i386/144616: ip_nat panic FreeBSD 7.2

Igor Krasnov sombre_mombre at yahoo.com
Wed Mar 10 09:00:18 UTC 2010


>Number:         144616
>Category:       i386
>Synopsis:       ip_nat panic FreeBSD 7.2
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-i386
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 10 09:00:17 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     Igor Krasnov
>Release:        FreeBSD 7.2-RELEASE #0:
>Organization:
>Environment:
FreeBSD hq.fors.ru 7.2-RELEASE FreeBSD 7.2-RELEASE #0: Sun Jun 28 13:19:43 MSD 2009     root at nano72.build:/usr/obj/nanobsd.nr12/usr/src-tyan/sys/NR12_1024CF  i386

>Description:
Then using ftp in ip_nat kernel panic. I'm install 2 patches from:
http://www.freebsd.org/cgi/query-pr.cgi?pr=131601&cat

But problem still repeat, then users use FTP in VPN sessions.
Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0x4
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0xc0444a97
stack pointer           = 0x28:0xc2a9f748
frame pointer           = 0x28:0xc2a9f7c0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 11 (swi1: net)
trap number             = 12
panic: page fault
KDB: stack backtrace:
db_trace_self_wrapper(c06df3ec,c2a9f5e8,c05421af,c06dd744,c0741c40,...) at db_trace_self_wrapper+0x26
kdb_backtrace(c06dd744,c0741c40,c06d0dd9,c2a9f5f4,c2a9f5f4,...) at kdb_backtrace+0x29
panic(c06d0dd9,c06f3c79,c2c2ba4c,1,1,...) at panic+0xaf
trap_fatal(c073fce0,0,1,0,c2a9f688,...) at trap_fatal+0x303
trap_pfault(c2a9f6f8,c04532ce,c37caeb4,c2a9f844,c,...) at trap_pfault+0x250
trap(c2a9f708) at trap+0x3b2
calltrap() at calltrap+0x6
--- trap 0xc, eip = 0xc0444a97, esp = 0xc2a9f748, ebp = 0xc2a9f7c0 ---
nat_new(c2a9f844,c3730600,0,0,1,...) at nat_new+0xdb7
fr_checknatout(c2a9f844,c2a9f840,0,c2a9f8a8,c2a9f890,...) at fr_checknatout+0x36f
fr_check(c2e39044,14,c2ce6800,1,c2a9f92c,...) at fr_check+0x844
fr_check_wrapper(0,c2a9f92c,c2ce6800,2,0,...) at fr_check_wrapper+0x3f
pfil_run_hooks(c074bbe0,c2a9f9c0,c2ce6800,2,0,...) at pfil_run_hooks+0x78
ip_output(c2d69400,0,c2a9f9fc,1,0,...) at ip_output+0x98f
ip_forward(c2d69400,0,c300dc00,1,0,...) at ip_forward+0x394
ip_input(c2d69400,c0711f00,c2a9fa80,c05926b2,c300dc00,...) at ip_input+0x66c
netisr_dispatch(2,c2d69400,c38d7460,b,c2d69400,...) at netisr_dispatch+0x55
gif_input(c2d69400,2,c300dc00,45927b8,14,...) at gif_input+0xab
in_gif_input(c2d69400,14,4,1,7080,...) at in_gif_input+0x105
encap4_input(c2d69400,14,c2dffc00,1,0,...) at encap4_input+0x359
ip_input(c2d69400,0,5,4f068,c2c2daf0,...) at ip_input+0x6e9
netisr_processqueue(0,c43f495a,c6,1000000,c2c2daf0,...) at netisr_processqueue+0xcb
swi_net(0,0,c06dae90,4a1,0,...) at swi_net+0x12b
ithread_loop(c2c066a0,c2a9fd38,0,0,0,...) at ithread_loop+0x1ab
fork_exit(c0521d70,c2c066a0,c2a9fd38) at fork_exit+0x96
fork_trampoline() at fork_trampoline+0x8
--- trap 0, eip = 0, esp = 0xc2a9fd70, ebp = 0 ---

>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:


More information about the freebsd-i386 mailing list