"npxdna in kernel mode!" from VIA_RNG_store

From: Bruce Cran <bruce_at_cran.org.uk>
Date: Sun, 4 Apr 2010 09:04:50 +0100
I noticed my mini-ITX box (runnning -CURRENT) has been printing quite a few 
"npxdna in kernel mode!" messages recently, so I added KDB support to find out 
where they were coming from. The stack trace I got was:

npxdna in kernel mode!
KDB: stack backtrace:
db_trace_self_wrapper(c07de67f,c8297ab8,c07a477e,c07fc759,7,...) at 
db_trace_self_wrapper+0x28
kdb_backtrace(c07fc759,7,33,50,13,...) at kdb_backtrace+0x31
trap(c8297ac4) at trap+0x55e
calltrap() at calltrap+0x6
--- trap 0x16, eip = 0xc07801f0, esp = 0xc8297b04, ebp = 0xc8297b14 ---
VIA_RNG_store(c0865760,4,c181e6c0,c054ad43,c0811dc0,...) at VIA_RNG_store+0x20
random_nehemiah_read(c185c000,80,2,c185c000,0,...) at 
random_nehemiah_read+0x71
random_read(c1476200,c8297c28,0,1000000,0,...) at random_read+0x7c
devfs_read_f(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at devfs_read_f+0xa1
fo_read(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at fo_read+0x32
dofileread(c181e6c0,5,c1566c08,c8297c28,ffffffff,...) at dofileread+0x81
kern_readv(c181e6c0,5,c8297c28,5,c8297c48,...) at kern_readv+0x68
read(c181e6c0,c8297cc8,c181e6c0,c181e6c0,c187d2a8,...) at read+0x63
syscall(c8297d38) at syscall+0x3ad
Xint0x80_syscall() at Xint0x80_syscall+0x20
--- syscall (3, FreeBSD ELF32, read), eip = 0x28398b83, esp = 0xbfbfde5c, ebp 
= 0xbfbfdf18 ---

A dmesg can be found at http://www.cran.org.uk/~brucec/freebsd/dmesg.itx

-- 
Bruce Cran
Received on Sun Apr 04 2010 - 06:04:55 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:02 UTC