Kernel page fault with the following non-sleepable locks held

From: David O'Brien <obrien_at_freebsd.org>
Date: Mon, 22 Nov 2010 07:02:00 -0800
Thoughts?


Script started on Sat Nov 20 22:44:55 2010
FreeBSD 9.0-CURRENT #644 r215099M: Wed Nov 10 11:45:01 PST 2010
    obrien_at_dragon:/usr/obj/4kib/i386/compile/DRAGON-WITNESS i386
WARNING: WITNESS option enabled, expect reduced performance.
WARNING: DIAGNOSTIC option enabled, expect reduced performance.
[..]
Starting default moused.
Kernel page fault with the following non-sleepable locks held:
exclusive sleep mutex 4096 (UMA zone) r = 0 (0xc11b9c88) locked _at_ vm/uma_core.c:2010
KDB: stack backtrace:
db_trace_self_wrapper(c08870ef,c650c380,c650c178,4,0,...) at 0xc04ed726 = db_trace_self_wrapper+0x26
kdb_backtrace(7da,1,ffffffff,c0a832fc,da8b5708,...) at 0xc061152a = kdb_backtrace+0x2a
_witness_debugger(c08898ba,da8b571c,4,1,0,...) at 0xc0626256 = _witness_debugger+0x26
witness_warn(5,0,c08b2265,da8b5740,c6c95b40,...) at 0xc062776d = witness_warn+0x1fd
trap(da8b57f4) at 0xc08214bd = trap+0x2ad
calltrap() at 0xc080b93c = calltrap+0x6
--- trap 0xc, eip = 0xc07d051e, esp = 0xda8b5834, ebp = 0xda8b5848 ---
uma_dbg_alloc(c11b7300,0,c6ce9000,7da,c0877fc4,...) at 0xc07d051e = uma_dbg_alloc+0x4e
uma_zalloc_arg(c11b7300,0,2,2,da8b5924,...) at 0xc07cfa4a = uma_zalloc_arg+0xea
malloc(fa0,c08e1770,2,c7a1b000,da8b5924,...) at 0xc05c9fda = malloc+0x11a
sc_vtb_init(da8b5924,1,50,19,0,...) at 0xc0805142 = sc_vtb_init+0x72
sc_alloc_scr_buffer(c7a1b000,1,1,c0625ffb,c689b520,...) at 0xc0568385 = sc_alloc_scr_buffer+0x65
alloc_scp(c6640000,c0286b0a,da8b598c,c05cd3eb,c79a0310,...) at 0xc05684b4 = alloc_scp+0x54
sctty_open(c666b200,4,c088c568,4e,c78912d8,...) at 0xc0568c3b = sctty_open+0xeb
ttydev_open(c68c8700,1,2000,c6c95b40,da8b5afc,...) at 0xc0638954 = ttydev_open+0x254
devfs_open(da8b5afc,c08b7391,c650b340,c650f440,c69ba984,...) at 0xc0573342 = devfs_open+0x102
VOP_OPEN_APV(c08d7600,da8b5afc,100,da8b5a84,0,...) at 0xc083ff80 = VOP_OPEN_APV+0x100
vn_open_cred(da8b5b74,da8b5c28,d88,0,c6575e80,...) at 0xc06843c7 = vn_open_cred+0x4f7
vn_open(da8b5b74,da8b5c28,d88,c78912d8,da8b5b74,...) at 0xc068450b = vn_open+0x3b
kern_openat(c6c95b40,ffffff9c,28405bc8,0,1,...) at 0xc0681088 = kern_openat+0x128
kern_open(c6c95b40,28405bc8,0,0,bfbfdf98,...) at 0xc06814d5 = kern_open+0x35
open(c6c95b40,da8b5cec,0,da8b5d28,7,...) at 0xc0681550 = open+0x30
syscallenter(c6c95b40,da8b5ce4,da8b5ce4,0,c087ed17,...) at 0xc061e8b3 = syscallenter+0x2c3
syscall(da8b5d28) at 0xc082112f = syscall+0x4f
Xint0x80_syscall() at 0xc080b9d1 = Xint0x80_syscall+0x21
--- syscall (5, FreeBSD ELF32, open), eip = 0x281ed72b, esp = 0xbfbfdedc, ebp = 0xbfbfdf98 ---


Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 01
fault virtual address	= 0xc51b9cd0
fault code		= supervisor read, page not present
instruction pointer	= 0x20:0xc07d051e
stack pointer	        = 0x28:0xda8b5834
frame pointer	        = 0x28:0xda8b5848
code segment		= base 0x0, limit 0xfffff, type 0x1b
			= DPL 0, pres 1, def32 1, gran 1
processor eflags	= interrupt enabled, resume, IOPL = 0
current process		= 2073 (sh)
trap number		= 12
panic: page fault
cpuid = 1
KDB: stack backtrace:
db_trace_self_wrapper(c08870ef,d31206e,2c66000a,70797420,78302065,...) at 0xc04ed726 = db_trace_self_wrapper+0x26
kdb_backtrace(c08b0bbd,1,c086c89f,da8b56d0,1,...) at 0xc061152a = kdb_backtrace+0x2a
panic(c086c89f,c08b226c,c6c95ce8,1,1,...) at 0xc05de537 = panic+0x117
trap_fatal(5,0,c08b2265,da8b5740,c6c95b40,...) at 0xc0820ee5 = trap_fatal+0x325
trap(da8b57f4) at 0xc08214ce = trap+0x2be
calltrap() at 0xc080b93c = calltrap+0x6
--- trap 0xc, eip = 0xc07d051e, esp = 0xda8b5834, ebp = 0xda8b5848 ---
uma_dbg_alloc(c11b7300,0,c6ce9000,7da,c0877fc4,...) at 0xc07d051e = uma_dbg_alloc+0x4e
uma_zalloc_arg(c11b7300,0,2,2,da8b5924,...) at 0xc07cfa4a = uma_zalloc_arg+0xea
malloc(fa0,c08e1770,2,c7a1b000,da8b5924,...) at 0xc05c9fda = malloc+0x11a
sc_vtb_init(da8b5924,1,50,19,0,...) at 0xc0805142 = sc_vtb_init+0x72
sc_alloc_scr_buffer(c7a1b000,1,1,c0625ffb,c689b520,...) at 0xc0568385 = sc_alloc_scr_buffer+0x65
alloc_scp(c6640000,c0286b0a,da8b598c,c05cd3eb,c79a0310,...) at 0xc05684b4 = alloc_scp+0x54
sctty_open(c666b200,4,c088c568,4e,c78912d8,...) at 0xc0568c3b = sctty_open+0xeb
ttydev_open(c68c8700,1,2000,c6c95b40,da8b5afc,...) at 0xc0638954 = ttydev_open+0x254
devfs_open(da8b5afc,c08b7391,c650b340,c650f440,c69ba984,...) at 0xc0573342 = devfs_open+0x102
VOP_OPEN_APV(c08d7600,da8b5afc,100,da8b5a84,0,...) at 0xc083ff80 = VOP_OPEN_APV+0x100
vn_open_cred(da8b5b74,da8b5c28,d88,0,c6575e80,...) at 0xc06843c7 = vn_open_cred+0x4f7
vn_open(da8b5b74,da8b5c28,d88,c78912d8,da8b5b74,...) at 0xc068450b = vn_open+0x3b
kern_openat(c6c95b40,ffffff9c,28405bc8,0,1,...) at 0xc0681088 = kern_openat+0x128
kern_open(c6c95b40,28405bc8,0,0,bfbfdf98,...) at 0xc06814d5 = kern_open+0x35
open(c6c95b40,da8b5cec,0,da8b5d28,7,...) at 0xc0681550 = open+0x30
syscallenter(c6c95b40,da8b5ce4,da8b5ce4,0,c087ed17,...) at 0xc061e8b3 = syscallenter+0x2c3
syscall(da8b5d28) at 0xc082112f = syscall+0x4f
Xint0x80_syscall() at 0xc080b9d1 = Xint0x80_syscall+0x21
--- syscall (5, FreeBSD ELF32, open), eip = 0x281ed72b, esp = 0xbfbfdedc, ebp = 0xbfbfdf98 ---
Uptime: panic: 48s
bufwrite: buffer is not busy???
Physical memory: 3203 MB
Received on Mon Nov 22 2010 - 14:02:01 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:40:09 UTC