On Wed, Jun 08, 2022 at 08:50:28AM +0200, Hans Petter Selasky wrote:
> Hi,
>
> Does this patch fix your issue?
>
> --HPS
>
(As you noted later, that patch had been committed to head by the time I
got around to checking, as:
commit ce2525c8108a830d08d75771621d1bc580edd82c (HEAD -> main, ori
Hi,
Does this patch fix your issue?
--HPScommit cc7a224fa956372cc5c5b4d29aa6906d79bd9f26
Author: Hans Petter Selasky
Date: Wed Jun 8 08:49:55 2022 +0200
tcp: Skip sackhole KASSERTS() on NULL
Inadvertedly introduced NULL pointer dereference during
sackhole sanity check in D35
On Tue, Jun 07, 2022 at 09:37:52PM -0400, Oleg Lelchuk wrote:
> The 14-CURRENT running a fresh kernel crashes with these messages:
>
> __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
> 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
> pcpu,
>
The 14-CURRENT running a fresh kernel crashes with these messages:
__curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55
55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct
pcpu,
(kgdb) #0 __curthread () at
/usr/src/sys/amd64/include/pc