From nobody Sat Oct 19 22:07:14 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XWFzl2NjJz5ZN2K for ; Sat, 19 Oct 2024 22:07:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XWFzl0hgpz4NQn for ; Sat, 19 Oct 2024 22:07:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1729375635; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=sICrvE6fkEYirvEhZJJ8mdIkLUmP4OlyWnLWKsLiEV8=; b=MCQq/iINjkL8hn3up1Nmovm5bGj7SrrNINX0BOaOng4Mt0fheMODEY6idxNb1w0TMkUXj+ aVNO6hTt5QqIEZupbK7TU6qM7BAfCYHApn6RYDsOXAUi8b9t0h1B7WpG4u809IGDLZSSfA HIHyw7AnLL7FB2dN+CXQzJTnHYQA5UYnIeOt76/4Cc6zvknJBTwnpSvQMwHNadT7sXdfQv NJoYIHV335i6d0p943CFZh9dYzLqDYKXdIGKSYElj3CYjOpQESwdxvmD9f//Vad4ipKyJG jsMCmYnUiayJB+MwVxFEEruL+rKhUPYAISceUT0nKcKzxPJh4nPfTbbXjc8Nug== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1729375635; a=rsa-sha256; cv=none; b=M7tXxdTLWxNvxj2V3AncXD1ybiOQ7qlT3vS1CmJO47U9o1HunSHiKB9mIKVNWn9SWxF5Vv mTTH3OgeUKNUHWTIn6MmnXoWCKi7UqXuosyQVHiQ+fSLU0Atc9kQCQe0xkDV+crp2bme/y JTerIZFib0Pf2biOJ8QfpV5rUPyyGSvZELraOPufjpeApC1bzo96EMHQmu8zVEYYXd/O6E vwFBvKdhWdao+idOb4mFXmNsZeNTvd+D5vzl15yeNWprS8mIFhrAygOyd+cip/UHpJa6e7 JWiRVaXbD42DkRrGYM/P2yMFTtkRuZoQfTSjtFZdVsOgrQkM1b9l7/6/bDY6rQ== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XWFzl0JNRzbHr for ; Sat, 19 Oct 2024 22:07:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 49JM7Ehg095169 for ; Sat, 19 Oct 2024 22:07:14 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 49JM7EHe095168 for bugs@FreeBSD.org; Sat, 19 Oct 2024 22:07:14 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 282156] page fault while in kernel mode after 14.0-Release to 14.1-Release upgrade Date: Sat, 19 Oct 2024 22:07:14 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: crash, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282156 --- Comment #4 from Rick Macklem --- Well, if you can capture packets leading up to the crash, that would be useful. # tcpdump -s 0 -w out.pcap host would do it, if the Linux server has tcpdump on it. Then do whatever causes the to crash. If you can do this, you can email me the out.pcap as an attachment, to rmacklem@uoguelph.ca. --=20 You are receiving this mail because: You are the assignee for the bug.=