Добро пожаловать, Гость. Пожалуйста авторизуйтесь здесь.
FGHIGate на GaNJa NeTWoRK ST@Ti0N - Просмотр сообщения в эхоконференции RU.UNIX.BSD
Введите FGHI ссылку:


Присутствуют сообщения из эхоконференции RU.UNIX.BSD с датами от 18 Jan 11 22:51:00 до 18 Jan 24 18:16:22, всего сообщений: 10753
Ответить на сообщение К списку сообщений Предыдущее сообщение Следующее сообщение
= Сообщение: 8770 из 10753 ===================================== RU.UNIX.BSD =
От   : Sergey Anohin                    2:5034/10.1        07 Mar 19 13:15:53
Кому : All                                                 07 Mar 19 13:15:53
Тема : такой кривой STABLE я еще не видел
FGHI : area://RU.UNIX.BSD?msgid=2:5034/10.1+9d0967c0
= Кодировка сообщения определена как: CP866 ==================================
Ответ: area://RU.UNIX.BSD?msgid=grosbein.net+5a05dd89
==============================================================================
Hello!

сабж.

Случился на отключении клиента от pptp (mpd5 походу когда уничтожал интерфейс)

# kgdb /boot/kernel/kernel /var/crash/vmcore.last
GNU gdb (GDB) 8.2.1 [GDB v8.2.1 for FreeBSD]
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-portbld-freebsd12.0".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /boot/kernel/kernel...Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug...done.
done.

Unread portion of the kernel message buffer:
frame pointer           = 0x28:0xfffffe0050180600
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 985 (mpd5)
trap number             = 12
panic: page fault
cpuid = 2
time = 1551948804
KDB: stack backtrace:
#0 0xffffffff80c531c7 at kdb_backtrace+0x67
#1 0xffffffff80c07143 at vpanic+0x1a3
#2 0xffffffff80c06f93 at panic+0x43
#3 0xffffffff8118d9ff at trap_fatal+0x35f
#4 0xffffffff8118da59 at trap_pfault+0x49
#5 0xffffffff8118d07e at trap+0x29e
#6 0xffffffff81168af5 at calltrap+0x8
#7 0xffffffff80dafecf at in_ifdetach+0x6f
#8 0xffffffff80d0af5d at if_detach_internal+0x8ed
#9 0xffffffff80d0a65e at if_detach+0x2e
#10 0xffffffff80d8e1f3 at ng_iface_shutdown+0x43
#11 0xffffffff80d87255 at ng_rmnode+0x1e5
#12 0xffffffff80d89581 at ng_apply_item+0x421
#13 0xffffffff80d88f10 at ng_snd_item+0x130
#14 0xffffffff80da248c at ngc_send+0x19c
#15 0xffffffff80c9de16 at sosend_generic+0x586
#16 0xffffffff80c9e120 at sosend+0x50
#17 0xffffffff80ca4f17 at kern_sendit+0x237
Uptime: 1d14h48m43s
Dumping 1005 out of 8077 MB:..2%..12%..21%..31%..42%..51%..61%..71%..82%..91%

__curthread () at ./machine/pcpu.h:230
230             __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (OFFSETOF_CURTHREAD));
(kgdb) bt
#0  __curthread () at ./machine/pcpu.h:230
#1  doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:366
#2  0xffffffff80c06d2b in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:446
#3  0xffffffff80c071a3 in vpanic (fmt=<optimized out>, ap=0xfffffe0050180310) at /usr/src/sys/kern/kern_shutdown.c:872
#4  0xffffffff80c06f93 in panic (fmt=<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:799
#5  0xffffffff8118d9ff in trap_fatal (frame=0xfffffe0050180500, eva=24) at /usr/src/sys/amd64/amd64/trap.c:929
#6  0xffffffff8118da59 in trap_pfault (frame=0xfffffe0050180500, usermode=0) at /usr/src/sys/amd64/amd64/trap.c:765
#7  0xffffffff8118d07e in trap (frame=0xfffffe0050180500) at /usr/src/sys/amd64/amd64/trap.c:441
#8  <signal handler called>
#9  0xffffffff80dbb7c8 in in_pcbpurgeif0 (pcbinfo=<optimized out>, ifp=0xfffff80165986800) at /usr/src/sys/netinet/in_pcb.c:1804
#10 0xffffffff80dafecf in in_ifdetach (ifp=0xfffff80165986800) at /usr/src/sys/netinet/in.c:1002
#11 0xffffffff80d0af5d in if_detach_internal (ifp=<optimized out>, vmove=0, ifcp=0x0) at /usr/src/sys/net/if.c:1160
#12 0xffffffff80d0a65e in if_detach (ifp=0x0) at /usr/src/sys/net/if.c:1039
#13 0xffffffff80d8e1f3 in ng_iface_shutdown (node=0xfffff80124360d00) at /usr/src/sys/netgraph/ng_iface.c:743
#14 0xffffffff80d87255 in ng_rmnode (node=0xfffff80124360d00, dummy1=<optimized out>, dummy2=<optimized out>, dummy3=<optimized out>)
    at /usr/src/sys/netgraph/ng_base.c:757
#15 0xffffffff80d89581 in ng_generic_msg (here=0xfffff80124360d00, item=<optimized out>, lasthook=<optimized out>) at /usr/src/sys/netgraph/ng_base.c:2523
#16 ng_apply_item (node=0xfffff80124360d00, item=0xfffff80228799c80, rw=1) at /usr/src/sys/netgraph/ng_base.c:2437
#17 0xffffffff80d88f10 in ng_snd_item (item=0xfffff80228799c80, flags=0) at /usr/src/sys/netgraph/ng_base.c:2320
#18 0xffffffff80da248c in ngc_send (so=<optimized out>, flags=<optimized out>, m=0xfffff801cac0f000, addr=<optimized out>, control=<optimized out>, td=<optimized out>)
    at /usr/src/sys/netgraph/ng_socket.c:338
#19 0xffffffff80c9de16 in sosend_generic (so=0xfffff8002b8bf6d0, addr=0xfffff8017d9d5f70, uio=0xfffffe0050180988, top=0xfffff801cac0f000, control=0x2363, flags=0,
    td=0xfffff8002bc14580) at /usr/src/sys/kern/uipc_socket.c:1582
#20 0xffffffff80c9e120 in sosend (so=0x0, addr=0xfffff80165986800, uio=0xfffff8002bc14580, top=0x1, control=0x0, flags=-2008371993, td=0xfffff8002bc14580)
    at /usr/src/sys/kern/uipc_socket.c:1628
#21 0xffffffff80ca4f17 in kern_sendit (td=0xfffff8002bc14580, s=5, mp=<optimized out>, flags=0, control=0x0, segflg=UIO_USERSPACE)
    at /usr/src/sys/kern/uipc_syscalls.c:796
#22 0xffffffff80ca528e in sendit (td=0xfffff8002bc14580, s=5, mp=0xfffffe0050180a70, flags=0) at /usr/src/sys/kern/uipc_syscalls.c:721
#23 0xffffffff80ca50dd in sys_sendto (td=0x0, uap=<optimized out>) at /usr/src/sys/kern/uipc_syscalls.c:838
#24 0xffffffff8118e592 in syscallenter (td=<optimized out>) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:135
#25 amd64_syscall (td=0xfffff8002bc14580, traced=0) at /usr/src/sys/amd64/amd64/trap.c:1154
#26 <signal handler called>
#27 0x000000080091a64a in ?? ()
Backtrace stopped: Cannot access memory at address 0x7fffdfffd6f8
(kgdb) frame 8
#8  <signal handler called>
(kgdb) frame 9
#9  0xffffffff80dbb7c8 in in_pcbpurgeif0 (pcbinfo=<optimized out>, ifp=0xfffff80165986800) at /usr/src/sys/netinet/in_pcb.c:1804
1804                                    if (imo->imo_membership[i]->inm_ifp == ifp) {
(kgdb) frame 10
#10 0xffffffff80dafecf in in_ifdetach (ifp=0xfffff80165986800) at /usr/src/sys/netinet/in.c:1002
1002            in_pcbpurgeif0(&V_udbinfo, ifp);
(kgdb) frame 11
#11 0xffffffff80d0af5d in if_detach_internal (ifp=<optimized out>, vmove=0, ifcp=0x0) at /usr/src/sys/net/if.c:1160
1160            in_ifdetach(ifp);
(kgdb) quit


С наилучшими пожеланиями, Sergey Anohin.

--- wfido
* Origin: https://5034.ru/wfido (2:5034/10.1)

К главной странице гейта
Powered by NoSFeRaTU`s FGHIGate
Открытие страницы: 0.072333 секунды