For debugging purposes kernel memory which has been freed is
    filled with the pattern 0xdeadc0de (hex).  So if you get
    a VM fault on something similar then something in the system
    has tried to reference a structure that is sitting in memory which
    has been freed.  A no-no to be sure :-).

    0xdeadc162 - 0xdeadc0de would be the structural offset relative to
    the pointer.  The pointer itself is probably sitting at 0xdeadc0de.

                                        -Matt
                                        Matthew Dillon 
                                        <[EMAIL PROTECTED]>


:I just got a kernel mode page fault. I'd like to find out more
:about 
:
:> fault virtual address   = 0xdeadc162
:
:It looks like the address is meant to signal a particular class of
:error. Which one ?
:
:       -Arun
:
:Background fsck:
:
:Fatal trap 12: page fault while in kernel mode
:cpuid = 0; lapic.id = 00000000
:fault virtual address   = 0xdeadc162
:fault code              = supervisor read, page not present
:instruction pointer     = 0x8:0xc0277ebe
:stack pointer           = 0x10:0xcaee688c
:frame pointer           = 0x10:0xcaee68b0
:code segment            = base 0x0, limit 0xfffff, type 0x1b
:                        = DPL 0, pres 1, def32 1, gran 1
:processor eflags        = interrupt enabled, resume, IOPL = 0
:current process         = 343 (cron)
:kernel: type 12 trap, code=0
:Stopped at      ufs_strategy+0xbc:      calll   *0(%edx,%eax,4)
:db> trace
:ufs_strategy(caee68e4,caee6900,c01e7a1a,caee68e4,0) at ufs_strategy+0xbc
:ufs_vnoperate(caee68e4) at ufs_vnoperate+0x13
:breadn(cacdbb00,0,0,400,0) at breadn+0xc4
:bread(cacdbb00,0,0,400,0) at bread+0x20
:ffs_blkatoff(cacdbb00,0,0,0,caee69c8) at ffs_blkatoff+0x88
:ufs_lookup(caee6af0,caee6b2c,c01ebe61,caee6af0,caaca274) at
:ufs_lookup+0x31f
:ufs_vnoperate(caee6af0) at ufs_vnoperate+0x13
:vfs_cache_lookup(caee6b94,caee6bc0,c01efc94,caee6b94,caeb841c) at
:vfs_cache_loo9
:ufs_vnoperate(caee6b94) at ufs_vnoperate+0x13
:lookup(caee6c30,caeb841c,caee6bec,c01ce890,c0364178) at lookup+0x2b2
:namei(caee6c30) at namei+0x1df
:lstat(caeb841c,caee6d14,2,2,292) at lstat+0x4a
:syscall(2f,2f,2f,0,0) at syscall+0x1db
:syscall_with_err_pushed() at syscall_with_err_pushed+0x1b
:--- syscall (190, FreeBSD ELF, lstat), eip = 0x280b2f33, esp = 0xbfbff1ec, ebp -

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to