On Mon, 2004-02-16 at 14:39, Max Laier wrote: > On Monday 16 February 2004 13:00, Jiri Mikulas wrote: > > Hello > > > > >Can you also provide 'args' and '*dummytag' from the same frame? > > > > > >Thanks in advance. > > > > ~~~cut~~~ > > #6 0xc05726c8 in ip_output (m=0xc10f7200, opt=0x0, ro=0xc2abab68, > > flags=1, imo=0x0, inp=0x0) at /usr/src/sys/netinet/ip_output.c:983 > > 983 if (sw_csum & CSUM_DELAY_DATA) { > > (kgdb) inspect args > > $1 = {m = 0xc10f7200, oif = 0x0, next_hop = 0x0, rule = 0xc2943800, eh > > = 0x0, ro = 0x1, dst = 0xc2abab40, flags = -1055947264, f_id = { dst_ip > > = 169558539, src_ip = 169542160, dst_port = 64147, src_port = 80, proto > > = 6 '\006', flags = 18 '\022'}, retval = 48} > > (kgdb) inspect *dummytag > > $2 = {m_tag_link = {sle_next = 0x0}, m_tag_id = 15, m_tag_len = 48, > > m_tag_cookie = 0, m_tag_free = 0xc0522614 <_m_tag_free>} > > (kgdb) > > ~~~cut~~~ > > > > ok?:) > > Jiri > > Well, we hit the dummynet case for sure and should get the proper > interface pointer from the packet tag. Nothing changed with the > processing there. The only change I found is, that the presents of a > dummynet tag in ip_output previously reset flags, which is no longer that > case. Can you try attached patch to see if that is the issue (from > reading the code I don't really hope that this will be it, but it's the > only thing I can come up with atm, sorry.) I can provide this backtrace of today's current if it's of any additional help: Fatal trap 12: page fault while in kernel mode fault virtual address = 0x98 fault code = supervisor read, page not present instruction pointer = 0x8:0xc05384f6 stack pointer = 0x10:0xd25daa2c frame pointer = 0x10:0xd25daab4 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 28 (swi8: clock) trap number = 12 panic: page fault at line 819 in file /usr/src/sys/i386/i386/trap.c #0 doadump () at /usr/src/sys/kern/kern_shutdown.c:240 #1 0xc04c19c5 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:374 #2 0xc04c1c93 in __panic () at /usr/src/sys/kern/kern_shutdown.c:552 #3 0xc05f4b30 in trap_fatal (frame=0xd25da9ec, eva=152) at /usr/src/sys/i386/i386/trap.c:819 #4 0xc05f4867 in trap_pfault (frame=0xd25da9ec, usermode=0, eva=152) at /usr/src/sys/i386/i386/trap.c:733 #5 0xc05f44e9 in trap (frame= {tf_fs = 24, tf_es = 16, tf_ds = 16, tf_edi = -1053484592, tf_esi = 0, tf_ebp = -765613388, tf_isp = -765613544, tf_ebx = 0, tf_edx = -1053484800, tf_ecx = 1, tf_eax = -1053484800, tf_trapno = 12, tf_err = 0, tf_eip = -1068268298, tf_cs = 8, tf_eflags = 66054, tf_esp = 0, tf_ss = -1012312256}) at /usr/src/sys/i386/i386/trap.c:420 #6 0xc05e87d8 in calltrap () at {standard input}:94 #7 0xc053ffaf in tcp_respond (tp=0x0, ipgen=0x0, th=0xc13519e4, m=0xc1351900, ack=64008803, seq=0, flags=20) at /usr/src/sys/netinet/tcp_subr.c:544 #8 0xc053e0d9 in tcp_input (m=0xc1351900, off0=20) at /usr/src/sys/netinet/tcp_input.c:2413 #9 0xc05368fb in ip_input (m=0xc1351900) at /usr/src/sys/netinet/ip_input.c:941 #10 0xc052ddc6 in transmit_event (pipe=0xc3587400) at /usr/src/sys/netinet/ip_dummynet.c:467 #11 0xc052e0a0 in ready_event (q=0xc407d100) at /usr/src/sys/netinet/ip_dummynet.c:620 #12 0xc052e5e3 in dummynet (unused=0x0) at /usr/src/sys/netinet/ip_dummynet.c:775 #13 0xc04ceace in softclock (dummy=0x0) at /usr/src/sys/kern/kern_timeout.c:226 #14 0xc04b2164 in ithread_loop (arg=0xc1339500) at /usr/src/sys/kern/kern_intr.c:547 #15 0xc04b153c in fork_exit (callout=0xc04b2030 <ithread_loop>, arg=0xc1339500, frame=0xd25dad48) at /usr/src/sys/kern/kern_fork.c:802Received on Mon Feb 16 2004 - 14:40:12 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:43 UTC