Any idea if this is a hardware issue or bug ? Its vaguely reminiscent of some of the post PAE issues. 4.9-STABLE FreeBSD 4.9-STABLE #0: Sun Nov 23 12:28:50 EST 2003 (kernel config at the end). # gdb -k /kernel.debug vmcore.1 GNU gdb 4.18 (FreeBSD) Copyright 1998 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i386-unknown-freebsd"...Deprecated bfd_read called at /usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c line 2627 in elfstab_build_psymtabs Deprecated bfd_read called at /usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/dbxread.c line 933 in fill_symbuf IdlePTD at phsyical address 0x0039d000 initial pcb at physical address 0x002fc080 panicstr: page fault panic messages: --- Fatal trap 12: page fault while in kernel mode fault virtual address = 0xc04 fault code = supervisor read, page not present instruction pointer = 0x8:0xc02822f2 stack pointer = 0x10:0xcdfafc00 frame pointer = 0x10:0xcdfafc0c code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 65665 (sendmail) interrupt mask = net tty bio cam trap number = 12 panic: page fault syncing disks... 11 done Uptime: 66d11h10m58s dumping to dev #ad/0x20001, offset 1575424 dump ata0: resetting devices .. done 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 --- #0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487 487 if (dumping++) { (kgdb) bt full #0 dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487 error = 0 #1 0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316 howto = 256 #2 0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at /usr/src/sys/kern/kern_shutdown.c:595 fmt = 0xc02ce16c "%s" bootopt = 256 buf = "page fault", '\000' <repeats 245 times> #3 0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at /usr/src/sys/i386/i386/trap.c:974 frame = (struct trapframe *) 0x100 eva = 0 code = -1070800532 type = 12 ss = -1070800532 esp = 0 softseg = {ssd_base = 0, ssd_limit = 1048575, ssd_type = 27, ssd_dpl = 0, ssd_p = 1, ssd_xx = 11, ssd_xx1 = 1, ssd_def32 = 1, ssd_gran = 1} #4 0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at /usr/src/sys/i386/i386/trap.c:867 va = 0 vm = (struct vmspace *) 0x0 map = 0xcdf63340 rv = 0 ftype = 1 '\001' p = (struct proc *) 0xcdf48a40 #5 0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608, tf_ds = 16, tf_edi = -1068145252, tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524, tf_ebx = -840671820, tf_edx = 769, tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip = -1071111438, tf_cs = 8, tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at /usr/src/sys/i386/i386/trap.c:466 p = (struct proc *) 0xcdf48a40 sticks = 3223703848 i = 0 ucode = 0 type = 12 code = 0 eva = 3076 #6 0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at /usr/src/sys/i386/i386/pmap.c:704 ---Type <return> to continue, or q <return> to quit--- pmap = 0x6fc25a va = 3226822044 pde = (pd_entry_t *) 0x0 newpf = 0 #7 0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at /usr/src/sys/i386/i386/pmap.c:1757 m = 0xc06a3ad0 pv = 0xc08af990 pte = (pt_entry_t *) 0x0 tpte = 0 s = 7324250 #8 0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at /usr/src/sys/i386/i386/pmap.c:2915 m = 0xc06a3ad0 prot = 0 '\000' #9 0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at /usr/src/sys/vm/vm_page.h:461 mem = 0xc06a3ad0 pp = 0x0 new_pindex = 21 next = 0xc077d294 backing_offset_index = 0 backing_object = 0xcd9873f4 p = 0xc06a3ad0 s = 0 object = 0xcd7b3f18 backing_object = 0xcd9873f4 object = 0xcd7b3f18 #10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at /usr/src/sys/vm/vm_object.c:368 robject = 0xcd7b3f18 object = 0xcd7b3f18 temp = 0xcd7b3f18 #11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at /usr/src/sys/vm/vm_map.c:2057 map = 0xcdf63340 entry = 0xcdec8f30 #12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168) at /usr/src/sys/vm/vm_map.c:2177 next = 0xce08b1e0 s = 135098368 e = 135192576 ---Type <return> to continue, or q <return> to quit--- offidxstart = 0 offidxend = 23 count = 23 start = 3447058708 object = 0xcd75f114 entry = 0xcdec8f30 first_entry = 0xcdf63340 #13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168) at /usr/src/sys/vm/vm_map.c:2202 map = 0xcdf63340 start = 0 end = 3217031168 result = 0 s = 0 #14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at /usr/src/sys/kern/kern_exec.c:538 imgp = (struct image_params *) 0xcdfafe24 error = 0 vmspace = (struct vmspace *) 0xcdf63340 stack_addr = 3149922304 map = 0xcdf63340 #15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at /usr/src/sys/kern/imgact_elf.c:507 hdr = (Elf_Ehdr *) 0xcb0a5000 phdr = (Elf_Phdr *) 0xcb0a5034 elf_auxargs = (Elf_Auxargs *) 0x0 vmspace = (struct vmspace *) 0xcdfafd8c prot = 0 '\000' text_size = 0 data_size = 0 total_size = 0 text_addr = 0 data_addr = 0 seg_size = 0 seg_addr = 0 addr = 3455778228 entry = 0 proghdr = 0 error = 0 ---Type <return> to continue, or q <return> to quit--- i = -839188608 interp = 0x0 brand_info = (Elf_Brandinfo *) 0xcb0a5034 path = 0xcb0a5000 "\177ELF\001\001\001\t" #16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at /usr/src/sys/kern/kern_exec.c:208 uap = (struct execve_args *) 0xcdfaff80 nd = {ni_dirp = 0x8112ce0 <Address 0x8112ce0 out of bounds>, ni_segflg = UIO_USERSPACE, ni_startdir = 0x0, ni_rootdir = 0xccfcbe00, ni_topdir = 0x0, ni_vp = 0xcd558d80, ni_dvp = 0xcd4d4600, ni_pathlen = 1, ni_next = 0xcd4b2c17 "", ni_loopcnt = 0, ni_cnd = {cn_nameiop = 0, cn_flags = 2149444, cn_proc = 0xcdf48a40, cn_cred = 0xc1914080, cn_pnbuf = 0xcd4b2c00 "/usr/libexec/mail.local", cn_nameptr = 0xcd4b2c0d "mail.local", cn_namelen = 10, cn_consume = 0}} ndp = (struct nameidata *) 0xcdfafeec stack_base = (register_t *) 0xc1291e00 error = -1 i = 0 image_params = {proc = 0xcdf48a40, uap = 0xcdfaff80, vp = 0xcd558d80, attr = 0xcdfafdc4, image_header = 0xcb0a5000 "\177ELF\001\001\001\t", stringbase = 0xcb095000 "mail.local", stringp = 0xcb095048 "", endargs = 0xcb095039 "AGENT=sendmail", stringspace = 65464, argc = 4, envc = 1, argv0 = 0x0, entry_addr = 0, vmspace_destroyed = 1 '\001', interpreted = 0 '\000', interpreter_name = "\000?", '\000' <repeats 13 times>, "p\r\b?\013v?\000\000\000\000\210???(?%?\000\000\000\000\000\000\000\000\000p\r\b4????V%?\024?u?@\212??@3??\000p\r\b\200?.?@\212??\000\000\000\000\a\000\000\000\002\000\000\000p3??\000\000\000\001\000\000\000\000?????a\025\003\000\000\000\000?\013v?\024?u?\000\000\000\000?\013", auxargs = 0x0, firstpage = 0xc056f844, fname = 0x8112ce0 <Address 0x8112ce0 out of bounds>, ps_strings = 0} imgp = (struct image_params *) 0xcdfafe24 attr = {va_type = VREG, va_mode = 365, va_nlink = 1, va_uid = 0, va_gid = 0, va_fsid = 160773, va_fileid = 1230689, va_size = 64356, va_blocksize = 8192, va_atime = {tv_sec = 1069613208, tv_nsec = 0}, va_mtime = {tv_sec = 1069613208, tv_nsec = 0}, va_ctime = {tv_sec = 1069613208, tv_nsec = 0}, va_gen = 1066926071, va_flags = 0, va_rdev = 5096616, va_bytes = 64512, va_filerev = 21334498826, va_vaflags = 3228961764, va_spare = -839188948} img_first = (int (*)()) 0 #17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds = -1078001617, tf_edi = 0, tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx = 256, tf_edx = -1, tf_ecx = 135393408, tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs = 31, tf_eflags = 659, tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175 params = 0xbfbf7628 <Address 0xbfbf7628 out of bounds> ---Type <return> to continue, or q <return> to quit--- i = 0 callp = (struct sysent *) 0xc02dc978 p = (struct proc *) 0xcdf48a40 orig_tf_eflags = 659 sticks = 0 error = 0 narg = 3 args = {135343328, -1077963652, 135190048, 0, 0, 0, 0, 0} code = 59 #18 0xc027a405 in Xint0x80_syscall () No symbol table info available. Cannot access memory at address 0xbfbf9a30. (kgdb) (kgdb) up 1 #1 0xc015bad8 in boot (howto=256) at /usr/src/sys/kern/kern_shutdown.c:316 316 dumpsys(); (kgdb) list 311 * been completed. 312 */ 313 EVENTHANDLER_INVOKE(shutdown_post_sync, howto); 314 splhigh(); 315 if ((howto & (RB_HALT|RB_DUMP)) == RB_DUMP && !cold) 316 dumpsys(); 317 318 /* Now that we're going to really halt the system... */ 319 EVENTHANDLER_INVOKE(shutdown_final, howto); 320 (kgdb) up #2 0xc015bf0c in poweroff_wait (junk=0xc02ce16c, howto=-1070801809) at /usr/src/sys/kern/kern_shutdown.c:595 595 boot(bootopt); (kgdb) list 590 591 #if defined(DDB) 592 if (debugger_on_panic) 593 Debugger ("panic"); 594 #endif 595 boot(bootopt); 596 } 597 598 /* 599 * Support for poweroff delay. (kgdb) up #3 0xc0285f1b in trap_fatal (frame=0xcdfafbc0, eva=3076) at /usr/src/sys/i386/i386/trap.c:974 974 panic("%s", trap_msg[type]); (kgdb) list 969 if ((debugger_on_panic || db_active) && kdb_trap(type, 0, frame)) 970 return; 971 #endif 972 printf("trap number = %d\n", type); 973 if (type <= MAX_TRAP_MSG) 974 panic("%s", trap_msg[type]); 975 else 976 panic("unknown/reserved trap"); 977 } 978 (kgdb) up #4 0xc0285bd5 in trap_pfault (frame=0xcdfafbc0, usermode=0, eva=3076) at /usr/src/sys/i386/i386/trap.c:867 867 trap_fatal(frame, eva); (kgdb) list 862 if (!usermode) { 863 if (intr_nesting_level == 0 && curpcb && curpcb->pcb_onfault) { 864 frame->tf_eip = (int)curpcb->pcb_onfault; 865 return (0); 866 } 867 trap_fatal(frame, eva); 868 return (-1); 869 } 870 871 /* kludge to pass faulting virtual address to sendsig */ (kgdb) up #5 0xc02857ab in trap (frame={tf_fs = -1070596080, tf_es = -888602608, tf_ds = 16, tf_edi = -1068145252, tf_esi = -1066779952, tf_ebp = -839189492, tf_isp = -839189524, tf_ebx = -840671820, tf_edx = 769, tf_ecx = 3076, tf_eax = 0, tf_trapno = 12, tf_err = 0, tf_eip = -1071111438, tf_cs = 8, tf_eflags = 66066, tf_esp = -1064633968, tf_ss = -1066779952}) at /usr/src/sys/i386/i386/trap.c:466 466 (void) trap_pfault(&frame, FALSE, eva); (kgdb) list 461 kernel_trap: 462 /* kernel trap */ 463 464 switch (type) { 465 case T_PAGEFLT: /* page fault */ 466 (void) trap_pfault(&frame, FALSE, eva); 467 return; 468 469 case T_DNA: 470 #if NNPX > 0 (kgdb) up #6 0xc02822f2 in pmap_pte_quick (pmap=0xcde45db4, va=3226822044) at /usr/src/sys/i386/i386/pmap.c:704 704 pde = pmap_pde(pmap, va); (kgdb) list 699 700 #ifdef INVARIANTS 701 if (~cpl & (net_imask | bio_imask | cam_imask)) 702 panic("pmap_pte_quick not protected by splvm()"); 703 #endif 704 pde = pmap_pde(pmap, va); 705 if (*pde & PG_V) { 706 if (*pde & PG_PS) 707 return (pt_entry_t *)pde; 708 if (pmap_is_current(pmap)) (kgdb) up #7 0xc02832d1 in pmap_remove_all (m=0xc06a3ad0) at /usr/src/sys/i386/i386/pmap.c:1757 1757 pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va); (kgdb) list 1752 1753 s = splvm(); 1754 while ((pv = TAILQ_FIRST(&m->md.pv_list)) != NULL) { 1755 pv->pv_pmap->pm_stats.resident_count--; 1756 1757 pte = pmap_pte_quick(pv->pv_pmap, pv->pv_va); 1758 1759 tpte = pte_store(pte, 0); 1760 if (tpte & PG_W) 1761 pv->pv_pmap->pm_stats.wired_count--; (kgdb) up #8 0xc02844e6 in pmap_page_protect (m=0xc06a3ad0, prot=0) at /usr/src/sys/i386/i386/pmap.c:2915 2915 pmap_remove_all(m); (kgdb) list 2910 { 2911 if ((prot & VM_PROT_WRITE) == 0) { 2912 if (prot & (VM_PROT_READ | VM_PROT_EXECUTE)) { 2913 pmap_changebit(m, PG_RW, FALSE); 2914 } else { 2915 pmap_remove_all(m); 2916 } 2917 } 2918 } 2919 (kgdb) up #9 0xc025bfcf in vm_object_collapse (object=0xcd7b3f18) at /usr/src/sys/vm/vm_page.h:461 461 pmap_page_protect(mem, VM_PROT_NONE); (kgdb) list 456 static __inline void 457 vm_page_protect(vm_page_t mem, int prot) 458 { 459 if (prot == VM_PROT_NONE) { 460 if (mem->flags & (PG_WRITEABLE|PG_MAPPED)) { 461 pmap_page_protect(mem, VM_PROT_NONE); 462 vm_page_flag_clear(mem, PG_WRITEABLE|PG_MAPPED); 463 } 464 } else if ((prot == VM_PROT_READ) && (mem->flags & PG_WRITEABLE)) { 465 pmap_page_protect(mem, VM_PROT_READ); (kgdb) up #10 0xc025b230 in vm_object_deallocate (object=0xcd75f114) at /usr/src/sys/vm/vm_object.c:368 368 vm_object_collapse(object); (kgdb) list 363 object = robject; 364 goto doterm; 365 } 366 367 object = robject; 368 vm_object_collapse(object); 369 continue; 370 } 371 } 372 (kgdb) up #11 0xc02586a9 in vm_map_entry_delete (map=0xcdf63340, entry=0xcdec8f30) at /usr/src/sys/vm/vm_map.c:2057 2057 vm_object_deallocate(entry->object.vm_object); (kgdb) list 2052 { 2053 vm_map_entry_unlink(map, entry); 2054 map->size -= entry->end - entry->start; 2055 2056 if ((entry->eflags & MAP_ENTRY_IS_SUB_MAP) == 0) { 2057 vm_object_deallocate(entry->object.vm_object); 2058 } 2059 2060 vm_map_entry_dispose(map, entry); 2061 } (kgdb) up #12 0xc025885a in vm_map_delete (map=0xcdf63340, start=0, end=3217031168) at /usr/src/sys/vm/vm_map.c:2177 2177 vm_map_entry_delete(map, entry); (kgdb) list 2172 * Delete the entry (which may delete the object) only after 2173 * removing all pmap entries pointing to its pages. 2174 * (Otherwise, its page frames may be reallocated, and any 2175 * modify bits will be set in the wrong object!) 2176 */ 2177 vm_map_entry_delete(map, entry); 2178 entry = next; 2179 } 2180 return (KERN_SUCCESS); 2181 } (kgdb) up #13 0xc02588e9 in vm_map_remove (map=0xcdf63340, start=0, end=3217031168) at /usr/src/sys/vm/vm_map.c:2202 2202 result = vm_map_delete(map, start, end); (kgdb) list 2197 if (map == kmem_map || map == mb_map) 2198 s = splvm(); 2199 2200 vm_map_lock(map); 2201 VM_MAP_RANGE_CHECK(map, start, end); 2202 result = vm_map_delete(map, start, end); 2203 vm_map_unlock(map); 2204 2205 if (map == kmem_map || map == mb_map) 2206 splx(s); (kgdb) up #14 0xc01536dc in exec_new_vmspace (imgp=0xcdfafe24) at /usr/src/sys/kern/kern_exec.c:538 538 vm_map_remove(map, 0, VM_MAXUSER_ADDRESS); (kgdb) list 533 */ 534 if (vmspace->vm_refcnt == 1) { 535 if (vmspace->vm_shm) 536 shmexit(imgp->proc); 537 pmap_remove_pages(vmspace_pmap(vmspace), 0, VM_MAXUSER_ADDRESS); 538 vm_map_remove(map, 0, VM_MAXUSER_ADDRESS); 539 } else { 540 vmspace_exec(imgp->proc); 541 vmspace = imgp->proc->p_vmspace; 542 map = &vmspace->vm_map; (kgdb) up #15 0xc01493af in exec_elf_imgact (imgp=0xcdfafe24) at /usr/src/sys/kern/imgact_elf.c:507 507 exec_new_vmspace(imgp); (kgdb) list 502 */ 503 504 if ((error = exec_extract_strings(imgp)) != 0) 505 goto fail; 506 507 exec_new_vmspace(imgp); 508 509 /* 510 * Yeah, I'm paranoid. There is every reason in the world to get 511 * VTEXT now since from here on out, there are places we can have (kgdb) up #16 0xc0152ee8 in execve (p=0xcdf48a40, uap=0xcdfaff80) at /usr/src/sys/kern/kern_exec.c:208 208 error = (*execsw[i]->ex_imgact)(imgp); (kgdb) list 203 for (i = 0; error == -1 && execsw[i]; ++i) { 204 if (execsw[i]->ex_imgact == NULL || 205 execsw[i]->ex_imgact == img_first) { 206 continue; 207 } 208 error = (*execsw[i]->ex_imgact)(imgp); 209 } 210 211 if (error) { 212 if (error == -1) (kgdb) up #17 0xc0286181 in syscall2 (frame={tf_fs = 47, tf_es = 135135279, tf_ds = -1078001617, tf_edi = 0, tf_esi = -1, tf_ebp = -1077962192, tf_isp = -839188524, tf_ebx = 256, tf_edx = -1, tf_ecx = 135393408, tf_eax = 59, tf_trapno = 12, tf_err = 2, tf_eip = 673618728, tf_cs = 31, tf_eflags = 659, tf_esp = -1077971420, tf_ss = 47}) at /usr/src/sys/i386/i386/trap.c:1175 1175 error = (*callp->sy_call)(p, args); (kgdb) list 1170 p->p_retval[0] = 0; 1171 p->p_retval[1] = frame.tf_edx; 1172 1173 STOPEVENT(p, S_SCE, narg); /* MP aware */ 1174 1175 error = (*callp->sy_call)(p, args); 1176 1177 /* 1178 * MP SAFE (we may or may not have the MP lock at this point) 1179 */ (kgdb) up #18 0xc027a405 in Xint0x80_syscall () (kgdb) list 1180 switch (error) { 1181 case 0: 1182 /* 1183 * Reinitialize proc pointer `p' as it may be different 1184 * if this is a child returning from fork syscall. 1185 */ 1186 p = curproc; 1187 frame.tf_eax = p->p_retval[0]; 1188 frame.tf_edx = p->p_retval[1]; 1189 frame.tf_eflags &= ~PSL_C; (kgdb) machine i386 cpu I686_CPU ident smtp2 maxusers 0 makeoptions DEBUG=-g #Build kernel with gdb(1) debug symbols options INET #InterNETworking options INET6 #IPv6 communications protocols options FFS #Berkeley Fast Filesystem options FFS_ROOT #FFS usable as root device [keep this!] options SOFTUPDATES #Enable FFS soft updates support options MFS #Memory Filesystem options NFS #Network Filesystem options PROCFS #Process filesystem options COMPAT_43 #Compatible with BSD 4.3 [KEEP THIS!] options SCSI_DELAY=15000 #Delay (in ms) before probing SCSI options UCONSOLE #Allow users to grab the console options USERCONFIG #boot -c editor options UFS_DIRHASH #Improve performance on big directories options VISUAL_USERCONFIG #visual boot -c editor options KTRACE #ktrace(1) support options SYSVSHM #SYSV-style shared memory options SYSVMSG #SYSV-style message queues options SYSVSEM #SYSV-style semaphores options P1003_1B #Posix P1003_1B real-time extensions options _KPOSIX_PRIORITY_SCHEDULING options ICMP_BANDLIM #Rate limit bad replies options KBD_INSTALL_CDEV # install a CDEV entry in /dev options RANDOM_IP_ID options LIBMCHAIN device isa device pci device ata device atadisk # ATA disk drives device atapist # ATAPI tape drives options ATA_STATIC_ID #Static device numbering # Allow ncr to attach legacy NCR devices when # both sym and ncr are configured device twe # 3ware Escalade device atkbdc0 at isa? port IO_KBD device atkbd0 at atkbdc? irq 1 device psm0 at atkbdc? irq 12 device vga0 at isa? device sc0 at isa? flags 0x100 device npx0 at nexus? port IO_NPX irq 13 device sio0 at isa? port IO_COM1 flags 0x10 irq 4 device sio1 at isa? port IO_COM2 irq 3 device ppc0 at isa? irq 7 device ppbus # Parallel port bus (required) device lpt # Printer device ppi # Parallel port interface device device fxp # Intel EtherExpress PRO/100B (82557, 82558) device miibus # MII bus support device rl # RealTek 8129/8139 device vr # VIA Rhine, Rhine II pseudo-device loop # Network loopback pseudo-device ether # Ethernet support pseudo-device ppp 1 # Kernel PPP pseudo-device disc 1 # Kernel PPP pseudo-device tun # Packet tunnel. pseudo-device pty # Pseudo-ttys (telnet etc) pseudo-device gif 4 # IPv6 and IPv4 tunneling pseudo-device faith 1 # IPv6-to-IPv4 relaying (translation) pseudo-device bpf #Berkeley packet filter options IPFIREWALL #firewall options IPFIREWALL_VERBOSE #print information about options IPFIREWALL_FORWARD #enable transparent proxy support options IPFIREWALL_VERBOSE_LIMIT=22100 #limit verbosity options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default options IPV6FIREWALL #firewall for IPv6 options IPV6FIREWALL_VERBOSE options IPV6FIREWALL_VERBOSE_LIMIT=1000 options IPFW2 options DUMMYNET options IPSEC #IP security options IPSEC_ESP #IP security (crypto; define w/ IPSEC) -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike