booting FreeBSD fbsd64.psg.com 9.1-PRERELEASE FreeBSD 9.1-PRERELEASE #0 r241020: Fri Sep 28 07:14:15 UTC 2012 root@kaos.glenbarber.us:/usr/obj/usr/src/sys/GENERIC amd64 if i do not type a key during boot (after typing <cr> to beastie), i get the following Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x38 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80704740 stack pointer = 0x28:0xffffffff815336e0 frame pointer = 0x28:0xffffffff81533730 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 0 (swapper) trap number = 12 panic: page fault cpuid = 0 KDB: stack backtrace: #0 0xffffffff809221d6 at kdb_backtrace+0x66 #1 0xffffffff808ec40e at panic+0x1ce #2 0xffffffff80bd91a0 at trap_fatal+0x290 #3 0xffffffff80bd94d8 at trap_pfault+0x1e8 #4 0xffffffff80bd9ade at trap+0x3be #5 0xffffffff80bc33ff at calltrap+0x8 #6 0xffffffff80be95fb at atkbd_intr+0xab #7 0xffffffff80be9dd6 at atkbd_timeout+0x96 #8 0xffffffff80be9e94 at atkbd_attach_unit+0xb4 #9 0xffffffff80bea0c8 at atkbdattach+0x78 #10 0xffffffff8091b702 at device_attach+0x72 #11 0xffffffff8091d15a at bus_generic_attach+0x1a #12 0xffffffff80bec06f at atkbdc_isa_attach+0x1af #13 0xffffffff8091b702 at device_attach+0x72 #14 0xffffffff8091d15a at bus_generic_attach+0x1a #15 0xffffffff80340d05 at acpi_attach+0xbc5 #16 0xffffffff8091b702 at device_attach+0x72 #17 0xffffffff8091d15a at bus_generic_attach+0x1a
On Sunday, September 30, 2012 1:16:23 pm Randy Bush wrote:> booting > > FreeBSD fbsd64.psg.com 9.1-PRERELEASE FreeBSD 9.1-PRERELEASE #0 r241020: FriSep 28 07:14:15 UTC 2012 root@kaos.glenbarber.us:/usr/obj/usr/src/sys/GENERIC amd64> > if i do not type a key during boot (after typing <cr> to beastie), i get > the following > > Fatal trap 12: page fault while in kernel mode > cpuid = 0; apic id = 00 > fault virtual address = 0x38 > fault code = supervisor read data, page not present > instruction pointer = 0x20:0xffffffff80704740 > stack pointer = 0x28:0xffffffff815336e0 > frame pointer = 0x28:0xffffffff81533730 > code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 > processor eflags = interrupt enabled, resume, IOPL = 0 > current process = 0 (swapper) > trap number = 12 > panic: page fault > cpuid = 0 > KDB: stack backtrace: > #0 0xffffffff809221d6 at kdb_backtrace+0x66 > #1 0xffffffff808ec40e at panic+0x1ce > #2 0xffffffff80bd91a0 at trap_fatal+0x290 > #3 0xffffffff80bd94d8 at trap_pfault+0x1e8 > #4 0xffffffff80bd9ade at trap+0x3be > #5 0xffffffff80bc33ff at calltrap+0x8 > #6 0xffffffff80be95fb at atkbd_intr+0xabCan you run 'gdb /boot/kernel/kernel' and do 'l *atkbd_intr+0xab'?> #7 0xffffffff80be9dd6 at atkbd_timeout+0x96 > #8 0xffffffff80be9e94 at atkbd_attach_unit+0xb4 > #9 0xffffffff80bea0c8 at atkbdattach+0x78-- John Baldwin