I noticed my mini-ITX box (runnning -CURRENT) has been printing quite a few "npxdna in kernel mode!" messages recently, so I added KDB support to find out where they were coming from. The stack trace I got was: npxdna in kernel mode! KDB: stack backtrace: db_trace_self_wrapper(c07de67f,c8297ab8,c07a477e,c07fc759,7,...) at db_trace_self_wrapper+0x28 kdb_backtrace(c07fc759,7,33,50,13,...) at kdb_backtrace+0x31 trap(c8297ac4) at trap+0x55e calltrap() at calltrap+0x6 --- trap 0x16, eip = 0xc07801f0, esp = 0xc8297b04, ebp = 0xc8297b14 --- VIA_RNG_store(c0865760,4,c181e6c0,c054ad43,c0811dc0,...) at VIA_RNG_store+0x20 random_nehemiah_read(c185c000,80,2,c185c000,0,...) at random_nehemiah_read+0x71 random_read(c1476200,c8297c28,0,1000000,0,...) at random_read+0x7c devfs_read_f(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at devfs_read_f+0xa1 fo_read(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at fo_read+0x32 dofileread(c181e6c0,5,c1566c08,c8297c28,ffffffff,...) at dofileread+0x81 kern_readv(c181e6c0,5,c8297c28,5,c8297c48,...) at kern_readv+0x68 read(c181e6c0,c8297cc8,c181e6c0,c181e6c0,c187d2a8,...) at read+0x63 syscall(c8297d38) at syscall+0x3ad Xint0x80_syscall() at Xint0x80_syscall+0x20 --- syscall (3, FreeBSD ELF32, read), eip = 0x28398b83, esp = 0xbfbfde5c, ebp = 0xbfbfdf18 --- A dmesg can be found at http://www.cran.org.uk/~brucec/freebsd/dmesg.itx -- Bruce CranReceived on Sun Apr 04 2010 - 06:04:55 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:02 UTC