I was being really nasty to my testmachine and blasted it with ICMP ECHO packets: in_cksum_skip: out of data by 21440 in_cksum_skip: out of data by 21420 Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0xc fault code = supervisor read, page not present instruction pointer = 0x8:0xc0656e6b stack pointer = 0x10:0xc4c46a8c frame pointer = 0x10:0xc4c46ab0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 27 (swi1: net) [thread pid 27 tid 100001 ] Stopped at m_copym+0x2f: movl 0xc(%edx),%eax db> trace Tracing pid 27 tid 100001 td 0xc115a170 m_copym(0,3ffc,1404,1) at m_copym+0x2f ip_fragment(c150f00e,c4c46b80,4000,0,1) at ip_fragment+0x147 ip_output(c14ebe00,0,c4c46b4c,0,0) at ip_output+0x95c icmp_reflect(c4c46bec,c150f022,0,c115a170,0) at icmp_reflect+0x2c8 icmp_input(c14ebe00,14,c4c46c64,46,0) at icmp_input+0x219 ip_input(c14ebe00,18,c08ee2d8,0,c4c46cf0) at ip_input+0xc6 netisr_processqueue(c115d900,4,c1178900,c4c46d1c,c060a8f8) at netisr_processqueue+0x58 swi_net(0,c115a170,0,0,c11621f8) at swi_net+0xeb ithread_loop(c1178900,c4c46d48,c1178900,c060a850,0) at ithread_loop+0xa8 fork_exit(c060a850,c1178900,c4c46d48) at fork_exit+0x58 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xc4c46d7c, ebp = 0 --- db> -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk_at_FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.Received on Fri Jan 07 2005 - 13:02:46 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:25 UTC