Hello, I grabed this trace after my machine panics. This happens if I run links to swat on the local box over ssh forwarded X11 II have ZERO_COPY_SOCKETS in my kernel and I'll try Andrew's patch, but I wanted to make sure this panic is seen by somebody who can read it ;) Thanks, -Harry login: panic: vm_page_free: freeing wired page KDB: enter: panic [thread pid 531 tid 100064 ] Stopped at kdb_enter+0x30: leave db> trace Tracing pid 531 tid 100064 td 0xc159c000 kdb_enter(c07428f6,c07a7920,c075728a,cca0bb10,100) at kdb_enter+0x30 panic(c075728a,1,c0756f8e,3f1,125) at panic+0xd5 vm_page_free_toq(c136c0f8,40,c136c0f8,cca0bb78,c06ad78f) at vm_page_free_toq+0xf7 vm_page_free(c136c0f8,0,c0756ac7,5eb,0) at vm_page_free+0x22 vm_object_backing_scan(c1b26084,4,c0756ac7,633,12c) at vm_object_backing_scan+0x44f vm_object_collapse(c1b26084,0,c0756ac7,214,c1b37210) at vm_object_collapse+0xfa vm_object_deallocate(c1b37210,0,c07561c3,89e,0) at vm_object_deallocate+0x36a vm_map_entry_delete(c1971e10,c1b20ae4,846d000,cca0bc38,c06a4dc3) at vm_map_entry_delete+0x198 vm_map_delete(c1971e10,0,bfc00000,c1971e10,c1777780) at vm_map_delete+0x21c vm_map_remove(c1971e10,0,bfc00000,102,c19b9b2c) at vm_map_remove+0x55 exit1(c159c000,0,cca0bd30,c06f8b80,c159c000) at exit1+0x6db sys_exit(c159c000,cca0bd04,4,418,1) at sys_exit+0x1d syscall(3b,3b,3b,8402a20,8408e40) at syscall+0x290 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (1, FreeBSD ELF32, sys_exit), eip = 0x2848748f, esp = 0xbfbfe9ec, ebp = 0xbfbfea08 ---
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:45 UTC