misc/123066: kernel trap with ipsec

misha saf msaf1980 at rambler.ru
Mon Apr 28 11:30:16 UTC 2008


* "Bjoern A. Zeeb" <bzeeb-lists at lists.zabbadoz.net> [Mon, 28 Apr 2008 
08:22:20 +0000 (UTC)]:
> On Mon, 28 Apr 2008, misha saf wrote:
>
> Hi,
>
> > db> trace
> > Tracing pid 996 tid 100075 td 0xc1ed2210
> > generic_bcopy(c1c8b700, c1eeac80,0,14,9,...) at generic_bcopy+0x1a
> > ipsec4_process_packet(c1c8b700, c1eeac80,20,0,c1f00924,...) at
> > ipsec4_process_packet+0x28b
>
>
> Could you alos lookup which line of code this is?
>
> gdb /path/to/kernel.debug
> l *ipsec4_process_packet+0x28b
>
> --
> Bjoern A. Zeeb              Stop bit received. Insert coin for new 
game.

(gdb) l *ipsec4_process_packet+0x28b
0xc08fecab is in ipsec4_process_packet 
(/usr/src/sys/netipsec/ipsec_output.c:486).
481              */
482             if (sav->tdb_xform->xf_type != XF_IP4) {
483                     ip = mtod(m, struct ip *);
484                     i = ip->ip_hl << 2;
485                     off = offsetof(struct ip, ip_p);
486                     error = (*sav->tdb_xform->xf_output)(m, isr, 
NULL, i, off);
487             } else {
488                     error = ipsec_process_done(m, isr);
489             }
490             IPSECREQUEST_UNLOCK(isr);


More information about the freebsd-net mailing list