prev = 0x0},
inp_hpts_request = 0x0, inp_in_hpts = 0x0, inp_in_input = 0x0, inp_hpts_cpu =
0x0, inp_irq_cpu = 0x0, inp_refcount = 0x2, inp_flags = 0x8802000, 
  inp_flags2 = 0x0, inp_input_cpu = 0x0, inp_hpts_cpu_set = 0x0,
inp_input_cpu_set = 0x0, inp_hpts_calls = 0x0, inp_input_calls = 0x0,
inp_irq_cpu_set = 0x0, inp_spare_bits2 = 0x0, inp_numa_domain = 0xff, inp_ppcb
= 0xfffffe0251638870, 
  inp_socket = 0xfffff8010ef223b0, inp_hptsslot = 0x0, inp_hpts_drop_reas =
0x0, inp_input = {tqe_next = 0x0, tqe_prev = 0x0}, inp_pcbinfo =
0xfffffe00d6a89758, inp_pcbgroup = 0x0, inp_pcbgroup_wild = {cle_next = 0x0,
cle_prev = 0x0}, 
  inp_cred = 0xfffff80103fa9500, inp_flow = 0x0, inp_vflag = 0x1, inp_ip_ttl =
0x40, inp_ip_p = 0x0, inp_ip_minttl = 0x0, inp_flowid = 0x73b2783d, inp_snd_tag
= 0x0, inp_flowtype = 0x82, inp_rss_listen_bucket = 0x0, inp_inc = {
    inc_flags = 0x0, inc_len = 0x0, inc_fibnum = 0x1, inc_ie = {ie_fport =
0x49c2, ie_lport = 0xf710, ie_dependfaddr = {id46_addr = {ia46_pad32 = {0x0,
0x0, 0x0}, ia46_addr4 = {s_addr = 0xd6a971c5}}, id6_addr = {__u6_addr = {
            __u6_addr8 = {0x0 <repeats 12 times>, 0xc5, 0x71, 0xa9, 0xd6},
__u6_addr16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71c5, 0xd6a9}, __u6_addr32 =
{0x0, 0x0, 0x0, 0xd6a971c5}}}}, ie_dependladdr = {id46_addr = {ia46_pad32 =
{0x0, 
            0x0, 0x0}, ia46_addr4 = {s_addr = 0xd011ca95}}, id6_addr =
{__u6_addr = {__u6_addr8 = {0x0 <repeats 12 times>, 0x95, 0xca, 0x11, 0xd0},
__u6_addr16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca95, 0xd011}, __u6_addr32 =
{0x0, 0x0, 
              0x0, 0xd011ca95}}}}, ie6_zoneid = 0x0}}, inp_label = 0x0, inp_sp
= 0xfffff8084f4d5a20, {inp_ip_tos = 0x0, inp_options = 0x0, inp_moptions =
0x0}, {in6p_options = 0x0, in6p_outputopts = 0x0, in6p_moptions = 0x0, 
    in6p_icmp6filt = 0x0, in6p_cksum = 0x0, in6p_hops = 0x0}, inp_portlist =
{cle_next = 0xfffff80bfc660d90, cle_prev = 0xfffff8080f614d00}, inp_phd =
0xfffff80105455c40, inp_gencnt = 0xc6f8d0f, spare_ptr = 0x0, inp_rt_cookie =
0x63, {
    inp_route = {ro_nh = 0xfffff8010e7a5e00, ro_lle = 0xfffff8015b783000,
ro_prepend = 0x0, ro_plen = 0x0, ro_flags = 0x180, ro_mtu = 0x0, spare = 0x0,
ro_dst = {sa_len = 0x10, sa_family = 0x2, sa_data = {0x0, 0x0, 0xc5, 0x71,
0xa9, 
          0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, inp_route6 = {ro_nh
= 0xfffff8010e7a5e00, ro_lle = 0xfffff8015b783000, ro_prepend = 0x0, ro_plen =
0x0, ro_flags = 0x180, ro_mtu = 0x0, spare = 0x0, ro_dst = {sin6_len = 0x10, 
        sin6_family = 0x2, sin6_port = 0x0, sin6_flowinfo = 0xd6a971c5,
sin6_addr = {__u6_addr = {__u6_addr8 = {0x0 <repeats 16 times>}, __u6_addr16 =
{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, __u6_addr32 = {0x0, 0x0, 0x0, 0x0}}}, 
        sin6_scope_id = 0x0}}}, inp_list = {cle_next = 0xfffff8015ba7dd90,
cle_prev = 0xfffff8080f614d70}, inp_epoch_ctx = {data = {0x0, 0x0}}}
(kgdb)

-- 
You are receiving this mail because:
You are the assignee for the bug.