On Mon, Aug 11, 2003 at 11:12:36AM -0500, Mark Johnston wrote: ... > Using $PIR table, 14 entries at 0xc00fdeb0 > apm0: <APM BIOS> on motherboard > kernel trap 12 with interrupts disabled > > > Fatal trap 12: page fault while in kernel mode > fault virtual address = 0x0 > fault code = supervisor read, page not present > instruction pointer = 0x8:0xc059a773 > stack pointer = 0x10:0xc0c219e2 > frame pointer = 0x10:0xc0c21a02 > code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, def32 1, gran 1 > processor eflags = interrupt enabled, resume, IOPL = 0 > current process = 0 (swapper) > kernel: type 12 trap, code=0 > Stopped at _mtx_lock_flags+0x43: cmpl $0xc07edf8c,0(%ebx) > db> trace > _mtx_lock_flags(0,0,c07aa287,11e,c0c21aaa) at _mtx_lock_flags+0x43 > vm_fault(c102f000,c0000000,2,0,c08205c0) at vm_fault+0x2b4 > trap_pfault(c0c21b9e,0,c00004d8,100000,c00004d8) at trap_pfault+0x152 > trap(6c200018,10,1bc40060,1c,0) at trap+0x30d > calltrap() at calltrap+0x5 > --- trap 0xc, eip = 0x5949, esp = 0xc0c21bde, dbp = 0xc0c21be4 --- > (null)(1bf80058,0,530e0102,80202,505a61) at 0x5949 > db> > > The old kernel (Friday's CURRENT plus ATAng) still boots and works fine. > Please ask for any more information you need or any other steps I can > take. > > Mark Please try without any other patches but just stock -current. The above fault looks like a NULL pointer dereference somewhere. Once you sup to recent _stock_ -current (and no other patches), apply the patch and then do a 'find /usr/src/sys/ -name "*.rej" -print' and see if any patch hunks were rejected before you build and boot the kernel. If after all this you still crash like in the above, then please send me [off-list] your kernel configuration file as well as a trace (as above). -- Bosko Milekic * bmilekic_at_technokratis.com * bmilekic_at_FreeBSD.org TECHNOkRATIS Consulting Services * http://www.technokratis.com/Received on Mon Aug 11 2003 - 08:09:43 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:18 UTC