On Sun, Apr 04, 2010 at 09:04:50AM +0100, Bruce Cran wrote: > I noticed my mini-ITX box (runnning -CURRENT) has been printing quite a few > "npxdna in kernel mode!" messages recently, so I added KDB support to find out > where they were coming from. The stack trace I got was: > > npxdna in kernel mode! > KDB: stack backtrace: > db_trace_self_wrapper(c07de67f,c8297ab8,c07a477e,c07fc759,7,...) at > db_trace_self_wrapper+0x28 > kdb_backtrace(c07fc759,7,33,50,13,...) at kdb_backtrace+0x31 > trap(c8297ac4) at trap+0x55e > calltrap() at calltrap+0x6 > --- trap 0x16, eip = 0xc07801f0, esp = 0xc8297b04, ebp = 0xc8297b14 --- > VIA_RNG_store(c0865760,4,c181e6c0,c054ad43,c0811dc0,...) at VIA_RNG_store+0x20 > random_nehemiah_read(c185c000,80,2,c185c000,0,...) at > random_nehemiah_read+0x71 > random_read(c1476200,c8297c28,0,1000000,0,...) at random_read+0x7c > devfs_read_f(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at devfs_read_f+0xa1 > fo_read(c1566c08,c8297c28,c182e080,0,c181e6c0,...) at fo_read+0x32 > dofileread(c181e6c0,5,c1566c08,c8297c28,ffffffff,...) at dofileread+0x81 > kern_readv(c181e6c0,5,c8297c28,5,c8297c48,...) at kern_readv+0x68 > read(c181e6c0,c8297cc8,c181e6c0,c181e6c0,c187d2a8,...) at read+0x63 > syscall(c8297d38) at syscall+0x3ad > Xint0x80_syscall() at Xint0x80_syscall+0x20 > --- syscall (3, FreeBSD ELF32, read), eip = 0x28398b83, esp = 0xbfbfde5c, ebp > = 0xbfbfdf18 --- > > A dmesg can be found at http://www.cran.org.uk/~brucec/freebsd/dmesg.itx Known issue. The patch at http://people.freebsd.org/~kib/misc/kern_fpu.2.patch contains the possible fix.
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:02 UTC