This is on a slow (and remote :-() i386 (kgdb) bt #0 0xc076bfe8 in doadump () #1 0xc076c008 in doadump () #2 0xc0d00ee0 in suspend_blocked () #3 0xcf607548 in ?? () #4 0xc076bd8b in kern_reboot () #5 0xc076c141 in vpanic () #6 0xc076c03b in panic () #7 0xc0ab5065 in trap_fatal () #8 0xc0ab4de0 in trap () #9 <signal handler called> #10 0xc0991ff0 in dyn_lookup_ipv4_state () #11 0xc0992323 in ipfw_dyn_lookup_state () #12 0xc098e2b9 in ipfw_chk () #13 0xc09983b9 in ipfw_check_packet () #14 0xc0879cf8 in pfil_run_hooks () #15 0xc08983e4 in ip_input () #16 0xc0878e94 in netisr_dispatch_src () #17 0xc0879190 in netisr_dispatch () #18 0xc0860434 in ether_demux () #19 0xc08611c9 in ether_nh_input () #20 0xc0878e94 in netisr_dispatch_src () #21 0xc0879190 in netisr_dispatch () #22 0xc08607aa in ether_input () #23 0xc08574e9 in if_input () #24 0xc05b5bbe in fxp_intr_body () #25 0xc05b4137 in fxp_intr () #26 0xc0732da9 in intr_event_execute_handlers () #27 0xc073303f in ithread_loop () #28 0xc0730351 in fork_exit () #29 <signal handler called> ipfw is compiled into the kernel not loaded as a module. The best I can do to capture where in the boot process it was comes from searching the vmcore file for strings .. [ .. ] <118>devmatch: Can't read linker hints file. <118>add host 127.0.0.1: gateway lo0 fib 0: route already in table <118>add net default: gateway 64.xx.xxx.x <118>Additional inet routing options: gateway=YES. <118>add host ::1: gateway lo0 fib 0: route already in table <118>add net fe80::: gateway ::1 <118>add net ff02::: gateway ::1 <118>add net ::ffff:0.0.0.0: gateway ::1 <118>add net ::0.0.0.0: gateway ::1 <118>add net default: gateway 2001:xxx:xxxx:xxx::x <118>Additional inet6 routing options: gateway=YES. <118>00600 allow ip6 from any to any via lo0 <118>00700 deny ip6 from any to ::1 <118>00800 deny ip6 from ::1 to any <118>00900 allow ip6 from :: to ff02::/16 ipv6-icmp <118>01000 allow ip6 from fe80::/10 to fe80::/10 ipv6-icmp <118>01100 allow ip6 from fe80::/10 to ff02::/16 ipv6-icmp <118>01200 allow ip6 from any to any proto ipv6-icmp ip6 icmp6types 1,2,135,136 <118>01300 allow ip6 from me6 to any <110>ipfw: 4900 Deny TCP 77.72.82.80:50823 202.xx.xxx.xx:7696 in via fxp0 <118>Firewall rules loaded. <5>bridge0: link state changed to DOWN <6>tap0: promiscuous mode enabled <110>ipfw: 4900 Deny TCP 77.72.85.24:57077 202.xx.xxx.xx:33970 in via fxp0 <118>Creating and/or trimming log files <110>ipfw: 4900 Deny TCP 5.188.11.111:59849 202.xx.xxx.xxx:7300 in via fxp0 <118>. <118>Starting syslogd. <110>ipfw: 4900 Deny TCP 5.188.11.25:51041 202.xx.xxx.xxx:20826 in via fxp0 <118>Setting date via ntp. Fatal trap 1: privileged instruction fault while in kernel mode instruction pointer = 0x20:0xc0991ff0 stack pointer = 0x28:0xcf607704 frame pointer = 0x28:0xcf607728 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 12 (irq7: fxp0 fxp1) trap number = 1 panic: privileged instruction fault time = 1518744036 Uptime: 26s Physical memory: 499 MB Dumping 51 MB:Received on Fri Feb 16 2018 - 13:13:27 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:14 UTC