crash dump on releng_4 (with debugging symbols)
Mike Tancsa
mike at sentex.net
Thu Jan 29 07:14:55 PST 2004
Any idea if this is a hardware issue or bug ? Its vaguely reminiscent of
some of the post PAE issues.
4.9-STABLE FreeBSD 4.9-STABLE #0: Sun Nov 23 12:28:50 EST 2003 (kernel
config at the end).
# gdb -k /kernel.debug vmcore.1
GNU gdb 4.18 (FreeBSD)
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-unknown-freebsd"...Deprecated bfd_read
called at
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c
line 2627 in elfstab_build_psymtabs
Deprecated bfd_read called at
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c
line 933 in fill_symbuf
IdlePTD at phsyical address 0x0039d000
initial pcb at physical address 0x002fc080
panicstr: page fault
panic messages:
---
Fatal trap 12: page fault while in kernel mode
fault virtual address = 0xc04
fault code = supervisor read, page not present
instruction pointer = 0x8:0xc02822f2
stack pointer = 0x10:0xcdfafc00
frame pointer = 0x10:0xcdfafc0c
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 65665 (sendmail)
interrupt mask = net tty bio cam
trap number = 12
panic: page fault
syncing disks... 11
done
Uptime: 66d11h10m58s
dumping to dev #ad/0x20001, offset 1575424
dump ata0: resetting devices .. done
254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236
235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217
216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198
197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179
178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160
159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141
140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122
121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103
102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79
78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54
53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29
28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
---
#0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487
487 if (dumping++) {
(kgdb) bt full
#0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487
error = 0
#1 0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316
howto = 256
#2 0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at
/usr/src/sys/kern/kern_shutdown.c:595
fmt = 0xc02ce16c "%s"
bootopt = 256
buf = "page fault", '\000' <repeats 245 times>
#3 0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at
/usr/src/sys/i386/i386/trap.c:974
frame = (struct trapframe *) 0x100
eva = 0
code = -1070800532
type = 12
ss = -1070800532
esp = 0
softseg = {ssd_base = 0, ssd_limit = 1048575, ssd_type = 27,
ssd_dpl = 0, ssd_p = 1, ssd_xx = 11,
ssd_xx1 = 1, ssd_def32 = 1, ssd_gran = 1}
#4 0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at
/usr/src/sys/i386/i386/trap.c:867
va = 0
vm = (struct vmspace *) 0x0
map = 0xcdf63340
rv = 0
ftype = 1 '\001'
p = (struct proc *) 0xcdf48a40
#5 0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608,
tf_ds = 16, tf_edi = -1068145252,
tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524,
tf_ebx = -840671820, tf_edx = 769,
tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip =
-1071111438, tf_cs = 8,
tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at
/usr/src/sys/i386/i386/trap.c:466
p = (struct proc *) 0xcdf48a40
sticks = 3223703848
i = 0
ucode = 0
type = 12
code = 0
eva = 3076
#6 0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at
/usr/src/sys/i386/i386/pmap.c:704
---Type <return> to continue, or q <return> to quit---
pmap = 0x6fc25a
va = 3226822044
pde = (pd_entry_t *) 0x0
newpf = 0
#7 0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at
/usr/src/sys/i386/i386/pmap.c:1757
m = 0xc06a3ad0
pv = 0xc08af990
pte = (pt_entry_t *) 0x0
tpte = 0
s = 7324250
#8 0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at
/usr/src/sys/i386/i386/pmap.c:2915
m = 0xc06a3ad0
prot = 0 '\000'
#9 0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at
/usr/src/sys/vm/vm_page.h:461
mem = 0xc06a3ad0
pp = 0x0
new_pindex = 21
next = 0xc077d294
backing_offset_index = 0
backing_object = 0xcd9873f4
p = 0xc06a3ad0
s = 0
object = 0xcd7b3f18
backing_object = 0xcd9873f4
object = 0xcd7b3f18
#10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at
/usr/src/sys/vm/vm_object.c:368
robject = 0xcd7b3f18
object = 0xcd7b3f18
temp = 0xcd7b3f18
#11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at
/usr/src/sys/vm/vm_map.c:2057
map = 0xcdf63340
entry = 0xcdec8f30
#12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168)
at /usr/src/sys/vm/vm_map.c:2177
next = 0xce08b1e0
s = 135098368
e = 135192576
---Type <return> to continue, or q <return> to quit---
offidxstart = 0
offidxend = 23
count = 23
start = 3447058708
object = 0xcd75f114
entry = 0xcdec8f30
first_entry = 0xcdf63340
#13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168)
at /usr/src/sys/vm/vm_map.c:2202
map = 0xcdf63340
start = 0
end = 3217031168
result = 0
s = 0
#14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at
/usr/src/sys/kern/kern_exec.c:538
imgp = (struct image_params *) 0xcdfafe24
error = 0
vmspace = (struct vmspace *) 0xcdf63340
stack_addr = 3149922304
map = 0xcdf63340
#15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at
/usr/src/sys/kern/imgact_elf.c:507
hdr = (Elf_Ehdr *) 0xcb0a5000
phdr = (Elf_Phdr *) 0xcb0a5034
elf_auxargs = (Elf_Auxargs *) 0x0
vmspace = (struct vmspace *) 0xcdfafd8c
prot = 0 '\000'
text_size = 0
data_size = 0
total_size = 0
text_addr = 0
data_addr = 0
seg_size = 0
seg_addr = 0
addr = 3455778228
entry = 0
proghdr = 0
error = 0
---Type <return> to continue, or q <return> to quit---
i = -839188608
interp = 0x0
brand_info = (Elf_Brandinfo *) 0xcb0a5034
path = 0xcb0a5000 "\177ELF\001\001\001\t"
#16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at
/usr/src/sys/kern/kern_exec.c:208
uap = (struct execve_args *) 0xcdfaff80
nd = {ni_dirp = 0x8112ce0 <Address 0x8112ce0 out of bounds>,
ni_segflg = UIO_USERSPACE,
ni_startdir = 0x0, ni_rootdir = 0xccfcbe00, ni_topdir = 0x0, ni_vp =
0xcd558d80, ni_dvp = 0xcd4d4600,
ni_pathlen = 1, ni_next = 0xcd4b2c17 "", ni_loopcnt = 0, ni_cnd =
{cn_nameiop = 0, cn_flags = 2149444,
cn_proc = 0xcdf48a40, cn_cred = 0xc1914080, cn_pnbuf = 0xcd4b2c00
"/usr/libexec/mail.local",
cn_nameptr = 0xcd4b2c0d "mail.local", cn_namelen = 10, cn_consume = 0}}
ndp = (struct nameidata *) 0xcdfafeec
stack_base = (register_t *) 0xc1291e00
error = -1
i = 0
image_params = {proc = 0xcdf48a40, uap = 0xcdfaff80, vp =
0xcd558d80, attr = 0xcdfafdc4,
image_header = 0xcb0a5000 "\177ELF\001\001\001\t", stringbase =
0xcb095000 "mail.local",
stringp = 0xcb095048 "", endargs = 0xcb095039 "AGENT=sendmail",
stringspace = 65464, argc = 4, envc = 1,
argv0 = 0x0, entry_addr = 0, vmspace_destroyed = 1 '\001', interpreted =
0 '\000',
interpreter_name = "\000À", '\000' <repeats 13 times>,
"p\r\bä\013vÀ\000\000\000\000\210þúÍ(Ñ%À\000\000\000\000\000\000\000\000\000p\r\b4ÿúÍøV%À\024ñuÍ@\212ôÍ@3öÍ\000p\r\b\200Ô.Á@\212ôÍ\000\000\000\000\a\000\000\000\002\000\000\000p3öÍ\000\000\000\001\000\000\000\000äþúÍ´a\025\003\000\000\000\000ä\013vÀ\024ñuÍ\000\000\000\000ä\013",
auxargs = 0x0, firstpage = 0xc056f844, fname = 0x8112ce0 <Address 0x8112ce0
out of bounds>,
ps_strings = 0}
imgp = (struct image_params *) 0xcdfafe24
attr = {va_type = VREG, va_mode = 365, va_nlink = 1, va_uid = 0,
va_gid = 0, va_fsid = 160773,
va_fileid = 1230689, va_size = 64356, va_blocksize = 8192, va_atime =
{tv_sec = 1069613208, tv_nsec = 0},
va_mtime = {tv_sec = 1069613208, tv_nsec = 0}, va_ctime = {tv_sec =
1069613208, tv_nsec = 0},
va_gen = 1066926071, va_flags = 0, va_rdev = 5096616, va_bytes = 64512,
va_filerev = 21334498826,
va_vaflags = 3228961764, va_spare = -839188948}
img_first = (int (*)()) 0
#17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds =
-1078001617, tf_edi = 0,
tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx =
256, tf_edx = -1, tf_ecx = 135393408,
tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs =
31, tf_eflags = 659,
tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175
params = 0xbfbf7628 <Address 0xbfbf7628 out of bounds>
---Type <return> to continue, or q <return> to quit---
i = 0
callp = (struct sysent *) 0xc02dc978
p = (struct proc *) 0xcdf48a40
orig_tf_eflags = 659
sticks = 0
error = 0
narg = 3
args = {135343328, -1077963652, 135190048, 0, 0, 0, 0, 0}
code = 59
#18 0xc027a405 in Xint0x80_syscall ()
No symbol table info available.
Cannot access memory at address 0xbfbf9a30.
(kgdb)
(kgdb) up 1
#1 0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316
316 dumpsys();
(kgdb) list
311 * been completed.
312 */
313 EVENTHANDLER_INVOKE(shutdown_post_sync, howto);
314 splhigh();
315 if ((howto & (RB_HALT|RB_DUMP)) == RB_DUMP && !cold)
316 dumpsys();
317
318 /* Now that we're going to really halt the system... */
319 EVENTHANDLER_INVOKE(shutdown_final, howto);
320
(kgdb) up
#2 0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at
/usr/src/sys/kern/kern_shutdown.c:595
595 boot(bootopt);
(kgdb) list
590
591 #if defined(DDB)
592 if (debugger_on_panic)
593 Debugger ("panic");
594 #endif
595 boot(bootopt);
596 }
597
598 /*
599 * Support for poweroff delay.
(kgdb) up
#3 0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at
/usr/src/sys/i386/i386/trap.c:974
974 panic("%s", trap_msg[type]);
(kgdb) list
969 if ((debugger_on_panic || db_active) && kdb_trap(type, 0,
frame))
970 return;
971 #endif
972 printf("trap number = %d\n", type);
973 if (type <= MAX_TRAP_MSG)
974 panic("%s", trap_msg[type]);
975 else
976 panic("unknown/reserved trap");
977 }
978
(kgdb) up
#4 0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at
/usr/src/sys/i386/i386/trap.c:867
867 trap_fatal(frame, eva);
(kgdb) list
862 if (!usermode) {
863 if (intr_nesting_level == 0 && curpcb &&
curpcb->pcb_onfault) {
864 frame->tf_eip = (int)curpcb->pcb_onfault;
865 return (0);
866 }
867 trap_fatal(frame, eva);
868 return (-1);
869 }
870
871 /* kludge to pass faulting virtual address to sendsig */
(kgdb) up
#5 0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608,
tf_ds = 16, tf_edi = -1068145252,
tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524,
tf_ebx = -840671820, tf_edx = 769,
tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip =
-1071111438, tf_cs = 8,
tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at
/usr/src/sys/i386/i386/trap.c:466
466 (void) trap_pfault(&frame, FALSE, eva);
(kgdb) list
461 kernel_trap:
462 /* kernel trap */
463
464 switch (type) {
465 case T_PAGEFLT: /* page fault */
466 (void) trap_pfault(&frame, FALSE, eva);
467 return;
468
469 case T_DNA:
470 #if NNPX > 0
(kgdb) up
#6 0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at
/usr/src/sys/i386/i386/pmap.c:704
704 pde = pmap_pde(pmap, va);
(kgdb) list
699
700 #ifdef INVARIANTS
701 if (~cpl & (net_imask | bio_imask | cam_imask))
702 panic("pmap_pte_quick not protected by splvm()");
703 #endif
704 pde = pmap_pde(pmap, va);
705 if (*pde & PG_V) {
706 if (*pde & PG_PS)
707 return (pt_entry_t *)pde;
708 if (pmap_is_current(pmap))
(kgdb) up
#7 0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at
/usr/src/sys/i386/i386/pmap.c:1757
1757 pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va);
(kgdb) list
1752
1753 s = splvm();
1754 while ((pv = TAILQ_FIRST(&m->md.pv_list)) != NULL) {
1755 pv->pv_pmap->pm_stats.resident_count--;
1756
1757 pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va);
1758
1759 tpte = pte_store(pte, 0);
1760 if (tpte & PG_W)
1761 pv->pv_pmap->pm_stats.wired_count--;
(kgdb) up
#8 0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at
/usr/src/sys/i386/i386/pmap.c:2915
2915 pmap_remove_all(m);
(kgdb) list
2910 {
2911 if ((prot & VM_PROT_WRITE) == 0) {
2912 if (prot & (VM_PROT_READ | VM_PROT_EXECUTE)) {
2913 pmap_changebit(m, PG_RW, FALSE);
2914 } else {
2915 pmap_remove_all(m);
2916 }
2917 }
2918 }
2919
(kgdb) up
#9 0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at
/usr/src/sys/vm/vm_page.h:461
461 pmap_page_protect(mem, VM_PROT_NONE);
(kgdb) list
456 static __inline void
457 vm_page_protect(vm_page_t mem, int prot)
458 {
459 if (prot == VM_PROT_NONE) {
460 if (mem->flags & (PG_WRITEABLE|PG_MAPPED)) {
461 pmap_page_protect(mem, VM_PROT_NONE);
462 vm_page_flag_clear(mem,
PG_WRITEABLE|PG_MAPPED);
463 }
464 } else if ((prot == VM_PROT_READ) && (mem->flags &
PG_WRITEABLE)) {
465 pmap_page_protect(mem, VM_PROT_READ);
(kgdb) up
#10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at
/usr/src/sys/vm/vm_object.c:368
368 vm_object_collapse(object);
(kgdb) list
363 object = robject;
364 goto doterm;
365 }
366
367 object = robject;
368 vm_object_collapse(object);
369 continue;
370 }
371 }
372
(kgdb) up
#11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at
/usr/src/sys/vm/vm_map.c:2057
2057 vm_object_deallocate(entry->object.vm_object);
(kgdb) list
2052 {
2053 vm_map_entry_unlink(map, entry);
2054 map->size -= entry->end - entry->start;
2055
2056 if ((entry->eflags & MAP_ENTRY_IS_SUB_MAP) == 0) {
2057 vm_object_deallocate(entry->object.vm_object);
2058 }
2059
2060 vm_map_entry_dispose(map, entry);
2061 }
(kgdb) up
#12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168)
at /usr/src/sys/vm/vm_map.c:2177
2177 vm_map_entry_delete(map, entry);
(kgdb) list
2172 * Delete the entry (which may delete the object)
only after
2173 * removing all pmap entries pointing to its pages.
2174 * (Otherwise, its page frames may be reallocated,
and any
2175 * modify bits will be set in the wrong object!)
2176 */
2177 vm_map_entry_delete(map, entry);
2178 entry = next;
2179 }
2180 return (KERN_SUCCESS);
2181 }
(kgdb) up
#13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168)
at /usr/src/sys/vm/vm_map.c:2202
2202 result = vm_map_delete(map, start, end);
(kgdb) list
2197 if (map == kmem_map || map == mb_map)
2198 s = splvm();
2199
2200 vm_map_lock(map);
2201 VM_MAP_RANGE_CHECK(map, start, end);
2202 result = vm_map_delete(map, start, end);
2203 vm_map_unlock(map);
2204
2205 if (map == kmem_map || map == mb_map)
2206 splx(s);
(kgdb) up
#14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at
/usr/src/sys/kern/kern_exec.c:538
538 vm_map_remove(map, 0, VM_MAXUSER_ADDRESS);
(kgdb) list
533 */
534 if (vmspace->vm_refcnt == 1) {
535 if (vmspace->vm_shm)
536 shmexit(imgp->proc);
537 pmap_remove_pages(vmspace_pmap(vmspace), 0,
VM_MAXUSER_ADDRESS);
538 vm_map_remove(map, 0, VM_MAXUSER_ADDRESS);
539 } else {
540 vmspace_exec(imgp->proc);
541 vmspace = imgp->proc->p_vmspace;
542 map = &vmspace->vm_map;
(kgdb) up
#15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at
/usr/src/sys/kern/imgact_elf.c:507
507 exec_new_vmspace(imgp);
(kgdb) list
502 */
503
504 if ((error = exec_extract_strings(imgp)) != 0)
505 goto fail;
506
507 exec_new_vmspace(imgp);
508
509 /*
510 * Yeah, I'm paranoid. There is every reason in the world
to get
511 * VTEXT now since from here on out, there are places we
can have
(kgdb) up
#16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at
/usr/src/sys/kern/kern_exec.c:208
208 error = (*execsw[i]->ex_imgact)(imgp);
(kgdb) list
203 for (i = 0; error == -1 && execsw[i]; ++i) {
204 if (execsw[i]->ex_imgact == NULL ||
205 execsw[i]->ex_imgact == img_first) {
206 continue;
207 }
208 error = (*execsw[i]->ex_imgact)(imgp);
209 }
210
211 if (error) {
212 if (error == -1)
(kgdb) up
#17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds =
-1078001617, tf_edi = 0,
tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx =
256, tf_edx = -1, tf_ecx = 135393408,
tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs =
31, tf_eflags = 659,
tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175
1175 error = (*callp->sy_call)(p, args);
(kgdb) list
1170 p->p_retval[0] = 0;
1171 p->p_retval[1] = frame.tf_edx;
1172
1173 STOPEVENT(p, S_SCE, narg); /* MP aware */
1174
1175 error = (*callp->sy_call)(p, args);
1176
1177 /*
1178 * MP SAFE (we may or may not have the MP lock at this point)
1179 */
(kgdb) up
#18 0xc027a405 in Xint0x80_syscall ()
(kgdb) list
1180 switch (error) {
1181 case 0:
1182 /*
1183 * Reinitialize proc pointer `p' as it may be different
1184 * if this is a child returning from fork syscall.
1185 */
1186 p = curproc;
1187 frame.tf_eax = p->p_retval[0];
1188 frame.tf_edx = p->p_retval[1];
1189 frame.tf_eflags &= ~PSL_C;
(kgdb)
machine i386
cpu I686_CPU
ident smtp2
maxusers 0
makeoptions DEBUG=-g #Build kernel with gdb(1) debug symbols
options INET #InterNETworking
options INET6 #IPv6 communications protocols
options FFS #Berkeley Fast Filesystem
options FFS_ROOT #FFS usable as root device [keep this!]
options SOFTUPDATES #Enable FFS soft updates support
options MFS #Memory Filesystem
options NFS #Network Filesystem
options PROCFS #Process filesystem
options COMPAT_43 #Compatible with BSD 4.3 [KEEP THIS!]
options SCSI_DELAY=15000 #Delay (in ms) before probing SCSI
options UCONSOLE #Allow users to grab the console
options USERCONFIG #boot -c editor
options UFS_DIRHASH #Improve performance on big directories
options VISUAL_USERCONFIG #visual boot -c editor
options KTRACE #ktrace(1) support
options SYSVSHM #SYSV-style shared memory
options SYSVMSG #SYSV-style message queues
options SYSVSEM #SYSV-style semaphores
options P1003_1B #Posix P1003_1B real-time extensions
options _KPOSIX_PRIORITY_SCHEDULING
options ICMP_BANDLIM #Rate limit bad replies
options KBD_INSTALL_CDEV # install a CDEV entry in /dev
options RANDOM_IP_ID
options LIBMCHAIN
device isa
device pci
device ata
device atadisk # ATA disk drives
device atapist # ATAPI tape drives
options ATA_STATIC_ID #Static device numbering
# Allow ncr to attach legacy NCR devices when
# both sym and ncr are configured
device twe # 3ware Escalade
device atkbdc0 at isa? port IO_KBD
device atkbd0 at atkbdc? irq 1
device psm0 at atkbdc? irq 12
device vga0 at isa?
device sc0 at isa? flags 0x100
device npx0 at nexus? port IO_NPX irq 13
device sio0 at isa? port IO_COM1 flags 0x10 irq 4
device sio1 at isa? port IO_COM2 irq 3
device ppc0 at isa? irq 7
device ppbus # Parallel port bus (required)
device lpt # Printer
device ppi # Parallel port interface device
device fxp # Intel EtherExpress PRO/100B (82557, 82558)
device miibus # MII bus support
device rl # RealTek 8129/8139
device vr # VIA Rhine, Rhine II
pseudo-device loop # Network loopback
pseudo-device ether # Ethernet support
pseudo-device ppp 1 # Kernel PPP
pseudo-device disc 1 # Kernel PPP
pseudo-device tun # Packet tunnel.
pseudo-device pty # Pseudo-ttys (telnet etc)
pseudo-device gif 4 # IPv6 and IPv4 tunneling
pseudo-device faith 1 # IPv6-to-IPv4 relaying (translation)
pseudo-device bpf #Berkeley packet filter
options IPFIREWALL #firewall
options IPFIREWALL_VERBOSE #print information about
options IPFIREWALL_FORWARD #enable transparent proxy support
options IPFIREWALL_VERBOSE_LIMIT=22100 #limit verbosity
options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default
options IPV6FIREWALL #firewall for IPv6
options IPV6FIREWALL_VERBOSE
options IPV6FIREWALL_VERBOSE_LIMIT=1000
options IPFW2
options DUMMYNET
options IPSEC #IP security
options IPSEC_ESP #IP security (crypto; define w/ IPSEC)
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
More information about the freebsd-stable
mailing list