[Bug 276674] [panic] [htcp] sysctl net.inet.tcp.cc.algorithm=htcp produces kernel panic
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 06 Feb 2024 14:46:21 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=276674 --- Comment #5 from Vladyslav V. Prodan <admin@support.od.ua> --- Fresh panic. Fatal trap 18: integer divide fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff830172f1 stack pointer = 0x28:0xfffffe0044c4d838 frame pointer = 0x28:0xfffffe0044c4d840 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 12 (irq25: virtio_pci0) trap number = 18 panic: integer divide fault cpuid = 0 time = 1707207718 KDB: stack backtrace: db_trace_self_wrapper() at 0xffffffff804e375b = db_trace_self_wrapper+0x2b/frame 0xfffffe0044c4d650 vpanic() at 0xffffffff80ce6a92 = vpanic+0x152/frame 0xfffffe0044c4d6a0 panic() at 0xffffffff80ce6933 = panic+0x43/frame 0xfffffe0044c4d700 trap_fatal() at 0xffffffff812faacd = trap_fatal+0x38d/frame 0xfffffe0044c4d760 calltrap() at 0xffffffff812d0bb8 = calltrap+0x8/frame 0xfffffe0044c4d760 --- trap 0x12, rip = 0xffffffff830172f1, rsp = 0xfffffe0044c4d838, rbp = 0xfffffe0044c4d840 --- htcp_ack_received() at 0xffffffff830172f1 = htcp_ack_received+0x231/frame 0xfffffe0044c4d840 cc_ack_received() at 0xffffffff80f5cadc = cc_ack_received+0x28c/frame 0xfffffe0044c4d8a0 tcp_do_segment() at 0xffffffff80f61590 = tcp_do_segment+0x2be0/frame 0xfffffe0044c4d970 tcp_input_with_port() at 0xffffffff80f5dc2d = tcp_input_with_port+0xabd/frame 0xfffffe0044c4dab0 tcp6_input_with_port() at 0xffffffff80f5d10a = tcp6_input_with_port+0x6a/frame 0xfffffe0044c4dae0 tcp6_input() at 0xffffffff80f5e47b = tcp6_input+0xb/frame 0xfffffe0044c4daf0 ip6_input() at 0xffffffff80fb11a4 = ip6_input+0x9b4/frame 0xfffffe0044c4dbd0 netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame 0xfffffe0044c4dc20 ether_demux() at 0xffffffff80e37bc9 = ether_demux+0x149/frame 0xfffffe0044c4dc50 ether_nh_input() at 0xffffffff80e38ee9 = ether_nh_input+0x379/frame 0xfffffe0044c4dcb0 netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame 0xfffffe0044c4dd00 ether_input() at 0xffffffff80e37f39 = ether_input+0x69/frame 0xfffffe0044c4dd60 vtnet_rxq_eof() at 0xffffffff80a93f2f = vtnet_rxq_eof+0x72f/frame 0xfffffe0044c4de20 vtnet_rx_vq_process() at 0xffffffff80a936f8 = vtnet_rx_vq_process+0xb8/frame 0xfffffe0044c4de60 ithread_loop() at 0xffffffff80ca3957 = ithread_loop+0x257/frame 0xfffffe0044c4def0 fork_exit() at 0xffffffff80ca039d = fork_exit+0x7d/frame 0xfffffe0044c4df30 fork_trampoline() at 0xffffffff812d1c2e = fork_trampoline+0xe/frame 0xfffffe0044c4df30 --- trap 0xa57f2f0d, rip = 0xb1378a3faf069d41, rsp = 0x7a5d5f3c4604970a, rbp = 0x2b154069806bd89e --- KDB: enter: panic -- You are receiving this mail because: You are the assignee for the bug.