Date: Mon, 15 Sep 2014 21:24:52 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 193672] New: FreeBSD UEFI boot panics with VirtualBox UEFI loader Message-ID: <bug-193672-8@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193672 Bug ID: 193672 Summary: FreeBSD UEFI boot panics with VirtualBox UEFI loader Product: Base System Version: 10.1-BETA1 Hardware: Any OS: Any Status: Needs Triage Severity: Affects Only Me Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: emaste@freebsd.org Created attachment 147364 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=147364&action=edit verbose boot serial log from boot panic kernel trap 12 with interrupts disabled Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x486a8e215 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80300007 stack pointer = 0x28:0xffffffff81493070 frame pointer = 0x28:0x0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = resume, IOPL = 0 current process = 0 () trap number = 12 panic: page fault cpuid = 0 KDB: stack backtrace: #0 0xffffffff80947060 at ??+0 #1 0xffffffff8090c185 at ??+0 #2 0xffffffff80d07b6f at ??+0 #3 0xffffffff80d07e88 at ??+0 #4 0xffffffff80d074ea at ??+0 #5 0xffffffff80ced402 at ??+0 Uptime: 1s Via LLDB the reported IP is: Address: kernel[0xffffffff80300007] (kernel..text + 161399) Summary: kernel`chopen + 855 [inlined] scsi_2btoul + 4 at scsi_ch.c:1632 kernel`chopen + 851 [inlined] chgetparams + 288 at scsi_ch.c:485 kernel`chopen + 563 at scsi_ch.c:485 (This seems a bit odd.) -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-193672-8>