From owner-freebsd-bugs Sun Apr 14 20:30:11 2002 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id B8F4937B404 for ; Sun, 14 Apr 2002 20:30:00 -0700 (PDT) Received: (from gnats@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g3F3U0s79377; Sun, 14 Apr 2002 20:30:00 -0700 (PDT) (envelope-from gnats) Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 4ED7C37B400 for ; Sun, 14 Apr 2002 20:29:49 -0700 (PDT) Received: (from nobody@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g3F3TnZ79327; Sun, 14 Apr 2002 20:29:49 -0700 (PDT) (envelope-from nobody) Message-Id: <200204150329.g3F3TnZ79327@freefall.freebsd.org> Date: Sun, 14 Apr 2002 20:29:49 -0700 (PDT) From: Alexandr To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-1.0 Subject: i386/37086: kernel trap 12 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org >Number: 37086 >Category: i386 >Synopsis: kernel trap 12 >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Apr 14 20:30:00 PDT 2002 >Closed-Date: >Last-Modified: >Originator: Alexandr >Release: FreeBSD 4.5-RELEASE #4: Sat Apr 13 20:09:44 VLAST 2002 >Organization: KhSTU >Environment: FreeBSD service.khstu.ru 4.5-RELEASE FreeBSD 4.5-RELEASE #4: Sat Apr 13 20:09:44 VLAST 2002 regressor@service.khstu.ru:/usr/src/sys/compile/SERVICE i386 >Description: fatal trap 12: page fault while in kernel mode mp_lock = 00000002 ; cpuid = 0 ; lapic.id = 03000000 fault virtual addr = 0xc12bd000 fault code = supervisor read, page not present instruction pointer = 0x8 : c0272502 stack pointer = 0x10 : 0xd6ffcc30 frame pointer = 0x10 : 0xd6ffcc58 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = (316) iserverd interrupt mask = net <- SMP : XXX kernel: type 12 trap, code 0 Stopped at generic_body + 0x1a : repe movsl (%esi), %es:(%edi) ---------------------------------------------------------------- >How-To-Repeat: I dont know.... This problem appears on heavy load... >Fix: :( >Release-Note: >Audit-Trail: >Unformatted: >trace generic_copy(c12bcf00, c2b447e2, 3c, c2447b0, c2b3c50) at generic_copy+0x1a catchpacket(c2b3c500, c12bcf00, 3c, 5ea, c019bac8) at catchpacket+0x15e bpf_mtap(c285aa00, c12bcf00) at bpf_mtap+0x58 wx_start(c285aa00, c12bcf00, c2bfadd0, c2c46500, c12bcf00) at wx_start+0x392 ip_output(c12bcf00, 0, d54cdbfc, 0, 0) at ip_output+0xbc4 udp_output(d54cdbc0, C12bcf00, c2c21f10, 0d49dba40) at udp_output+24a udp_send(d540bf80, 0, c12bcf00, c2c21f10, 0) at udp_send+0x10 sosend(d540bf80, 0, c12bcf00, c2c21f10, 0) at sosend+0x5df sendit(d49dba40, 1, d6fbcf08, 0, 8089d04) at sendit+0x253 sendto(d49dba40, d6fbcf80, 80888c0, bfbfe44c, 8089cd4) at sendto+0x4e syscall2(2f,2f,2f, 8089cd4, bfbfe44c) at syscall2+0x221 Xint0x80_SYScall() at Xint0x80_SYScall+0x26 ----------------------------------------------------------------- System: i386, Intel SR1200 server, netcard: intel pro1000T, dual PIII-1000. ------------------------------------------------------------------ System running: inn, squid, iserverd, postgresql, apache and snort (Intrusion Detection System that use bpf) securelevel=3, ipfw contain 108 rules ------------------------------------------------------------------ Kernel config (cuts): makeoptions DEBUG=-g machine i386 cpu I686_CPU ident SERVICE maxusers 128 options SMP options APIC_IO options NBUF=4096 options NMBCLUSTERS=8192 options PANIC_REBOOT_WAIT_TIME=240 options DDB pseudo-device loop pseudo-device ether pseudo-device tun pseudo-device pty pseudo-device md pseudo-device bpf options IPFIREWALL options IPFIREWALL_VERBOSE options IPFIREWALL_FORWARD options IPFIREWALL_VERBOSE_LIMIT=1000 options IPDIVERT options IPFILTER options IPFILTER_LOG options IPFIREWALL_DEFAULT_TO_ACCEPT options IPSTEALTH options RANDOM_IP_ID options ICMP_BANDLIM options DUMMYNET device miibus device fxp device wx To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message