misc/123066: kernel trap with ipsec
misha saf
msaf1980 at rambler.ru
Mon Apr 28 11:30:16 UTC 2008
* "Bjoern A. Zeeb" <bzeeb-lists at lists.zabbadoz.net> [Mon, 28 Apr 2008
08:22:20 +0000 (UTC)]:
> On Mon, 28 Apr 2008, misha saf wrote:
>
> Hi,
>
> > db> trace
> > Tracing pid 996 tid 100075 td 0xc1ed2210
> > generic_bcopy(c1c8b700, c1eeac80,0,14,9,...) at generic_bcopy+0x1a
> > ipsec4_process_packet(c1c8b700, c1eeac80,20,0,c1f00924,...) at
> > ipsec4_process_packet+0x28b
>
>
> Could you alos lookup which line of code this is?
>
> gdb /path/to/kernel.debug
> l *ipsec4_process_packet+0x28b
>
> --
> Bjoern A. Zeeb Stop bit received. Insert coin for new
game.
(gdb) l *ipsec4_process_packet+0x28b
0xc08fecab is in ipsec4_process_packet
(/usr/src/sys/netipsec/ipsec_output.c:486).
481 */
482 if (sav->tdb_xform->xf_type != XF_IP4) {
483 ip = mtod(m, struct ip *);
484 i = ip->ip_hl << 2;
485 off = offsetof(struct ip, ip_p);
486 error = (*sav->tdb_xform->xf_output)(m, isr,
NULL, i, off);
487 } else {
488 error = ipsec_process_done(m, isr);
489 }
490 IPSECREQUEST_UNLOCK(isr);
More information about the freebsd-net
mailing list