Fatal trap on CURRENT

From: Denis Shaposhnikov <dsh_at_vlink.ru>
Date: Thu, 05 Apr 2007 12:06:57 +0400
Hi!

I have CURRENT from Mar 30. And I've got a trap (see below). Something 
wrong with TCP?

Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 06
fault virtual address   = 0xc
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0xc0517f6e
stack pointer           = 0x28:0xe4f08924
frame pointer           = 0x28:0xe4f0892c
code segment            = base 0x0, limit 0xfffff, type 0x1b
                         = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 22 (em0 taskq)
trap number             = 12
panic: page fault
cpuid = 1
Uptime: 2d12h44m47s
Physical memory: 2043 MB
Dumping 292 MB:
telnet> send brk
KDB: enter: Line break on console
[thread pid 22 tid 100022 ]
Stopped at      kdb_enter+0x2b: nop
db> where
Tracing pid 22 tid 100022 td 0xc498e6c0
kdb_enter(c0649fe5) at kdb_enter+0x2b
siointr1(c49e5800) at siointr1+0xce
siointr(c49e5800) at siointr+0x5a
intr_execute_handlers(c48efccc,e4f08530,4,e4f08594,c05fd764,...) at 
intr_execute
_handlers+0xd9
lapic_handle_intr(36,e4f08530) at lapic_handle_intr+0x2f
Xapic_isr1() at Xapic_isr1+0x34
--- interrupt, eip = 0xc0615eb2, esp = 0xe4f08570, ebp = 0xe4f08594 ---
DELAY(a) at DELAY+0x92
ata_start(c49dc400) at ata_start+0x2ff
ata_queue_request(c8fb2900,c4a0d000,c4b74980,10000,0,...) at 
ata_queue_request+0x26f
ad_strategy(e4f085f4,e4f085f4,84,202,0,...) at ad_strategy+0x1c1
ad_dump(c4b74980,c0c22000,0,2e5b4c00,8,...) at ad_dump+0xa4
blk_flush(c069cea0) at blk_flush+0x33
blk_write(c069cea0,0,15a4000,0) at blk_write+0x1fd
minidumpsys(c069cea0,3c,0,4,e4f0879c,...) at minidumpsys+0x50f
dumpsys(c069cea0,e4f087dc,c04d4d46,0,c4b7478c,...) at dumpsys+0x1a
doadump(0,c4b7478c,e4f087fc,c4934c8c,c498e6c0,...) at doadump+0x42
boot(104,104,c498e6c0,28,e4f088e4,...) at boot+0x4e2
panic(c062f23f,c064ede3,0,0,fffff,...) at panic+0x1ab
trap_fatal(e4f088e4,c,c498e6c0,c069b5c0,0,...) at trap_fatal+0x2de
trap_pfault(e4f088e4,0,c) at trap_pfault+0x1c3
trap(e4f088e4) at trap+0x396
calltrap() at calltrap+0x6
--- trap 0xc, eip = 0xc0517f6e, esp = 0xe4f08924, ebp = 0xe4f0892c ---
sbsndptr(cac80634,1651,5b4,e4f0898c,80000,...) at sbsndptr+0x56
tcp_output(c81da000,1a,0,1,2238,...) at tcp_output+0xb1c
tcp_do_segment(ca02bd00,c883a040,cac80570,c81da000,28,0) at 
tcp_do_segment+0x105f
tcp_input(ca02bd00,14,20,1,e4f08b84,...) at tcp_input+0xb5d
ip_input(ca02bd00) at ip_input+0x60a
netisr_dispatch(2,ca02bd00,2ff08bb8,2,c50b1340,...) at netisr_dispatch+0x48
gre_input(ca02bd00,14,ca02bd00,c4b9ac00) at gre_input+0x144
encap4_input(ca02bd00,14,e4f08c14,246,c4964e80,...) at encap4_input+0x142
ip_input(ca02bd00) at ip_input+0x60a
netisr_dispatch(2,ca02bd00,e4f08c74,c49ca800,ca020800,...) at 
netisr_dispatch+0x48
ether_demux(c49ca800,ca02bd00,c497b800,ca02bd00,5d,...) at ether_demux+0x185
ether_input(c49ca800,ca02bd00,c0606e00,40e7278a,22d1f,...) at 
ether_input+0x310
em_handle_rxtx(c497b800,1) at em_handle_rxtx+0x1d2
taskqueue_run(c4983c00) at taskqueue_run+0x137
taskqueue_thread_loop(c497ba14,e4f08d38) at taskqueue_thread_loop+0x8e
fork_exit(c04fb930,c497ba14,e4f08d38) at fork_exit+0x7b
fork_trampoline() at fork_trampoline+0x8
--- trap 0, eip = 0, esp = 0xe4f08d70, ebp = 0 ---

-- 
DSS5-RIPE DSS-RIPN 2:550/5068_at_fidonet 2:550/5069_at_fidonet
xmpp:dsh_at_vlink.ru mailto:dsh_at_vlink.ru http://neva.vlink.ru/~dsh/
Received on Thu Apr 05 2007 - 06:07:00 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:07 UTC