From owner-freebsd-hackers@FreeBSD.ORG Mon Jun 1 06:21:13 2009 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 54B34106566B for ; Mon, 1 Jun 2009 06:21:13 +0000 (UTC) (envelope-from asmodean@list.ru) Received: from mx44.mail.ru (mx44.mail.ru [94.100.176.58]) by mx1.freebsd.org (Postfix) with ESMTP id D20A98FC24 for ; Mon, 1 Jun 2009 06:21:12 +0000 (UTC) (envelope-from asmodean@list.ru) Received: from f230.mail.ru (f230.mail.ru [194.186.55.141]) by mx44.mail.ru (mPOP.Fallback_MX) with ESMTP id 8DB8438000DCF for ; Mon, 1 Jun 2009 10:05:48 +0400 (MSD) Received: from mail by f230.mail.ru with local id 1MB0eY-0005z1-00 for freebsd-hackers@freebsd.org; Mon, 01 Jun 2009 10:05:46 +0400 Received: from [78.29.2.32] by win.mail.ru with HTTP; Mon, 01 Jun 2009 10:05:46 +0400 From: Asmodean Dark To: freebsd-hackers@freebsd.org Mime-Version: 1.0 X-Mailer: mPOP Web-Mail 2.19 X-Originating-IP: 78.29.10.8 via proxy [78.29.2.32] Date: Mon, 01 Jun 2009 10:05:46 +0400 X-Mru-Data: 1031:1:1:141:141:0 Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 8bit Message-Id: X-Spam: Not detected X-Mras: Ok Subject: 7.1-STABLE crash X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Asmodean Dark List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 01 Jun 2009 06:21:13 -0000 Hello, We have cluster of FreeBSD VPN servers with running mpd3.18 and sometimes it crash: # uname -a FreeBSD vpn 7.1-STABLE FreeBSD 7.1-STABLE #13: Wed Mar 18 14:53:13 YEKT 2009 root@vpn:/usr/src/sys/i386/compile/kconf i386 # dmesg Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 01 fault virtual address = 0x8 fault code = supervisor read, page not present instruction pointer = 0x20:0x806dcb88 stack pointer = 0x28:0xe70775c4 frame pointer = 0x28:0xe70775e8 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 22 (em0 taskq) trap number = 12 (kgdb) bt #0 0x8063d6b0 in doadump () #1 0x8063dc44 in boot () #2 0x8063e0ca in panic () #3 0x807dab3d in trap_fatal () #4 0x807daeba in trap_pfault () #5 0x807db7bd in trap () #6 0x807c2a3b in calltrap () #7 0x806dcb88 in rn_match () #8 0x806ddc8a in rn_lookup () #9 0x8070e460 in ipfw_chk (args=0xe70175fc) at ../../../netinet/ip_fw2.c:1894 #10 0x80710c3d in ipfw_check_in (arg=0x0, m0=0xe7017700, ifp=0x91c5a800, dir=1, inp=0x0) at ../../../netinet/ip_fw_pfil.c:125 #11 0x806dc20f in pfil_run_hooks () #12 0x80713984 in ip_input (m=0x91954c00) at ../../../netinet/ip_input.c:416 #13 0x806ec0d9 in ng_iface_rcvdata () #14 0x806e9570 in ng_apply_item () #15 0x806e8569 in ng_snd_item () #16 0x806e9570 in ng_apply_item () #17 0x806e8569 in ng_snd_item () #18 0x806e9570 in ng_apply_item () #19 0x806e8569 in ng_snd_item () #20 0x806f16a7 in ng_ppp_proto_recv () #21 0x806f3ed2 in ng_ppp_rcvdata () #22 0x806e9570 in ng_apply_item () #23 0x806e8569 in ng_snd_item () #24 0x806e9570 in ng_apply_item () #25 0x806e8569 in ng_snd_item () #26 0x806ee3c3 in ng_ksocket_incoming2 () #27 0x806e969d in ng_apply_item () #28 0x806ea8aa in ngintr () #29 0x806dab72 in swi_net () #30 0x8061e265 in ithread_loop () #31 0x8061adf5 in fork_exit () #32 0x807c2ab0 in fork_trampoline () What can I do with it? Are additional info needed? Thanks.