https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=240944

--- Comment #20 from [email protected] ---
Dec 29 00:15:06 bvgm syslogd: kernel boot file is /boot/kernel/kernel
Dec 29 00:15:06 bvgm kernel:
Dec 29 00:15:06 bvgm syslogd: last message repeated 1 times
Dec 29 00:15:06 bvgm kernel: Fatal trap 9: general protection fault while in
kernel mode
Dec 29 00:15:06 bvgm kernel: cpuid = 10; apic id = 0a
Dec 29 00:15:06 bvgm kernel: instruction pointer        =
0x20:0xffffffff809656dd
Dec 29 00:15:06 bvgm kernel: stack pointer              =
0x28:0xfffffe0068bf87c0
Dec 29 00:15:06 bvgm kernel: frame pointer              =
0x28:0xfffffe0068bf8820
Dec 29 00:15:06 bvgm kernel: code segment               = base 0x0, limit
0xfffff, type 0x1b
Dec 29 00:15:06 bvgm kernel:                    = DPL 0, pres 1, long 1, def32
0, gran 1
Dec 29 00:15:06 bvgm kernel: processor eflags   = interrupt enabled, resume,
IOPL = 0
Dec 29 00:15:06 bvgm kernel: current process            = 0 (if_io_tqg_10)
Dec 29 00:15:06 bvgm kernel: rdi: fffffe015937a000 rsi: fffff806cdb10c00 rdx:
fffff806d00da800
Dec 29 00:15:06 bvgm kernel: rcx: fffffe01137a0690  r8: 00000000000000d2  r9:
fffffe0159376000
Dec 29 00:15:06 bvgm kernel: rax: 00000000000001f3 rbx: 00000000000001eb rbp:
fffffe0068bf8820
Dec 29 00:15:06 bvgm kernel: r10: fffff80002949000 r11: 0000000000000004 r12:
fffffe01138e3a40
Dec 29 00:15:06 bvgm kernel: r13: 00000000000001eb r14: 0000800000000000 r15:
0000000000000004
Dec 29 00:15:06 bvgm kernel: trap number                = 9
Dec 29 00:15:06 bvgm kernel: panic: general protection fault
Dec 29 00:15:06 bvgm kernel: cpuid = 10
Dec 29 00:15:06 bvgm kernel: time = 1766956379
Dec 29 00:15:06 bvgm kernel: KDB: stack backtrace:
Dec 29 00:15:06 bvgm kernel: #0 0xffffffff8087316d at kdb_backtrace+0x5d
Dec 29 00:15:06 bvgm kernel: #1 0xffffffff80826b91 at vpanic+0x161
Dec 29 00:15:06 bvgm kernel: #2 0xffffffff80826a23 at panic+0x43
Dec 29 00:15:06 bvgm kernel: #3 0xffffffff80c844f8 at trap_fatal+0x68
Dec 29 00:15:06 bvgm kernel: #4 0xffffffff80c5ae68 at calltrap+0x8
Dec 29 00:15:06 bvgm kernel: #5 0xffffffff80966a0b at iflib_txq_drain+0x6b
Dec 29 00:15:06 bvgm kernel: #6 0xffffffff80968ffe at drain_ring_lockless+0x5e
Dec 29 00:15:06 bvgm kernel: #7 0xffffffff80968ee4 at ifmp_ring_enqueue+0x274
Dec 29 00:15:06 bvgm kernel: #8 0xffffffff80967dc7 at iflib_if_transmit+0x247
Dec 29 00:15:06 bvgm kernel: #9 0xffffffff8094c5b3 at ether_output_frame+0xd3
Dec 29 00:15:06 bvgm kernel: #10 0xffffffff8094c3b0 at ether_output+0x6b0
Dec 29 00:15:06 bvgm kernel: #11 0xffffffff8099dab8 at ip_tryforward+0x568
Dec 29 00:15:06 bvgm kernel: #12 0xffffffff8099ff46 at ip_input+0x316
Dec 29 00:15:06 bvgm kernel: #13 0xffffffff80969e0f at netisr_dispatch_src+0x9f
Dec 29 00:15:06 bvgm kernel: #14 0xffffffff8094c749 at ether_demux+0x149
Dec 29 00:15:06 bvgm kernel: #15 0xffffffff8094dafa at ether_nh_input+0x36a
Dec 29 00:15:06 bvgm kernel: #16 0xffffffff80969e0f at netisr_dispatch_src+0x9f
Dec 29 00:15:06 bvgm kernel: #17 0xffffffff8094caa6 at ether_input+0x56
Dec 29 00:15:06 bvgm kernel: Uptime: 3h36m56s


OS crashes constantly in network stack. sorry, i will switch to gentoo.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to