From andre@freebsd.org  Sun Sep  5 22:59:04 2004
Return-Path: <andre@freebsd.org>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 0438D16A4CF
	for <FreeBSD-gnats-submit@freebsd.org>; Sun,  5 Sep 2004 22:59:04 +0000 (GMT)
Received: from c00l3r.networx.ch (c00l3r.networx.ch [62.48.2.2])
	by mx1.FreeBSD.org (Postfix) with ESMTP id 2043D43D45
	for <FreeBSD-gnats-submit@freebsd.org>; Sun,  5 Sep 2004 22:59:03 +0000 (GMT)
	(envelope-from andre@freebsd.org)
Received: (qmail 26797 invoked from network); 5 Sep 2004 22:56:01 -0000
Received: from unknown (HELO freebsd.org) ([62.48.0.54])
          (envelope-sender <andre@freebsd.org>)
          by c00l3r.networx.ch (qmail-ldap-1.03) with SMTP
          for <bsam@ipt.ru>; 5 Sep 2004 22:56:01 -0000
Message-Id: <413B9A36.2D0B9696@freebsd.org>
Date: Mon, 06 Sep 2004 00:59:02 +0200
From: Andre Oppermann <andre@freebsd.org>
To: "Boris B.Samorodov" <bsam@ipt.ru>
Cc: FreeBSD-gnats-submit@freebsd.org, freebsd-current@freebsd.org
Subject: Re: Fatal Trap 12 in kernel module uipc_mbuf2.c
References: <E1C3g9f-0006ip-6y@bsam.ru>

>Number:         71411
>Category:       kern
>Synopsis:       Re: Fatal Trap 12 in kernel module uipc_mbuf2.c
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Sep 05 23:00:48 GMT 2004
>Closed-Date:    Mon Sep 06 17:37:13 GMT 2004
>Last-Modified:  Mon Sep 06 17:37:13 GMT 2004
>Originator:     
>Release:        
>Organization:
>Environment:
>Description:
 "Boris B.Samorodov" wrote:
 > 
 > >Submitter-Id:  current-users
 > >Originator:    Boris B. Samorodov
 > >Organization:  InPharmTech Co.
 > >Confidential:  no
 > >Synopsis:      Fatal Trap 12 in kernel module uipc_mbuf2.c
 > >Severity:      serious
 > >Priority:      medium
 > >Category:      kern
 > >Class:         sw-bug
 > >Release:       FreeBSD 5.3-BETA2 i386
 > >Environment:
 > System: FreeBSD gw.ipt.ru 5.3-BETA2 FreeBSD 5.3-BETA2 #6: Sat Sep  4 17:47:55 MSD 2004     bsam@gw.ipt.ru:/usr/obj/usr/src/sys/GW  i386
 > 
 > >Description:
 >         Fatal Trap 12, pointer: 0xc053a1f0.
 > 
 > # addr2line -e /root/kernel/kernel.debug 0xc053a1f0
 > -----
 > ../../../kern/uipc_mbuf2.c:389
 > -----
 > # gdb6 -k /root/kernel/kernel.debug vmcore.1
 > -----
 > GNU gdb 20040803 [GDB v6.x for FreeBSD]
 > Copyright 2004 Free Software Foundation, Inc.
 > GDB is free software, covered by the GNU General Public License, and you are
 > welcome to change it and/or distribute copies of it under certain conditions.
 > Type "show copying" to see the conditions.
 > There is absolutely no warranty for GDB.  Type "show warranty" for details.
 > This GDB was configured as "i386-portbld-freebsd5.3"...can not access 0xc070b588, invalid address (c070b588)
 > can not access 0xc070b588, invalid address (c070b588)
 > 
 > panic messages:
 > ---
 > dmesg: kvm_read: invalid address (c075cc54)
 > can not access 0xc070b6c0, invalid address (c070b6c0)
 > can not access 0xc070b6c0, invalid address (c070b6c0)
 > ---
 > #0  0x00000000 in ?? ()
 > 0x00000000 in ?? ()
 > (kgdb) list *m_tag_locate+0x40
 > 0xc053a1f0 is in m_tag_locate (../../../kern/uipc_mbuf2.c:389).
 > 384             if (t == NULL)
 > 385                     p = SLIST_FIRST(&m->m_pkthdr.tags);
 > 386             else
 > 387                     p = SLIST_NEXT(t, m_tag_link);
 > 388             while (p != NULL) {
 > 389                     if (p->m_tag_cookie == cookie && p->m_tag_id == type)
 > 390                             return p;
 > 391                     p = SLIST_NEXT(p, m_tag_link);
 > 392             }
 > 393             return NULL;
 > (kgdb) q
 > -----
 > >How-To-Repeat:
 >         The host have to upstream interfaces to ISP, three internal
 >         networks with two interfaces (two internal networks are
 >         aliased in one inteface). The default route is to the first
 >         provider. We use policy routing to route our third network
 >         to second provider. $inet1 and $inet2 are aliases on one
 >         interface.
 > 
 >         After adding ipfw rule:
 >         # ipfw add fwd $provider2 ip from $inet3 to { not $inet1 or not $inet2 }
 >         gateway paniced.
 > 
 >         I know, that in fact the rule has to be "not $inet1,$inet2".
 >         But logically the first rule has the value "all". OS must not
 >         trap.
 
 Does it panic 'reliablily' in the same place or is it more of a random
 occurence?  I'm not long in the office tomorrow (my test machine is there)
 but I'll try to reproduce it within the next few days.
 
 -- 
 Andre
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: linimon 
State-Changed-When: Mon Sep 6 17:36:44 GMT 2004 
State-Changed-Why:  
Misfiled followup to kern/71380; content migrated. 


Responsible-Changed-From-To: gnats-admin->freebsd-bugs 
Responsible-Changed-By: linimon 
Responsible-Changed-When: Mon Sep 6 17:36:44 GMT 2004 
Responsible-Changed-Why:  

http://www.freebsd.org/cgi/query-pr.cgi?pr=71411 
>Unformatted:
