(x86_64) 3.6.0 ifconfig bge0 gives Fatal trap 19.

Sepherosa Ziehau sepherosa at gmail.com
Mon Dec 2 21:50:18 PST 2013


On Tue, Dec 3, 2013 at 12:23 PM, Makoto Fujiwara <makoto at ki.nu> wrote:

> Hi, following is done on HP DL320/G5p
>
> 1. Have USB bootimage written to USB memory stick.
>      1998585856 Dec  2 22:03 dfly-x86_64-3.6.0_REL.img
> 2. (screen) Boot from it, and then
>    Select boot console by 9
>    OK set boot_serial
>    OK boot
> 3. (screen) Login as root and edit /etc/ttys
>    (delete the first line and copy ttyv0 line, and
>      change the word ttyv0 to console; kill -1 1;)
> 4. Login from serial as root:
> 5. Type ifconfig bge0 192.168.1.1
>    Then I have attached log:
>
> (It says parity error, but the machine is OK with memory test
> and boot fine for other OSen.)
>
> Thanks again,
> ---
> Makoto Fujiwara,
> Chiba, Japan, Narita Airport and Disneyland prefecture.
>
> --------------------
> To start the installer, login as 'installer'.  To just get a shell prompt,
> login as 'root'.
>
> DragonFly/x86_64 (Amnesiac) (console)
>
> login: root
> Last login: Tue Dec  3 04:08:58 2013 on ttyv0
> Copyright (c) 2003-2013 The DragonFly Project.
> Copyright (c) 1992-2003 The FreeBSD Project.
> Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
>         The Reg[ACPI Debug]  String [0x0B] "_TMP Method"
> ents of the University of California. All rights reserved.
>
> DragonFly v3.6.0-RELEASE (X86_64_GENERIC) #8: Fri Nov 22 13:22:00 PST 2013
>
> Welcome to DragonFly!
>
> # ifconfig bge0 192.168.1.1
> NMI ISA b1, EISA ff
> RAM parity error, likely hardware failure.
>
>
Sounds like ASF problem.  Is it possible to disable ASF from BIOS?

Best Regards,
sephe


> Fatal trap 19: non-maskable interrupt trap while in kernel mode
> cpuid = 0; lapic->id = 00000000
> instruction pointer     = 0x8:0xffffffff803ad9f4
> stack pointer           = 0x10:0xffffffe0394f3840
> frame pointer           = 0x10:0xffffffe0394f3870
> code segment            = base 0x0, limit 0xfffff, type 0x1b
>                         = DPL 0, pres 1, long 0, def32 0, gran 1
> processor eflags        = interrupt enabled, IOPL = 0
> current process         = Idle
> current thread          = pri 28 (CRIT)
> kernel: type 19 trap, code=0
>
> CPU0 stopping CPUs: 0x0000000e
>  stopped
> Stopped at      bge_miibus_readreg+0xed:        testl   $0x20000000,%r13d
> db> trace
> bge_miibus_readreg() at bge_miibus_readreg+0xed 0xffffffff803ad9f4
> miibus_readreg() at miibus_readreg+0x43 0xffffffff804a0ec1
> brgphy_service() at brgphy_service+0x412 0xffffffff804a3da7
> mii_pollstat() at mii_pollstat+0x2f 0xffffffff804a136d
> bge_copper_link_upd() at bge_copper_link_upd+0x20 0xffffffff803af847
> bge_link_poll() at bge_link_poll+0x4d 0xffffffff803ad4a0
> bge_intr() at bge_intr+0x4a 0xffffffff803aedf3
> bge_intr_legacy() at bge_intr_legacy+0x81 0xffffffff803b10ba
> lwkt_serialize_handler_call() at lwkt_serialize_handler_call+0x7a
> 0xffffffff80578856
> ithread_handler() at ithread_handler+0x1d7 0xffffffff805356fb
> db>
>



-- 
Tomorrow Will Never Die
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.dragonflybsd.org/pipermail/users/attachments/20131203/ba54489a/attachment-0002.html>


More information about the Users mailing list