Re: panic: lock (sleep mutex) vm object not locked _at_ vm_map.c:1433

From: Steve Kargl <sgk_at_troutmask.apl.washington.edu>
Date: Thu, 23 Dec 2004 10:10:43 -0800
On Thu, Dec 23, 2004 at 06:32:38PM +0100, Peter Holm wrote:
> With GENERIC HEAD from Dec 20 12:18 UTC I got:
> 
> panic(c082f17c,c08448df,c0845279,c084494b,599) at panic+0xd8
> witness_unlock(c105d8c4,8,c0844942,599) at witness_unlock+0x170
> _mtx_unlock_flags(c105d8c4,0,c0844942,599,0,0,1d000,0) at
> _mtx_unlock_flags+0x3b
> vm_map_insert(c2072960,c105d8c4,0,0,28060000,1d000,5,7,0,c2072960,c0827d62,156)
> at vm_map_insert+0x1ad
> elf32_map_insert(0,0,28060000,2807d000,5,7,10a) at
> elf32_map_insert+0x21e
> elf32_load_section(c1787114,c105d8c4,0,28060000,1c96a,1c96a,5,1000)
> at elf32_load_section+0x202
> elf32_load_file(cf68faa8,cf68fbd0,1000) at elf32_load_file+0x3a6
> exec_elf32_imgact(cf68fb94) at exec_elf32_imgact+0x413
> kern_execve(c35a68a0,8068384,80683a4,8068404,0) at
> kern_execve+0x3fa
> execve(c35a68a0,cf68fd14,3,0,286) at execve+0x18
> syscall(2f,2f,2f,0,8068384) at syscall+0x128
> Xint0x80_syscall() at Xint0x80_syscall+0x1f
> --- syscall (59, FreeBSD ELF32, execve), eip = 0x28127767, esp =
> 0xbfbfe7fc, ebp = 0xbfbfe828 ---
> 
> Details at http://www.holm.cc/stress/log/cons97.html

I'm seeing something similiar.

Trying to mount root from ufs:/dev/ad0s3a
Memory modified after free 0xc1bcb800 (508) val=ff0ff70 _at_ 0xc1bcb800

Fatal trap 12: page fault  while in kernel mode
fault virtual address = 0xff70ff90
fault code            = supervisor read, page not present
instruction pointer   = 0x8:0xc064776d
stack pointer         = 0x10:0xd539291c
frame pointer         = 0x10:0xd539293c
code segement         = base 0x0, limit 0xfffff, type 0x1b
                      = DPL 0, pres 1, def32 1, gran 1
processor eflags      = interrupt enable, resume, IOPL=0
current process       = 49 (init)

db> trace
mtrash_ctor at mtrash_ctor+0x63
uma_zalloc_arg at uma_zalloc_arg+0x46c
malloc at malloc+0x87
elf32_load_file at elf32_load_file+0x4b
exec_elf32_imgact at exec_elf32_imgact+0x483
kern_execve at kern_execve+0x454
execve at execve+0x30
syscall at syscal+0x13b
Xint0x80_syscall at Xint0x80_syscall+0x1f
-- 
Steve
Received on Thu Dec 23 2004 - 17:10:44 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:25 UTC