Date: Wed, 20 Jul 2022 18:45:01 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 264257] [tcp] Panic: Fatal trap 12: page fault while in kernel mode (if_io_tqg_4) - m_copydata ... at /usr/src/sys/kern/uipc_mbuf.c:659 Message-ID: <bug-264257-7501-36nDtvcOLf@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-264257-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-264257-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D264257 --- Comment #85 from Richard Scheffenegger <rscheff@freebsd.org> --- Hi Chad, Thank you very much for your effort. Are you sure about this panic - in the backtrace, it looks like an issue happend in=20 #6 0xffffffff80d55ec7 at pfil_run_hooks+0x97 #7 0xffffffff8239af37 at bridge_pfil+0x497 (bridging code, not tcp). In the few instances we have seen in more detail, it looked like TLS handsh= ake was being performed when - for one reason or another - there was no response from the client for an extended period of time (probably 1-2 min), before seeing ACKs (and SACKs) again. The IP stats in your case seem pretty clean - we suspected that a missing adjustment in a local error handling path may have something to do with thi= s, but after doing some error injection prior and after addressing this, the behavior seems sufficiently different that I'm not convinced that is the culprit either. --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-264257-7501-36nDtvcOLf>