Panic with BCM5751 NIC

Jonathan Fosburgh jonathan at fosburgh.org
Tue Feb 22 08:37:20 PST 2005


Here is some better crash dump information (attached) about the panic with 
this NIC.  HTH.

-- 
Jonathan Fosburgh
AIX and Storage Administrator
UT MD Anderson Cancer Center
Houston, TX
atkbd0: <AT Keyboard> flags 0x1 irq 1 on atkbdc0
kbd0 at atkbd0
installed MI handler for int 1
psm0: failed to get data.
psm0: failed to get status.
psm0: <PS/2 Mouse> irq 12 on atkbdc0
installed MI handler for int 12
psm0: model Generic PS/2 mouse, device ID 0
vga0: <Generic ISA VGA> at port 0x3c0-0x3df iomem 0xa0000-0xbffff on isa0
sc0: <System console> at flags 0x100 on isa0
sc0: VGA <16 virtual consoles, flags=0x300>
sio0 at port 0x3f8-0x3ff irq 4 flags 0x10 on isa0
sio0: type 16550A
installed MI handler for int 4
sio1: can't drain, serial port might not exist, disabling
ppc0: <Parallel port> at port 0x378-0x37f irq 7 on isa0
ppc0: SMC-like chipset (ECP/EPP/PS2/NIBBLE) in COMPATIBLE mode
ppc0: FIFO with 16/16/13 bytes threshold
ppbus0: <Parallel port bus> on ppc0
plip0: <PLIP network interface> on ppbus0
lpt0: <Printer> on ppbus0
lpt0: Interrupt-driven port
ppi0: <Parallel I/O> on ppbus0
installed MI handler for int 7
installed MI handler for int 0
intr 5 at 61869 hz, livelocked! limiting at 20000 hz
acpi_cpu: throttling enabled, 8 steps (100% to 12.5%), currently 100.0%
ad0: 57241MB <ST360015A> [116301/16/63] at ata0-master UDMA100
ad4: DMA limited to UDMA33, non-ATA66 cable or device
ad4: 38166MB <SAMSUNG SP0411C> [77545/16/63] at ata2-master UDMA33
intr 5 at 315 hz, removing livelock limit
Mounting root from ufs:/dev/ad0s2a
cd0 at ata0 bus 0 target 1 lun 0
cd0: <LITE-ON CD-ROM LTN-487T 6QSG> Removable CD-ROM SCSI-0 device
cd0: 16.000MB/s transfers
cd0: cd present [67498 x 2048 byte records]
WARNING: / was not properly dismounted
pflog0: promiscuous mode enabled
bge0: <Broadcom BCM5751 Gigabit Ethernet, ASIC rev. 0x4001> mem 0xf0400000-0xf04
0ffff irq 5 at device 0.0 on pci64
Fatal trap 19: non-maskable interrupt trap while in kernel mode
instruction pointer     = 0x8:0xc029b9cf
stack pointer           = 0x10:0xceb209f0
frame pointer           = 0x10:0xceb209f8
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL  0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, IOPL = 0
current process         = 908 (kldload)
current thread          = pri 10
interrupt mask          =
panic: from debugger
Fatal trap 3: breakpoint instruction fault while in kernel mode
instruction pointer     = 0x8:0xc0284348
stack pointer           = 0x10:0xceb2082c
frame pointer           = 0x10:0xceb20834
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, IOPL = 0
current process         = 908 (kldload)
current thread          = pri 10
interrupt mask          =
panic: from debugger
Uptime: 6m6s
dumping to dev #ad/0x20001, offset 509616
dump ata0: resetting devices .. done
503 502 501 500 499 498 497 496 495 494 493 492 491 490 489 488 487 486 485 484
483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 467 466 465 464
463 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444
443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424
423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 404
403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384
383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364
363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344
343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324
323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304
303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284
283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264
263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244
243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224
223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204
203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184
183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164
163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148  147 146 145 144
143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124
123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104
103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 7
8 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52
51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25
 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
---
#0  dumpsys () at /usr/src/sys/kern/kern_shutdown.c:508
508             if (dumping++) {
dumpsys () at /usr/src/sys/kern/kern_shutdown.c:508
508             if (dumping++) {
(kgdb)
#0  dumpsys () at /usr/src/sys/kern/kern_shutdown.c:508
#1  0xc0185c4f in boot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:341
#2  0xc0186080 in panic (fmt=0xc02accaa "from debugger")
    at /usr/src/sys/kern/kern_shutdown.c:620
#3  0xc01419ed in db_panic (addr=-1071007281, have_addr=0, count=-1,
    modif=0xceb2088c "") at /usr/src/sys/ddb/db_command.c:450
#4  0xc014198b in db_command (last_cmdp=0xc02f2024, cmd_table=0xc02f1e44,
    aux_cmd_tablep=0xc02ec4e8, aux_cmd_tablep_end=0xc02ec4ec)
    at /usr/src/sys/ddb/db_command.c:346
#5  0xc0141a57 in db_command_loop () at /usr/src/sys/ddb/db_command.c:472
#6  0xc014407d in db_trap (type=19, code=0) at /usr/src/sys/ddb/db_trap.c:72
#7  0xc028401e in kdb_trap (type=19, code=0, regs=0xceb209b0)
    at /usr/src/sys/i386/i386/db_interface.c:161
#8  0xc0292ffa in trap_fatal (frame=0xceb209b0, eva=0)
    at /usr/src/sys/i386/i386/trap.c:1139
#9  0xc0292a3f in trap (frame=
      {tf_fs = 24, tf_es = 16, tf_ds = -827195376, tf_edi = 0, tf_esi = 131, tf_
ebp = -827192840, tf_isp = -827192868, tf_ebx = 4, tf_edx = 3324, tf_ecx = 3320,
 tf_eax = 131, tf_trapno = 19, tf_err = 0, tf_eip = -1071007281, tf_cs = 8, tf_e
flags = 582, tf_esp = -939882280, tf_ss = -939877960})
    at /usr/src/sys/i386/i386/trap.c:788
#10 0xc0284f8b in calltrap ()
#11 0x00000018 in ?? ()
#12 0x00000010 in ?? ()
#13 0xceb20010 in ?? ()
#14 0x00000000 in ?? ()
#15 0x00000083 in ?? ()
#16 0xceb209f8 in ?? ()
#17 0xceb209dc in ?? ()
#18 0x00000004 in ?? ()
#19 0x00000cfc in ?? ()
#20 0x00000cf8 in ?? ()
#21 0x00000083 in ?? ()
#22 0x00000013 in ?? ()
#23 0x00000000 in ?? ()
#24 0xc029b9cf in pcireg_cfgwrite (bus=64, slot=0, func=0, reg=128, data=131,
    bytes=4) at machine/cpufunc.h:362
#25 0xc029ae7a in pci_cfgregwrite (bus=64, slot=0, func=0, reg=128, data=131,
    bytes=4) at /usr/src/sys/bus/pci/i386/pci_cfgreg.c:247
#26 0xc029bcfe in nexus_pcib_write_config (dev=0xc7fa88d8, bus=64, slot=0,
    func=0, reg=128, data=131, bytes=4)
    at /usr/src/sys/bus/pci/i386/pcibus.c:70
#27 0xc022e094 in pcib_write_config (dev=0xc7fa99b8, b=64, s=0, f=0, reg=128,
    val=131, width=4) at pcib_if.h:45
#28 0xc022c4b9 in pci_write_config_method (dev=0xc7fa9d18, child=0xc7fa9d60,
    reg=128, val=131, width=4) at pcib_if.h:45
#29 0xce633e61 in ?? ()
#30 0xc7fa9d18 in ?? ()
#31 0xc7fa9d60 in ?? ()
#32 0x00000080 in ?? ()
#33 0x00000083 in ?? ()
#34 0x00000004 in ?? ()
#35 0xc7fa9d18 in ?? ()
#36 0x00100106 in ?? ()
#37 0xceb20ae0 in ?? ()
#38 0xce63689e in ?? ()
#39 0xced89cb8 in ?? ()
#40 0x00006804 in ?? ()
#41 0x00000083 in ?? ()
#42 0xc7fa9d18 in ?? ()
#43 0xced89cb8 in ?? ()
#44 0x00000000 in ?? ()
#45 0x00001292 in ?? ()
#46 0x00000010 in ?? ()
#47 0xceb20b14 in ?? ()
#48 0xce636166 in ?? ()
#49 0xced89cb8 in ?? ()
#50 0x00000000 in ?? ()
#51 0xc7fa9d60 in ?? ()
#52 0xc7fa9d18 in ?? ()
#53 0x00000000 in ?? ()
#54 0x00100106 in ?? ()
#55 0x00000000 in ?? ()
#56 0x00000000 in ?? ()
#57 0x00000000 in ?? ()
#58 0xceb20b30 in ?? ()
#59 0xc019236d in device_probe_and_attach (dev=0xced89cb8) at device_if.h:39
Previous frame inner to this frame (corrupt stack?)

Attachment:
pgp00020.pgp
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00020.pgp
Type: application/octet-stream
Size: 187 bytes
Desc: "Description: PGP signature"
URL: <http://lists.dragonflybsd.org/pipermail/kernel/attachments/20050222/2ab307a4/attachment-0020.obj>


More information about the Kernel mailing list