Page fault in ipfw?

Sergey Zaharchenko doublef-ctm at yandex.ru
Tue Jan 9 12:05:40 UTC 2007


Hello -current,

After updating from December to yesterday's CURRENT (to try catching the
SMB recursive locking) I observe the following fault when I connect to
the internet via PPP:

Unread portion of the kernel message buffer: [lines unwrapped]
-----------------------------------------------------------------------
Kernel page fault with the following non-sleepable locks held:
shared rw IPFW static rules r = 0 (0xc36dfc2c) locked @ /src/usr.src/sys/modules/ipfw/../../netinet/ip_fw2.c:2641
shared rw PFil hook read/write mutex r = 0 (0xc0a9fd38) locked @ /src/usr.src/sys/net/pfil.c:73
KDB: stack backtrace:
db_trace_self_wrapper(c0950f01) at db_trace_self_wrapper+0x25
kdb_backtrace(2,c3af3900,c,d6356724,d6356718,...) at kdb_backtrace+0x29
witness_warn(5,0,c097623a) at witness_warn+0x192
trap(d6356724) at trap+0x10f
calltrap() at calltrap+0x6
--- trap 0x1, eip = 0, esp = 0xd6356760, ebp = 0xd6356a10 ---
MAXCPU(0,0,0,53efbd93,c24317e5,...) at 0
MAXCPU(c3485138,29,2,dead0001,c3396400,...) at 0


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x0
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0xc36d7fe0
stack pointer           = 0x28:0xd6356764
frame pointer           = 0x28:0xd6356a04
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 1261 (ppp)
panic: from debugger
cpuid = 0
Uptime: 4m2s
Physical memory: 495 MB
Dumping 51 MB: 36 20 4
-----------------------------------------------------------------------

Yes, ipfw and ppp are in sync with the kernel.

# addr2line -e kernel.debug.2,3 0xc36d7fe0  ----\
??:0						|
						|
# kldstat					|
Id Refs Address    Size     Name		|
 1   27 0xc0400000 7c6d34   kernel		|
 3    1 0xc0bcb000 52b0     vesa.ko		|
 4    1 0xc0c91000 61f0     geom_label.ko	|
 5    1 0xc0c98000 5708     snd_ich.ko		|
 6    2 0xc0c9e000 3cf48    sound.ko		|
 7    1 0xc0cdb000 4cec     atapicam.ko		|
 8    1 0xc0ce0000 4a4c54   nvidia.ko		|
 9    1 0xc1185000 4694     uplcom.ko		|
10    2 0xc118a000 4384     ucom.ko		|
11    1 0xc118f000 5ac80    acpi.ko		|
12    1 0xc3617000 2000     msdosfs_iconv.ko	|
13    3 0xc3619000 3000     libiconv.ko		|
14    1 0xc36d3000 d000     ipfw.ko	     <--/
15    1 0xc389f000 b000     fuse.ko
16    1 0xc38f3000 4000     logo_saver.ko
17    1 0xc3efc000 1c000    smbfs.ko
18    2 0xc3716000 3000     libmchain.ko

Looks like I need to compile ipfw into the kernel to get a normal
address?

The backtrace doesn't seem helpful (I just panicked the debugger):

----------------------------------------------------------------------
#0  doadump () at pcpu.h:166
#1  0xc06c2f50 in boot (howto=260)
    at /src/usr.src/sys/kern/kern_shutdown.c:411
#2  0xc06c325a in panic (fmt=0xc0906a2f "from debugger")
    at /src/usr.src/sys/kern/kern_shutdown.c:567
#3  0xc0476a46 in db_panic (addr=-1016234016, have_addr=0, count=-1,
    modif=0xd635655c "") at /src/usr.src/sys/ddb/db_command.c:433
#4  0xc04769df in db_command (last_cmdp=0xc0a25424, cmd_table=0x0)
    at /src/usr.src/sys/ddb/db_command.c:401
#5  0xc0476a9a in db_command_loop () at /src/usr.src/sys/ddb/db_command.c:453
#6  0xc04786e5 in db_trap (type=12, code=0)
    at /src/usr.src/sys/ddb/db_main.c:222
#7  0xc06e1fd4 in kdb_trap (type=12, code=0, tf=0xd6356724)
    at /src/usr.src/sys/kern/subr_kdb.c:502
#8  0xc08be9ad in trap_fatal (frame=0xd6356724, eva=0)
    at /src/usr.src/sys/i386/i386/trap.c:859
#9  0xc08be033 in trap (frame=0xd6356724)
    at /src/usr.src/sys/i386/i386/trap.c:276
#10 0xc08a874b in calltrap () at /src/usr.src/sys/i386/i386/exception.s:139
#11 0x00000000 in ?? ()
Previous frame inner to this frame (corrupt stack?)
----------------------------------------------------------------------

The firewall works OK with the local network, everything gets sent and
filtered. PPP seems to matter. The only rule which matches (only) the
ppp interface is:

`ipfw add allow ip from any to any out xmit tun2 keep-state'

The system doesn't crash after adding a `1 allow ip from any to any'
ipfw rule, but that's not a real solution:)

Any ideas?

-- 
DoubleF
No virus detected in this message. Ehrm, wait a minute...
/kernel: pid 56921 (antivirus), uid 32000: exited on signal 9
Oh yes, no virus:)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-current/attachments/20070109/45e63947/attachment.pgp


More information about the freebsd-current mailing list