Hi! I have CURRENT from Mar 30. And I've got a trap (see below). Something wrong with TCP? Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 06 fault virtual address = 0xc fault code = supervisor read, page not present instruction pointer = 0x20:0xc0517f6e stack pointer = 0x28:0xe4f08924 frame pointer = 0x28:0xe4f0892c code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 22 (em0 taskq) trap number = 12 panic: page fault cpuid = 1 Uptime: 2d12h44m47s Physical memory: 2043 MB Dumping 292 MB: telnet> send brk KDB: enter: Line break on console [thread pid 22 tid 100022 ] Stopped at kdb_enter+0x2b: nop db> where Tracing pid 22 tid 100022 td 0xc498e6c0 kdb_enter(c0649fe5) at kdb_enter+0x2b siointr1(c49e5800) at siointr1+0xce siointr(c49e5800) at siointr+0x5a intr_execute_handlers(c48efccc,e4f08530,4,e4f08594,c05fd764,...) at intr_execute _handlers+0xd9 lapic_handle_intr(36,e4f08530) at lapic_handle_intr+0x2f Xapic_isr1() at Xapic_isr1+0x34 --- interrupt, eip = 0xc0615eb2, esp = 0xe4f08570, ebp = 0xe4f08594 --- DELAY(a) at DELAY+0x92 ata_start(c49dc400) at ata_start+0x2ff ata_queue_request(c8fb2900,c4a0d000,c4b74980,10000,0,...) at ata_queue_request+0x26f ad_strategy(e4f085f4,e4f085f4,84,202,0,...) at ad_strategy+0x1c1 ad_dump(c4b74980,c0c22000,0,2e5b4c00,8,...) at ad_dump+0xa4 blk_flush(c069cea0) at blk_flush+0x33 blk_write(c069cea0,0,15a4000,0) at blk_write+0x1fd minidumpsys(c069cea0,3c,0,4,e4f0879c,...) at minidumpsys+0x50f dumpsys(c069cea0,e4f087dc,c04d4d46,0,c4b7478c,...) at dumpsys+0x1a doadump(0,c4b7478c,e4f087fc,c4934c8c,c498e6c0,...) at doadump+0x42 boot(104,104,c498e6c0,28,e4f088e4,...) at boot+0x4e2 panic(c062f23f,c064ede3,0,0,fffff,...) at panic+0x1ab trap_fatal(e4f088e4,c,c498e6c0,c069b5c0,0,...) at trap_fatal+0x2de trap_pfault(e4f088e4,0,c) at trap_pfault+0x1c3 trap(e4f088e4) at trap+0x396 calltrap() at calltrap+0x6 --- trap 0xc, eip = 0xc0517f6e, esp = 0xe4f08924, ebp = 0xe4f0892c --- sbsndptr(cac80634,1651,5b4,e4f0898c,80000,...) at sbsndptr+0x56 tcp_output(c81da000,1a,0,1,2238,...) at tcp_output+0xb1c tcp_do_segment(ca02bd00,c883a040,cac80570,c81da000,28,0) at tcp_do_segment+0x105f tcp_input(ca02bd00,14,20,1,e4f08b84,...) at tcp_input+0xb5d ip_input(ca02bd00) at ip_input+0x60a netisr_dispatch(2,ca02bd00,2ff08bb8,2,c50b1340,...) at netisr_dispatch+0x48 gre_input(ca02bd00,14,ca02bd00,c4b9ac00) at gre_input+0x144 encap4_input(ca02bd00,14,e4f08c14,246,c4964e80,...) at encap4_input+0x142 ip_input(ca02bd00) at ip_input+0x60a netisr_dispatch(2,ca02bd00,e4f08c74,c49ca800,ca020800,...) at netisr_dispatch+0x48 ether_demux(c49ca800,ca02bd00,c497b800,ca02bd00,5d,...) at ether_demux+0x185 ether_input(c49ca800,ca02bd00,c0606e00,40e7278a,22d1f,...) at ether_input+0x310 em_handle_rxtx(c497b800,1) at em_handle_rxtx+0x1d2 taskqueue_run(c4983c00) at taskqueue_run+0x137 taskqueue_thread_loop(c497ba14,e4f08d38) at taskqueue_thread_loop+0x8e fork_exit(c04fb930,c497ba14,e4f08d38) at fork_exit+0x7b fork_trampoline() at fork_trampoline+0x8 --- trap 0, eip = 0, esp = 0xe4f08d70, ebp = 0 --- -- DSS5-RIPE DSS-RIPN 2:550/5068_at_fidonet 2:550/5069_at_fidonet xmpp:dsh_at_vlink.ru mailto:dsh_at_vlink.ru http://neva.vlink.ru/~dsh/Received on Thu Apr 05 2007 - 06:07:00 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:07 UTC