From owner-freebsd-stable@FreeBSD.ORG Sun Sep 30 17:16:25 2012 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id F0CE31065670 for ; Sun, 30 Sep 2012 17:16:24 +0000 (UTC) (envelope-from randy@psg.com) Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by mx1.freebsd.org (Postfix) with ESMTP id D9A948FC12 for ; Sun, 30 Sep 2012 17:16:24 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=rair.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.80 (FreeBSD)) (envelope-from ) id 1TIN7w-0007Qf-Cn for freebsd-stable@freebsd.org; Sun, 30 Sep 2012 17:16:24 +0000 Date: Sun, 30 Sep 2012 18:16:23 +0100 Message-ID: From: Randy Bush To: FreeBSD Stable User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI) MIME-Version: 1.0 (generated by SEMI 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII Subject: atkbd attach excitement during boot X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Sep 2012 17:16:25 -0000 booting FreeBSD fbsd64.psg.com 9.1-PRERELEASE FreeBSD 9.1-PRERELEASE #0 r241020: Fri Sep 28 07:14:15 UTC 2012 root@kaos.glenbarber.us:/usr/obj/usr/src/sys/GENERIC amd64 if i do not type a key during boot (after typing to beastie), i get the following Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0x38 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80704740 stack pointer = 0x28:0xffffffff815336e0 frame pointer = 0x28:0xffffffff81533730 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 0 (swapper) trap number = 12 panic: page fault cpuid = 0 KDB: stack backtrace: #0 0xffffffff809221d6 at kdb_backtrace+0x66 #1 0xffffffff808ec40e at panic+0x1ce #2 0xffffffff80bd91a0 at trap_fatal+0x290 #3 0xffffffff80bd94d8 at trap_pfault+0x1e8 #4 0xffffffff80bd9ade at trap+0x3be #5 0xffffffff80bc33ff at calltrap+0x8 #6 0xffffffff80be95fb at atkbd_intr+0xab #7 0xffffffff80be9dd6 at atkbd_timeout+0x96 #8 0xffffffff80be9e94 at atkbd_attach_unit+0xb4 #9 0xffffffff80bea0c8 at atkbdattach+0x78 #10 0xffffffff8091b702 at device_attach+0x72 #11 0xffffffff8091d15a at bus_generic_attach+0x1a #12 0xffffffff80bec06f at atkbdc_isa_attach+0x1af #13 0xffffffff8091b702 at device_attach+0x72 #14 0xffffffff8091d15a at bus_generic_attach+0x1a #15 0xffffffff80340d05 at acpi_attach+0xbc5 #16 0xffffffff8091b702 at device_attach+0x72 #17 0xffffffff8091d15a at bus_generic_attach+0x1a