On Wed, Feb 27, 2019 at 11:54:20PM +0300, Slawa Olhovchenkov wrote:
> Is this known issuse?
>
> Fatal trap 9: general protection fault while in kernel mode
> cpuid = 13; apic id = 2a
> instruction pointer = 0x20:0x806b6a94
> stack pointer = 0x28:0xfe2026e274f0
> frame pointer = 0x28:0xfe2026e274f0
> code segment= base 0x0, limit 0xf, type 0x1b
> = DPL 0, pres 1, long 1, def32 0, gran 1
> processor eflags= interrupt enabled, resume, IOPL = 0
> current process = 12 (irq295: t5nex0:0a5)
> trap number = 9
> panic: general protection fault
> cpuid = 13
> KDB: stack backtrace:
> db_trace_self_wrapper() at 0x8032667b =
> db_trace_self_wrapper+0x2b/frame 0xfe2026e27130
> vpanic() at 0x804c2006 = vpanic+0x186/frame 0xfe2026e271b0
> panic() at 0x804c1e73 = panic+0x43/frame 0xfe2026e27210
> trap_fatal() at 0x807503f2 = trap_fatal+0x322/frame 0xfe2026e27260
> trap() at 0x8074fa5e = trap+0x5e/frame 0xfe2026e27420
> calltrap() at 0x80735771 = calltrap+0x8/frame 0xfe2026e27420
> --- trap 0x9, rip = 0x806b6a94, rsp = 0xfe2026e274f0, rbp =
> 0xfe2026e274f0 ---
> key_addref() at 0x806b6a94 = key_addref+0x4/frame 0xfe2026e274f0
> ipsec_getpcbpolicy() at 0x806b20b9 = ipsec_getpcbpolicy+0x49/frame
> 0xfe2026e27530
> ipsec4_getpolicy() at 0x806b10a5 = ipsec4_getpolicy+0x25/frame
> 0xfe2026e275d0
> ipsec4_in_reject() at 0x806b138b = ipsec4_in_reject+0x1b/frame
> 0xfe2026e27600
> tcp_input() at 0x8066127c = tcp_input+0x97c/frame 0xfe2026e27740
> ip_input() at 0x805e447f = ip_input+0x10f/frame 0xfe2026e277a0
> netisr_dispatch_src() at 0x805c4750 = netisr_dispatch_src+0xa0/frame
> 0xfe2026e277f0
> ether_demux() at 0x805b43ff = ether_demux+0x13f/frame
> 0xfe2026e27820
> ether_nh_input() at 0x805b506b = ether_nh_input+0x31b/frame
> 0xfe2026e27880
> netisr_dispatch_src() at 0x805c4750 = netisr_dispatch_src+0xa0/frame
> 0xfe2026e278d0
> ether_input() at 0x805b4676 = ether_input+0x26/frame
> 0xfe2026e278f0
> t4_eth_rx() at 0x816403b3 = t4_eth_rx+0x103/frame 0xfe2026e27910
> service_iq() at 0x81644886 = service_iq+0x4a6/frame 0xfe2026e279c0
> t4_intr() at 0x81644b3e = t4_intr+0x2e/frame 0xfe2026e279e0
> intr_event_execute_handlers() at 0x804871ac =
> intr_event_execute_handlers+0xec/frame 0xfe2026e27a20
> ithread_loop() at 0x80487846 = ithread_loop+0xd6/frame
> 0xfe2026e27a70
> fork_exit() at 0x80484805 = fork_exit+0x85/frame 0xfe2026e27ab0
> fork_trampoline() at 0x80735cae = fork_trampoline+0xe/frame
> 0xfe2026e27ab0
> --- trap 0, rip = 0, rsp = 0, rbp = 0 ---
> Uptime: 657d14h33m52s
kgdb decode:
Unread portion of the kernel message buffer:
Fatal trap 9: general protection fault while in kernel mode
cpuid = 13; apic id = 2a
instruction pointer = 0x20:0x806b6a94
stack pointer = 0x28:0xfe2026e274f0
frame pointer = 0x28:0xfe2026e274f0
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 12 (irq295: t5nex0:0a5)
trap number = 9
panic: general protection fault
cpuid = 13
KDB: stack backtrace:
db_trace_self_wrapper() at 0x8032667b =
db_trace_self_wrapper+0x2b/frame 0xfe2026e27130
vpanic() at 0x804c2006 = vpanic+0x186/frame 0xfe2026e271b0
panic() at 0x804c1e73 = panic+0x43/frame 0xfe2026e27210
trap_fatal() at 0x807503f2 = trap_fatal+0x322/frame 0xfe2026e27260
trap() at 0x8074fa5e = trap+0x5e/frame 0xfe2026e27420
calltrap() at 0x80735771 = calltrap+0x8/frame 0xfe2026e27420
--- trap 0x9, rip = 0x806b6a94, rsp = 0xfe2026e274f0, rbp =
0xfe2026e274f0 ---
key_addref() at 0x806b6a94 = key_addref+0x4/frame 0xfe2026e274f0
ipsec_getpcbpolicy() at 0x806b20b9 = ipsec_getpcbpolicy+0x49/frame
0xfe2026e27530
ipsec4_getpolicy() at 0x806b10a5 = ipsec4_getpolicy+0x25/frame
0xfe2026e275d0
ipsec4_in_reject() at 0x806b138b = ipsec4_in_reject+0x1b/frame
0xfe2026e27600
tcp_input() at 0x8066127c = tcp_input+0x97c/frame 0xfe2026e27740
ip_input() at 0x805e447f = ip_input+0x10f/frame 0xfe2026e277a0
netisr_dispatch_src() at 0x805c4750 = netisr_dispatch_src+0xa0/frame
0xfe2026e277f0
ether_demux() at 0x805b43ff = ether_demux+0x13f/frame 0xfe2026e27820
ether_nh_input() at 0x805b506b = ether_nh_input+0x31b/frame
0xfe2026e27880
netisr_dispatch_src() at 0x805c4750 = netisr_dispatch_src+0xa0/frame
0xfe2026e278d0
ether_input() at 0x