Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 14 Apr 2002 20:29:49 -0700 (PDT)
From:      Alexandr <AVShutko@mail.khstu.ru>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   i386/37086: kernel trap 12
Message-ID:  <200204150329.g3F3TnZ79327@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         37086
>Category:       i386
>Synopsis:       kernel trap 12
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Apr 14 20:30:00 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator:     Alexandr
>Release:        FreeBSD 4.5-RELEASE #4: Sat Apr 13 20:09:44 VLAST 2002
>Organization:
KhSTU
>Environment:
FreeBSD service.khstu.ru 4.5-RELEASE FreeBSD 4.5-RELEASE #4: Sat Apr 13 20:09:44 VLAST 2002     regressor@service.khstu.ru:/usr/src/sys/compile/SERVICE  i386
>Description:
fatal trap 12: page fault while in kernel mode
mp_lock = 00000002 ; cpuid = 0 ; lapic.id = 03000000

fault virtual addr  = 0xc12bd000
fault code          = supervisor read, page not present
instruction pointer = 0x8 : c0272502
stack pointer       = 0x10 : 0xd6ffcc30
frame pointer       = 0x10 : 0xd6ffcc58
code segment        = base 0x0, limit 0xfffff, type 0x1b
                    = DPL 0, pres 1, def32 1, gran 1

processor eflags    = interrupt enabled, resume, IOPL = 0
current process     = (316) iserverd
interrupt mask      = net <- SMP : XXX

kernel: type 12 trap, code 0

Stopped at generic_body + 0x1a : repe movsl (%esi), %es:(%edi)

----------------------------------------------------------------

>How-To-Repeat:
I dont know.... This problem appears on heavy load...
>Fix:
:(     
>Release-Note:
>Audit-Trail:
>Unformatted:
 >trace
 generic_copy(c12bcf00, c2b447e2, 3c, c2447b0, c2b3c50) at generic_copy+0x1a
 catchpacket(c2b3c500, c12bcf00, 3c, 5ea, c019bac8) at catchpacket+0x15e
 bpf_mtap(c285aa00, c12bcf00) at bpf_mtap+0x58
 wx_start(c285aa00, c12bcf00, c2bfadd0, c2c46500, c12bcf00) at wx_start+0x392
 ip_output(c12bcf00, 0, d54cdbfc, 0, 0) at ip_output+0xbc4
 udp_output(d54cdbc0, C12bcf00, c2c21f10, 0d49dba40) at udp_output+24a
 udp_send(d540bf80, 0, c12bcf00, c2c21f10, 0) at udp_send+0x10
 sosend(d540bf80, 0, c12bcf00, c2c21f10, 0) at sosend+0x5df
 sendit(d49dba40, 1, d6fbcf08, 0, 8089d04) at sendit+0x253
 sendto(d49dba40, d6fbcf80, 80888c0, bfbfe44c, 8089cd4) at sendto+0x4e
 syscall2(2f,2f,2f, 8089cd4, bfbfe44c) at syscall2+0x221
 Xint0x80_SYScall() at Xint0x80_SYScall+0x26
 
 -----------------------------------------------------------------
 System: i386, Intel SR1200 server, netcard: intel pro1000T, 
         dual PIII-1000.
 
 ------------------------------------------------------------------
 System running: inn, squid, iserverd, postgresql, apache 
 and snort (Intrusion Detection System that use bpf)
 securelevel=3, ipfw contain 108 rules
 
 ------------------------------------------------------------------
 Kernel config (cuts): 
 
 makeoptions     DEBUG=-g 
                          
 machine         i386     
 cpu             I686_CPU 
 ident           SERVICE  
 maxusers        128
   
 options         SMP    
 options         APIC_IO
 
 options         NBUF=4096                 
 options         NMBCLUSTERS=8192          
 options         PANIC_REBOOT_WAIT_TIME=240
 options         DDB                       
 
 pseudo-device   loop 
 pseudo-device   ether
 pseudo-device   tun  
 pseudo-device   pty  
 pseudo-device   md   
 pseudo-device   bpf  
 
 options         IPFIREWALL                   
 options         IPFIREWALL_VERBOSE           
 options         IPFIREWALL_FORWARD           
 options         IPFIREWALL_VERBOSE_LIMIT=1000
 options         IPDIVERT                     
 options         IPFILTER                     
 options         IPFILTER_LOG                 
 options         IPFIREWALL_DEFAULT_TO_ACCEPT 
 options         IPSTEALTH                    
                                              
 options         RANDOM_IP_ID                 
 options         ICMP_BANDLIM                 
 options         DUMMYNET                     
 
 device          miibus
 device          fxp   
 device          wx    
      

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204150329.g3F3TnZ79327>