https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=276674

--- Comment #5 from Vladyslav V. Prodan <ad...@support.od.ua> ---
Fresh panic.

Fatal trap 18: integer divide fault while in kernel mode
cpuid = 0; apic id = 00
instruction pointer     = 0x20:0xffffffff830172f1
stack pointer           = 0x28:0xfffffe0044c4d838
frame pointer           = 0x28:0xfffffe0044c4d840
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 12 (irq25: virtio_pci0)
trap number             = 18
panic: integer divide fault
cpuid = 0
time = 1707207718
KDB: stack backtrace:
db_trace_self_wrapper() at 0xffffffff804e375b =
db_trace_self_wrapper+0x2b/frame 0xfffffe0044c4d650
vpanic() at 0xffffffff80ce6a92 = vpanic+0x152/frame 0xfffffe0044c4d6a0
panic() at 0xffffffff80ce6933 = panic+0x43/frame 0xfffffe0044c4d700
trap_fatal() at 0xffffffff812faacd = trap_fatal+0x38d/frame 0xfffffe0044c4d760
calltrap() at 0xffffffff812d0bb8 = calltrap+0x8/frame 0xfffffe0044c4d760
--- trap 0x12, rip = 0xffffffff830172f1, rsp = 0xfffffe0044c4d838, rbp =
0xfffffe0044c4d840 ---
htcp_ack_received() at 0xffffffff830172f1 = htcp_ack_received+0x231/frame
0xfffffe0044c4d840
cc_ack_received() at 0xffffffff80f5cadc = cc_ack_received+0x28c/frame
0xfffffe0044c4d8a0
tcp_do_segment() at 0xffffffff80f61590 = tcp_do_segment+0x2be0/frame
0xfffffe0044c4d970
tcp_input_with_port() at 0xffffffff80f5dc2d = tcp_input_with_port+0xabd/frame
0xfffffe0044c4dab0
tcp6_input_with_port() at 0xffffffff80f5d10a = tcp6_input_with_port+0x6a/frame
0xfffffe0044c4dae0
tcp6_input() at 0xffffffff80f5e47b = tcp6_input+0xb/frame 0xfffffe0044c4daf0
ip6_input() at 0xffffffff80fb11a4 = ip6_input+0x9b4/frame 0xfffffe0044c4dbd0
netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame
0xfffffe0044c4dc20
ether_demux() at 0xffffffff80e37bc9 = ether_demux+0x149/frame
0xfffffe0044c4dc50
ether_nh_input() at 0xffffffff80e38ee9 = ether_nh_input+0x379/frame
0xfffffe0044c4dcb0
netisr_dispatch_src() at 0xffffffff80e6d6af = netisr_dispatch_src+0xaf/frame
0xfffffe0044c4dd00
ether_input() at 0xffffffff80e37f39 = ether_input+0x69/frame 0xfffffe0044c4dd60
vtnet_rxq_eof() at 0xffffffff80a93f2f = vtnet_rxq_eof+0x72f/frame
0xfffffe0044c4de20
vtnet_rx_vq_process() at 0xffffffff80a936f8 = vtnet_rx_vq_process+0xb8/frame
0xfffffe0044c4de60
ithread_loop() at 0xffffffff80ca3957 = ithread_loop+0x257/frame
0xfffffe0044c4def0
fork_exit() at 0xffffffff80ca039d = fork_exit+0x7d/frame 0xfffffe0044c4df30
fork_trampoline() at 0xffffffff812d1c2e = fork_trampoline+0xe/frame
0xfffffe0044c4df30
--- trap 0xa57f2f0d, rip = 0xb1378a3faf069d41, rsp = 0x7a5d5f3c4604970a, rbp =
0x2b154069806bd89e ---
KDB: enter: panic

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to