More info Break to debugger starts here: add net default: gateway 192.168.0.1 add net ::ffff:0.0.0.0: gateway ::1 add net ::0.0.0.0: gateway ::1 add net fe80::: gateway ::1 add net ff02::: gateway ::1 Waiting for bge0 to have link. Waiting for 192.168.0.1 to respond to ICMP Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x88622280 fault code = supervisor read, page not present instruction pointer = 0x20:0xc07c7321 stack pointer = 0x28:0xe3adb9e0 frame pointer = 0x28:0xe3adba80 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 536 (ping) [ thread pid 536 tid 100071 ] Stopped at ip_output+0x171: movl %fs:0(%esi),%eax db> bt Tracing pid 536 tid 100071 td 0xc7991900 ip_output(c78c1300,0,0,20,0,...) at ip_output+0x171/frame 0xe3adba80 rip_output(c78c1300,c7a6d680,100a8c0,e3adbb60,c0744bb7,...) at rip_output+0x39c/frame 0xe3adbad8 rip_send(c7a6d680,0,c78c1300,c739e900,0,...) at rip_send+0x4c/frame 0xe3adbaec sosend_generic(c7a6d680,c739e900,e3adbb98,0,0,...) at sosend_generic+0x437/frame 0xe3adbb60 kern_sendit(c7991900,3,e3adbc20,0,0,...) at kern_sendit+0x1c9/frame 0xe3adbbcc sendit(e3adbc20,0,81212f4,0,c739e900,...) at sendit+0xe5/frame 0xe3adbc08 sys_sendto(c7991900,e3adbcc8,c7991bdc,e3adbc5c,c06e029f,...) at sys_sendto+0x5b/frame 0xe3adbc40 syscall(e3adbd08) at syscall+0x363/frame 0xe3adbcfc Xint0x80_syscall() at Xint0x80_syscall+0x21/frame 0xe3adbcfc --- syscall (133, FreeBSD ELF32, sys_sendto), eip = 0x807ebcb, esp = 0xbfbed94c, ebp = 0xbfbed9a0 --- db> ======================== || null_at_pozo.com || || || ======================== -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.Received on Tue Apr 09 2013 - 15:27:09 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:36 UTC