crash dump on releng_4 (with debugging symbols)

Mike Tancsa mike at sentex.net
Thu Jan 29 07:14:55 PST 2004


Any idea if this is a hardware issue or bug ?  Its vaguely reminiscent of 
some of the post PAE issues.


4.9-STABLE FreeBSD 4.9-STABLE #0: Sun Nov 23 12:28:50 EST 2003 (kernel 
config at the end).


# gdb -k /kernel.debug vmcore.1
GNU gdb 4.18 (FreeBSD)
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i386-unknown-freebsd"...Deprecated bfd_read 
called at 
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c 
line 2627 in elfstab_build_psymtabs
Deprecated bfd_read called at 
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c 
line 933 in fill_symbuf

IdlePTD at phsyical address 0x0039d000
initial pcb at physical address 0x002fc080
panicstr: page fault
panic messages:
---
Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0xc04
fault code              = supervisor read, page not present
instruction pointer     = 0x8:0xc02822f2
stack pointer           = 0x10:0xcdfafc00
frame pointer           = 0x10:0xcdfafc0c
code segment            = base 0x0, limit 0xfffff, type 0x1b
                         = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 65665 (sendmail)
interrupt mask          = net tty bio cam
trap number             = 12
panic: page fault

syncing disks... 11
done
Uptime: 66d11h10m58s

dumping to dev #ad/0x20001, offset 1575424
dump ata0: resetting devices .. done
254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 
235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 
216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 
197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 
159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 
140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
---
#0  dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487
487             if (dumping++) {

(kgdb) bt full
#0  dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487
         error = 0
#1  0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316
         howto = 256
#2  0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at 
/usr/src/sys/kern/kern_shutdown.c:595
         fmt = 0xc02ce16c "%s"
         bootopt = 256
         buf = "page fault", '\000' <repeats 245 times>
#3  0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at 
/usr/src/sys/i386/i386/trap.c:974
         frame = (struct trapframe *) 0x100
         eva = 0
         code = -1070800532
         type = 12
         ss = -1070800532
         esp = 0
         softseg = {ssd_base = 0, ssd_limit = 1048575, ssd_type = 27, 
ssd_dpl = 0, ssd_p = 1, ssd_xx = 11,
   ssd_xx1 = 1, ssd_def32 = 1, ssd_gran = 1}
#4  0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at 
/usr/src/sys/i386/i386/trap.c:867
         va = 0
         vm = (struct vmspace *) 0x0
         map = 0xcdf63340
         rv = 0
         ftype = 1 '\001'
         p = (struct proc *) 0xcdf48a40
#5  0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608, 
tf_ds = 16, tf_edi = -1068145252,
       tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524, 
tf_ebx = -840671820, tf_edx = 769,
       tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip = 
-1071111438, tf_cs = 8,
       tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at 
/usr/src/sys/i386/i386/trap.c:466
         p = (struct proc *) 0xcdf48a40
         sticks = 3223703848
         i = 0
         ucode = 0
         type = 12
         code = 0
         eva = 3076
#6  0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at 
/usr/src/sys/i386/i386/pmap.c:704
---Type <return> to continue, or q <return> to quit---
         pmap = 0x6fc25a
         va = 3226822044
         pde = (pd_entry_t *) 0x0
         newpf = 0
#7  0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at 
/usr/src/sys/i386/i386/pmap.c:1757
         m = 0xc06a3ad0
         pv = 0xc08af990
         pte = (pt_entry_t *) 0x0
         tpte = 0
         s = 7324250
#8  0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at 
/usr/src/sys/i386/i386/pmap.c:2915
         m = 0xc06a3ad0
         prot = 0 '\000'
#9  0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at 
/usr/src/sys/vm/vm_page.h:461
         mem = 0xc06a3ad0
         pp = 0x0
         new_pindex = 21
         next = 0xc077d294
         backing_offset_index = 0
         backing_object = 0xcd9873f4
         p = 0xc06a3ad0
         s = 0
         object = 0xcd7b3f18
         backing_object = 0xcd9873f4
         object = 0xcd7b3f18
#10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at 
/usr/src/sys/vm/vm_object.c:368
         robject = 0xcd7b3f18
         object = 0xcd7b3f18
         temp = 0xcd7b3f18
#11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at 
/usr/src/sys/vm/vm_map.c:2057
         map = 0xcdf63340
         entry = 0xcdec8f30
#12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168) 
at /usr/src/sys/vm/vm_map.c:2177
         next = 0xce08b1e0
         s = 135098368
         e = 135192576
---Type <return> to continue, or q <return> to quit---
         offidxstart = 0
         offidxend = 23
         count = 23
         start = 3447058708
         object = 0xcd75f114
         entry = 0xcdec8f30
         first_entry = 0xcdf63340
#13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168) 
at /usr/src/sys/vm/vm_map.c:2202
         map = 0xcdf63340
         start = 0
         end = 3217031168
         result = 0
         s = 0
#14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at 
/usr/src/sys/kern/kern_exec.c:538
         imgp = (struct image_params *) 0xcdfafe24
         error = 0
         vmspace = (struct vmspace *) 0xcdf63340
         stack_addr = 3149922304
         map = 0xcdf63340
#15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at 
/usr/src/sys/kern/imgact_elf.c:507
         hdr = (Elf_Ehdr *) 0xcb0a5000
         phdr = (Elf_Phdr *) 0xcb0a5034
         elf_auxargs = (Elf_Auxargs *) 0x0
         vmspace = (struct vmspace *) 0xcdfafd8c
         prot = 0 '\000'
         text_size = 0
         data_size = 0
         total_size = 0
         text_addr = 0
         data_addr = 0
         seg_size = 0
         seg_addr = 0
         addr = 3455778228
         entry = 0
         proghdr = 0
         error = 0
---Type <return> to continue, or q <return> to quit---
         i = -839188608
         interp = 0x0
         brand_info = (Elf_Brandinfo *) 0xcb0a5034
         path = 0xcb0a5000 "\177ELF\001\001\001\t"
#16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at 
/usr/src/sys/kern/kern_exec.c:208
         uap = (struct execve_args *) 0xcdfaff80
         nd = {ni_dirp = 0x8112ce0 <Address 0x8112ce0 out of bounds>, 
ni_segflg = UIO_USERSPACE,
   ni_startdir = 0x0, ni_rootdir = 0xccfcbe00, ni_topdir = 0x0, ni_vp = 
0xcd558d80, ni_dvp = 0xcd4d4600,
   ni_pathlen = 1, ni_next = 0xcd4b2c17 "", ni_loopcnt = 0, ni_cnd = 
{cn_nameiop = 0, cn_flags = 2149444,
     cn_proc = 0xcdf48a40, cn_cred = 0xc1914080, cn_pnbuf = 0xcd4b2c00 
"/usr/libexec/mail.local",
     cn_nameptr = 0xcd4b2c0d "mail.local", cn_namelen = 10, cn_consume = 0}}
         ndp = (struct nameidata *) 0xcdfafeec
         stack_base = (register_t *) 0xc1291e00
         error = -1
         i = 0
         image_params = {proc = 0xcdf48a40, uap = 0xcdfaff80, vp = 
0xcd558d80, attr = 0xcdfafdc4,
   image_header = 0xcb0a5000 "\177ELF\001\001\001\t", stringbase = 
0xcb095000 "mail.local",
   stringp = 0xcb095048 "", endargs = 0xcb095039 "AGENT=sendmail", 
stringspace = 65464, argc = 4, envc = 1,
   argv0 = 0x0, entry_addr = 0, vmspace_destroyed = 1 '\001', interpreted = 
0 '\000',
   interpreter_name = "\000À", '\000' <repeats 13 times>, 
"p\r\bä\013vÀ\000\000\000\000\210þúÍ(Ñ%À\000\000\000\000\000\000\000\000\000p\r\b4ÿúÍøV%À\024ñuÍ@\212ôÍ@3öÍ\000p\r\b\200Ô.Á@\212ôÍ\000\000\000\000\a\000\000\000\002\000\000\000p3öÍ\000\000\000\001\000\000\000\000äþúÍ´a\025\003\000\000\000\000ä\013vÀ\024ñuÍ\000\000\000\000ä\013", 
auxargs = 0x0, firstpage = 0xc056f844, fname = 0x8112ce0 <Address 0x8112ce0 
out of bounds>,
   ps_strings = 0}
         imgp = (struct image_params *) 0xcdfafe24
         attr = {va_type = VREG, va_mode = 365, va_nlink = 1, va_uid = 0, 
va_gid = 0, va_fsid = 160773,
   va_fileid = 1230689, va_size = 64356, va_blocksize = 8192, va_atime = 
{tv_sec = 1069613208, tv_nsec = 0},
   va_mtime = {tv_sec = 1069613208, tv_nsec = 0}, va_ctime = {tv_sec = 
1069613208, tv_nsec = 0},
   va_gen = 1066926071, va_flags = 0, va_rdev = 5096616, va_bytes = 64512, 
va_filerev = 21334498826,
   va_vaflags = 3228961764, va_spare = -839188948}
         img_first = (int (*)()) 0
#17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds = 
-1078001617, tf_edi = 0,
       tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx = 
256, tf_edx = -1, tf_ecx = 135393408,
       tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs = 
31, tf_eflags = 659,
       tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175
         params = 0xbfbf7628 <Address 0xbfbf7628 out of bounds>
---Type <return> to continue, or q <return> to quit---
         i = 0
         callp = (struct sysent *) 0xc02dc978
         p = (struct proc *) 0xcdf48a40
         orig_tf_eflags = 659
         sticks = 0
         error = 0
         narg = 3
         args = {135343328, -1077963652, 135190048, 0, 0, 0, 0, 0}
         code = 59
#18 0xc027a405 in Xint0x80_syscall ()
No symbol table info available.
Cannot access memory at address 0xbfbf9a30.
(kgdb)

(kgdb) up 1
#1  0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316
316                     dumpsys();
(kgdb) list
311              * been completed.
312              */
313             EVENTHANDLER_INVOKE(shutdown_post_sync, howto);
314             splhigh();
315             if ((howto & (RB_HALT|RB_DUMP)) == RB_DUMP && !cold)
316                     dumpsys();
317
318             /* Now that we're going to really halt the system... */
319             EVENTHANDLER_INVOKE(shutdown_final, howto);
320
(kgdb) up
#2  0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at 
/usr/src/sys/kern/kern_shutdown.c:595
595             boot(bootopt);
(kgdb) list
590
591     #if defined(DDB)
592             if (debugger_on_panic)
593                     Debugger ("panic");
594     #endif
595             boot(bootopt);
596     }
597
598     /*
599      * Support for poweroff delay.
(kgdb) up
#3  0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at 
/usr/src/sys/i386/i386/trap.c:974
974                     panic("%s", trap_msg[type]);
(kgdb) list
969             if ((debugger_on_panic || db_active) && kdb_trap(type, 0, 
frame))
970                     return;
971     #endif
972             printf("trap number             = %d\n", type);
973             if (type <= MAX_TRAP_MSG)
974                     panic("%s", trap_msg[type]);
975             else
976                     panic("unknown/reserved trap");
977     }
978
(kgdb) up
#4  0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at 
/usr/src/sys/i386/i386/trap.c:867
867                     trap_fatal(frame, eva);
(kgdb) list
862             if (!usermode) {
863                     if (intr_nesting_level == 0 && curpcb && 
curpcb->pcb_onfault) {
864                             frame->tf_eip = (int)curpcb->pcb_onfault;
865                             return (0);
866                     }
867                     trap_fatal(frame, eva);
868                     return (-1);
869             }
870
871             /* kludge to pass faulting virtual address to sendsig */
(kgdb) up
#5  0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608, 
tf_ds = 16, tf_edi = -1068145252,
       tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524, 
tf_ebx = -840671820, tf_edx = 769,
       tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip = 
-1071111438, tf_cs = 8,
       tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at 
/usr/src/sys/i386/i386/trap.c:466
466                             (void) trap_pfault(&frame, FALSE, eva);
(kgdb) list
461     kernel_trap:
462                     /* kernel trap */
463
464                     switch (type) {
465                     case T_PAGEFLT:                 /* page fault */
466                             (void) trap_pfault(&frame, FALSE, eva);
467                             return;
468
469                     case T_DNA:
470     #if NNPX > 0
(kgdb) up
#6  0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at 
/usr/src/sys/i386/i386/pmap.c:704
704             pde = pmap_pde(pmap, va);
(kgdb) list
699
700     #ifdef INVARIANTS
701             if (~cpl & (net_imask | bio_imask | cam_imask))
702                     panic("pmap_pte_quick not protected by splvm()");
703     #endif
704             pde = pmap_pde(pmap, va);
705             if (*pde & PG_V) {
706                     if (*pde & PG_PS)
707                             return (pt_entry_t *)pde;
708                     if (pmap_is_current(pmap))
(kgdb) up
#7  0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at 
/usr/src/sys/i386/i386/pmap.c:1757
1757                    pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va);
(kgdb) list
1752
1753            s = splvm();
1754            while ((pv = TAILQ_FIRST(&m->md.pv_list)) != NULL) {
1755                    pv->pv_pmap->pm_stats.resident_count--;
1756
1757                    pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va);
1758
1759                    tpte = pte_store(pte, 0);
1760                    if (tpte & PG_W)
1761                            pv->pv_pmap->pm_stats.wired_count--;
(kgdb) up
#8  0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at 
/usr/src/sys/i386/i386/pmap.c:2915
2915                            pmap_remove_all(m);
(kgdb) list
2910    {
2911            if ((prot & VM_PROT_WRITE) == 0) {
2912                    if (prot & (VM_PROT_READ | VM_PROT_EXECUTE)) {
2913                            pmap_changebit(m, PG_RW, FALSE);
2914                    } else {
2915                            pmap_remove_all(m);
2916                    }
2917            }
2918    }
2919
(kgdb) up
#9  0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at 
/usr/src/sys/vm/vm_page.h:461
461                             pmap_page_protect(mem, VM_PROT_NONE);
(kgdb) list
456     static __inline void
457     vm_page_protect(vm_page_t mem, int prot)
458     {
459             if (prot == VM_PROT_NONE) {
460                     if (mem->flags & (PG_WRITEABLE|PG_MAPPED)) {
461                             pmap_page_protect(mem, VM_PROT_NONE);
462                             vm_page_flag_clear(mem, 
PG_WRITEABLE|PG_MAPPED);
463                     }
464             } else if ((prot == VM_PROT_READ) && (mem->flags & 
PG_WRITEABLE)) {
465                     pmap_page_protect(mem, VM_PROT_READ);
(kgdb) up
#10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at 
/usr/src/sys/vm/vm_object.c:368
368                                             vm_object_collapse(object);
(kgdb) list
363                                                     object = robject;
364                                                     goto doterm;
365                                             }
366
367                                             object = robject;
368                                             vm_object_collapse(object);
369                                             continue;
370                                     }
371                             }
372
(kgdb) up
#11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at 
/usr/src/sys/vm/vm_map.c:2057
2057                    vm_object_deallocate(entry->object.vm_object);
(kgdb) list
2052    {
2053            vm_map_entry_unlink(map, entry);
2054            map->size -= entry->end - entry->start;
2055
2056            if ((entry->eflags & MAP_ENTRY_IS_SUB_MAP) == 0) {
2057                    vm_object_deallocate(entry->object.vm_object);
2058            }
2059
2060            vm_map_entry_dispose(map, entry);
2061    }
(kgdb) up
#12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168) 
at /usr/src/sys/vm/vm_map.c:2177
2177                    vm_map_entry_delete(map, entry);
(kgdb) list
2172                     * Delete the entry (which may delete the object) 
only after
2173                     * removing all pmap entries pointing to its pages.
2174                     * (Otherwise, its page frames may be reallocated, 
and any
2175                     * modify bits will be set in the wrong object!)
2176                     */
2177                    vm_map_entry_delete(map, entry);
2178                    entry = next;
2179            }
2180            return (KERN_SUCCESS);
2181    }
(kgdb) up
#13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168) 
at /usr/src/sys/vm/vm_map.c:2202
2202            result = vm_map_delete(map, start, end);
(kgdb) list
2197            if (map == kmem_map || map == mb_map)
2198                    s = splvm();
2199
2200            vm_map_lock(map);
2201            VM_MAP_RANGE_CHECK(map, start, end);
2202            result = vm_map_delete(map, start, end);
2203            vm_map_unlock(map);
2204
2205            if (map == kmem_map || map == mb_map)
2206                    splx(s);
(kgdb) up
#14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at 
/usr/src/sys/kern/kern_exec.c:538
538                     vm_map_remove(map, 0, VM_MAXUSER_ADDRESS);
(kgdb) list
533              */
534             if (vmspace->vm_refcnt == 1) {
535                     if (vmspace->vm_shm)
536                             shmexit(imgp->proc);
537                     pmap_remove_pages(vmspace_pmap(vmspace), 0, 
VM_MAXUSER_ADDRESS);
538                     vm_map_remove(map, 0, VM_MAXUSER_ADDRESS);
539             } else {
540                     vmspace_exec(imgp->proc);
541                     vmspace = imgp->proc->p_vmspace;
542                     map = &vmspace->vm_map;
(kgdb) up
#15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at 
/usr/src/sys/kern/imgact_elf.c:507
507             exec_new_vmspace(imgp);
(kgdb) list
502              */
503
504             if ((error = exec_extract_strings(imgp)) != 0)
505                     goto fail;
506
507             exec_new_vmspace(imgp);
508
509             /*
510              * Yeah, I'm paranoid.  There is every reason in the world 
to get
511              * VTEXT now since from here on out, there are places we 
can have
(kgdb) up
#16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at 
/usr/src/sys/kern/kern_exec.c:208
208                     error = (*execsw[i]->ex_imgact)(imgp);
(kgdb) list
203             for (i = 0; error == -1 && execsw[i]; ++i) {
204                     if (execsw[i]->ex_imgact == NULL ||
205                         execsw[i]->ex_imgact == img_first) {
206                             continue;
207                     }
208                     error = (*execsw[i]->ex_imgact)(imgp);
209             }
210
211             if (error) {
212                     if (error == -1)
(kgdb) up
#17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds = 
-1078001617, tf_edi = 0,
       tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx = 
256, tf_edx = -1, tf_ecx = 135393408,
       tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs = 
31, tf_eflags = 659,
       tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175
1175            error = (*callp->sy_call)(p, args);
(kgdb) list
1170            p->p_retval[0] = 0;
1171            p->p_retval[1] = frame.tf_edx;
1172
1173            STOPEVENT(p, S_SCE, narg);      /* MP aware */
1174
1175            error = (*callp->sy_call)(p, args);
1176
1177            /*
1178             * MP SAFE (we may or may not have the MP lock at this point)
1179             */
(kgdb) up
#18 0xc027a405 in Xint0x80_syscall ()
(kgdb) list
1180            switch (error) {
1181            case 0:
1182                    /*
1183                     * Reinitialize proc pointer `p' as it may be different
1184                     * if this is a child returning from fork syscall.
1185                     */
1186                    p = curproc;
1187                    frame.tf_eax = p->p_retval[0];
1188                    frame.tf_edx = p->p_retval[1];
1189                    frame.tf_eflags &= ~PSL_C;
(kgdb)


machine         i386
cpu             I686_CPU
ident           smtp2
maxusers        0
makeoptions     DEBUG=-g                #Build kernel with gdb(1) debug symbols
options         INET                    #InterNETworking
options         INET6                   #IPv6 communications protocols
options         FFS                     #Berkeley Fast Filesystem
options         FFS_ROOT                #FFS usable as root device [keep this!]
options         SOFTUPDATES             #Enable FFS soft updates support
options         MFS                     #Memory Filesystem
options         NFS                     #Network Filesystem
options         PROCFS                  #Process filesystem
options         COMPAT_43               #Compatible with BSD 4.3 [KEEP THIS!]
options         SCSI_DELAY=15000        #Delay (in ms) before probing SCSI
options         UCONSOLE                #Allow users to grab the console
options         USERCONFIG              #boot -c editor
options         UFS_DIRHASH             #Improve performance on big directories
options         VISUAL_USERCONFIG       #visual boot -c editor
options         KTRACE                  #ktrace(1) support
options         SYSVSHM                 #SYSV-style shared memory
options         SYSVMSG                 #SYSV-style message queues
options         SYSVSEM                 #SYSV-style semaphores
options         P1003_1B                #Posix P1003_1B real-time extensions
options         _KPOSIX_PRIORITY_SCHEDULING
options         ICMP_BANDLIM            #Rate limit bad replies
options         KBD_INSTALL_CDEV        # install a CDEV entry in /dev
options         RANDOM_IP_ID
options         LIBMCHAIN
device          isa
device          pci
device          ata
device          atadisk                 # ATA disk drives
device          atapist                 # ATAPI tape drives
options         ATA_STATIC_ID           #Static device numbering
                                 # Allow ncr to attach legacy NCR devices when
                                 # both sym and ncr are configured
device          twe             # 3ware Escalade
device          atkbdc0 at isa? port IO_KBD
device          atkbd0  at atkbdc? irq 1
device          psm0    at atkbdc? irq 12
device          vga0    at isa?
device          sc0     at isa? flags 0x100
device          npx0    at nexus? port IO_NPX irq 13
device          sio0    at isa? port IO_COM1 flags 0x10 irq 4
device          sio1    at isa? port IO_COM2 irq 3
device          ppc0    at isa? irq 7
device          ppbus           # Parallel port bus (required)
device          lpt             # Printer
device          ppi             # Parallel port interface device
device          fxp             # Intel EtherExpress PRO/100B (82557, 82558)
device          miibus          # MII bus support
device          rl              # RealTek 8129/8139
device          vr              # VIA Rhine, Rhine II
pseudo-device   loop            # Network loopback
pseudo-device   ether           # Ethernet support
pseudo-device   ppp     1       # Kernel PPP
pseudo-device   disc    1       # Kernel PPP
pseudo-device   tun             # Packet tunnel.
pseudo-device   pty             # Pseudo-ttys (telnet etc)
pseudo-device   gif     4       # IPv6 and IPv4 tunneling
pseudo-device   faith   1       # IPv6-to-IPv4 relaying (translation)
pseudo-device   bpf             #Berkeley packet filter
options         IPFIREWALL              #firewall
options         IPFIREWALL_VERBOSE      #print information about
options         IPFIREWALL_FORWARD      #enable transparent proxy support
options         IPFIREWALL_VERBOSE_LIMIT=22100  #limit verbosity
options         IPFIREWALL_DEFAULT_TO_ACCEPT    #allow everything by default
options         IPV6FIREWALL            #firewall for IPv6
options         IPV6FIREWALL_VERBOSE
options         IPV6FIREWALL_VERBOSE_LIMIT=1000
options         IPFW2
options         DUMMYNET
options         IPSEC                   #IP security
options         IPSEC_ESP               #IP security (crypto; define w/ IPSEC)
--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike at sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike



More information about the freebsd-stable mailing list