svn commit: r353149 - head/sys/amd64/amd64
Mateusz Guzik
mjguzik at gmail.com
Mon Oct 7 17:09:30 UTC 2019
Does this fix it for you?
https://people.freebsd.org/~mjg/pmap-fict.diff
On 10/7/19, Mateusz Guzik <mjguzik at gmail.com> wrote:
> Ok, looks ilke it does not like the sparse array for fictitious
> mappings. I'll see about a patch.
>
> On 10/7/19, Cy Schubert <cy.schubert at gmail.com> wrote:
>> In message
>> <CAGudoHFbuUgCrBa1JS6S5ynB_obpwBJdyRP66bd-WuhHO8ZP7A at mail.gmail.c
>> om>
>> , Mateusz Guzik writes:
>>> Can you show:
>>>
>>> sysctl vm.phys_segso
>>
>> vm.phys_segs:
>> SEGMENT 0:
>>
>> start: 0x10000
>> end: 0x9d000
>> domain: 0
>> free list: 0xffffffff80f31070
>>
>> SEGMENT 1:
>>
>> start: 0x100000
>> end: 0x1000000
>> domain: 0
>> free list: 0xffffffff80f31070
>>
>> SEGMENT 2:
>>
>> start: 0x1000000
>> end: 0x1ca4000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 3:
>>
>> start: 0x1cb3000
>> end: 0x1ce3000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 4:
>>
>> start: 0x1f00000
>> end: 0x20000000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 5:
>>
>> start: 0x20200000
>> end: 0x40000000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 6:
>>
>> start: 0x40203000
>> end: 0xd4993000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 7:
>>
>> start: 0xd6fff000
>> end: 0xd7000000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 8:
>>
>> start: 0x100001000
>> end: 0x211d4d000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>> SEGMENT 9:
>>
>> start: 0x21fc00000
>> end: 0x21fd44000
>> domain: 0
>> free list: 0xffffffff80f30e00
>>
>>
>>
>>>
>>> and from the crashdump:
>>> p pv_table
>>
>> $1 = (struct pmap_large_md_page *) 0xfffffe000e000000
>>
>> kgdb) p *pv_table
>> $1 = {pv_lock = {lock_object = {lo_name = 0xffffffff80b0a9ce "pmap pv
>> list",
>> lo_flags = 623050752, lo_data = 0, lo_witness =
>> 0x800000000201f163},
>> rw_lock = 1}, pv_page = {pv_list = {tqh_first = 0x0,
>> tqh_last = 0xfffffe000e000020}, pv_gen = 0, pat_mode = 0},
>> pv_invl_gen = 0}
>> (kgdb)
>>
>>
>> --
>> Cheers,
>> Cy Schubert <Cy.Schubert at cschubert.com>
>> FreeBSD UNIX: <cy at FreeBSD.org> Web: http://www.FreeBSD.org
>>
>> The need of the many outweighs the greed of the few.
>>
>>
>>>
>>> On 10/7/19, Cy Schubert <Cy.Schubert at cschubert.com> wrote:
>>> > In message <201910070406.x9746N0U009068 at slippy.cwsent.com>, Cy
>>> > Schubert
>>> > writes:
>>> >> In message <201910062213.x96MDZv3085523 at repo.freebsd.org>, Mateusz
>>> >> Guzik
>>> >> writes
>>> >> :
>>> >> > Author: mjg
>>> >> > Date: Sun Oct 6 22:13:35 2019
>>> >> > New Revision: 353149
>>> >> > URL: https://svnweb.freebsd.org/changeset/base/353149
>>> >> >
>>> >> > Log:
>>> >> > amd64 pmap: implement per-superpage locks
>>> >> >
>>> >> > The current 256-lock sized array is a problem in the following
>>> >> > ways:
>>> >> > - it's way too small
>>> >> > - there are 2 locks per cacheline
>>> >> > - it is not NUMA-aware
>>> >> >
>>> >> > Solve these issues by introducing per-superpage locks backed by
>>> >> > pages
>>> >> > allocated from respective domains.
>>> >> >
>>> >> > This significantly reduces contention e.g. during poudriere -j
>>> >> > 104.
>>> >> > See the review for results.
>>> >> >
>>> >> > Reviewed by: kib
>>> >> > Discussed with: jeff
>>> >> > Sponsored by: The FreeBSD Foundation
>>> >> > Differential Revision: https://reviews.freebsd.org/D21833
>>> >> >
>>> >> > Modified:
>>> >> > head/sys/amd64/amd64/pmap.c
>>> >> >
>>> >> > Modified: head/sys/amd64/amd64/pmap.c
>>> >> > ========================================================================
>>> ===
>>> >> ==
>>> >> > =
>>> >> > --- head/sys/amd64/amd64/pmap.c Sun Oct 6 20:36:25 2019 (r35314
>>> >> > 8)
>>> >> > +++ head/sys/amd64/amd64/pmap.c Sun Oct 6 22:13:35 2019 (r35314
>>> >> > 9)
>>> >> > @@ -316,13 +316,25 @@ pmap_pku_mask_bit(pmap_t pmap)
>>> >> > #define PV_STAT(x) do { } while (0)
>>> >> > #endif
>>> >> >
>>> >> > -#define pa_index(pa) ((pa) >> PDRSHIFT)
>>> >> > +#undef pa_index
>>> >> > +#define pa_index(pa) ({ \
>>> >> > + KASSERT((pa) <= vm_phys_segs[vm_phys_nsegs - 1].end, \
>>> >> > + ("address %lx beyond the last segment", (pa))); \
>>> >> > + (pa) >> PDRSHIFT; \
>>> >> > +})
>>> >> > +#if VM_NRESERVLEVEL > 0
>>> >> > +#define pa_to_pmdp(pa) (&pv_table[pa_index(pa)])
>>> >> > +#define pa_to_pvh(pa) (&(pa_to_pmdp(pa)->pv_page))
>>> >> > +#define PHYS_TO_PV_LIST_LOCK(pa) \
>>> >> > + (&(pa_to_pmdp(pa)->pv_lock))
>>> >> > +#else
>>> >> > #define pa_to_pvh(pa) (&pv_table[pa_index(pa)])
>>> >> >
>>> >> > #define NPV_LIST_LOCKS MAXCPU
>>> >> >
>>> >> > #define PHYS_TO_PV_LIST_LOCK(pa) \
>>> >> > (&pv_list_locks[pa_index(pa) % NPV_LIST_LOCKS])
>>> >> > +#endif
>>> >> >
>>> >> > #define CHANGE_PV_LIST_LOCK_TO_PHYS(lockp, pa) do { \
>>> >> > struct rwlock **_lockp = (lockp); \
>>> >> > @@ -400,14 +412,22 @@ static int pmap_initialized;
>>> >> >
>>> >> > /*
>>> >> > * Data for the pv entry allocation mechanism.
>>> >> > - * Updates to pv_invl_gen are protected by the pv_list_locks[]
>>> >> > - * elements, but reads are not.
>>> >> > + * Updates to pv_invl_gen are protected by the pv list lock but
>>> >> > reads
>>> >> > are
>>> >> no
>>> >> > t.
>>> >> > */
>>> >> > static TAILQ_HEAD(pch, pv_chunk) pv_chunks =
>>> >> > TAILQ_HEAD_INITIALIZER(pv_chu
>>> >> nk
>>> >> > s);
>>> >> > static struct mtx __exclusive_cache_line pv_chunks_mutex;
>>> >> > +#if VM_NRESERVLEVEL > 0
>>> >> > +struct pmap_large_md_page {
>>> >> > + struct rwlock pv_lock;
>>> >> > + struct md_page pv_page;
>>> >> > + u_long pv_invl_gen;
>>> >> > +};
>>> >> > +static struct pmap_large_md_page *pv_table;
>>> >> > +#else
>>> >> > static struct rwlock __exclusive_cache_line
>>> >> > pv_list_locks[NPV_LIST_LOCKS];
>>> >> > static u_long pv_invl_gen[NPV_LIST_LOCKS];
>>> >> > static struct md_page *pv_table;
>>> >> > +#endif
>>> >> > static struct md_page pv_dummy;
>>> >> >
>>> >> > /*
>>> >> > @@ -918,12 +938,21 @@ SYSCTL_LONG(_vm_pmap, OID_AUTO,
>>> >> > invl_wait_slow,
>>> >> > CTLFL
>>> >> A
>>> >> > "Number of slow invalidation waits for lockless DI");
>>> >> > #endif
>>> >> >
>>> >> > +#if VM_NRESERVLEVEL > 0
>>> >> > static u_long *
>>> >> > pmap_delayed_invl_genp(vm_page_t m)
>>> >> > {
>>> >> >
>>> >> > + return (&pa_to_pmdp(VM_PAGE_TO_PHYS(m))->pv_invl_gen);
>>> >> > +}
>>> >> > +#else
>>> >> > +static u_long *
>>> >> > +pmap_delayed_invl_genp(vm_page_t m)
>>> >> > +{
>>> >> > +
>>> >> > return (&pv_invl_gen[pa_index(VM_PAGE_TO_PHYS(m)) % NPV_LIST_LO
>>> CKS]);
>>> >> > }
>>> >> > +#endif
>>> >> >
>>> >> > static void
>>> >> > pmap_delayed_invl_callout_func(void *arg __unused)
>>> >> > @@ -1803,6 +1832,112 @@ pmap_page_init(vm_page_t m)
>>> >> > m->md.pat_mode = PAT_WRITE_BACK;
>>> >> > }
>>> >> >
>>> >> > +#if VM_NRESERVLEVEL > 0
>>> >> > +static void
>>> >> > +pmap_init_pv_table(void)
>>> >> > +{
>>> >> > + struct pmap_large_md_page *pvd;
>>> >> > + vm_size_t s;
>>> >> > + long start, end, highest, pv_npg;
>>> >> > + int domain, i, j, pages;
>>> >> > +
>>> >> > + /*
>>> >> > + * We strongly depend on the size being a power of two, so the
>>> assert
>>> >> > + * is overzealous. However, should the struct be resized to a
>>> >> > + * different power of two, the code below needs to be revisited
>>> .
>>> >> > + */
>>> >> > + CTASSERT((sizeof(*pvd) == 64));
>>> >> > +
>>> >> > + /*
>>> >> > + * Calculate the size of the array.
>>> >> > + */
>>> >> > + pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR);
>>> >> > + s = (vm_size_t)pv_npg * sizeof(struct pmap_large_md_page);
>>> >> > + s = round_page(s);
>>> >> > + pv_table = (struct pmap_large_md_page *)kva_alloc(s);
>>> >> > + if (pv_table == NULL)
>>> >> > + panic("%s: kva_alloc failed\n", __func__);
>>> >> > +
>>> >> > + /*
>>> >> > + * Iterate physical segments to allocate space for respective p
>>> ages.
>>> >> > + */
>>> >> > + highest = -1;
>>> >> > + s = 0;
>>> >> > + for (i = 0; i < vm_phys_nsegs; i++) {
>>> >> > + start = vm_phys_segs[i].start / NBPDR;
>>> >> > + end = vm_phys_segs[i].end / NBPDR;
>>> >> > + domain = vm_phys_segs[i].domain;
>>> >> > +
>>> >> > + if (highest >= end)
>>> >> > + continue;
>>> >> > +
>>> >> > + if (start < highest) {
>>> >> > + start = highest + 1;
>>> >> > + pvd = &pv_table[start];
>>> >> > + } else {
>>> >> > + /*
>>> >> > + * The lowest address may land somewhere in the
>>> middle
>>> >> > + * of our page. Simplify the code by pretending
>>> it is
>>> >> > + * at the beginning.
>>> >> > + */
>>> >> > + pvd = pa_to_pmdp(vm_phys_segs[i].start);
>>> >> > + pvd = (struct pmap_large_md_page *)trunc_page(p
>>> vd);
>>> >> > + start = pvd - pv_table;
>>> >> > + }
>>> >> > +
>>> >> > + pages = end - start + 1;
>>> >> > + s = round_page(pages * sizeof(*pvd));
>>> >> > + highest = start + (s / sizeof(*pvd)) - 1;
>>> >> > +
>>> >> > + for (j = 0; j < s; j += PAGE_SIZE) {
>>> >> > + vm_page_t m = vm_page_alloc_domain(NULL, 0,
>>> >> > + domain, VM_ALLOC_NORMAL | VM_ALLOC_NOOBJ);
>>> >> > + if (m == NULL)
>>> >> > + panic("vm_page_alloc_domain failed for
>>> %lx\n",
>>> >> > (vm_offset_t)pvd + j);
>>> >> > + pmap_qenter((vm_offset_t)pvd + j, &m, 1);
>>> >> > + }
>>> >> > +
>>> >> > + for (j = 0; j < s / sizeof(*pvd); j++) {
>>> >> > + rw_init_flags(&pvd->pv_lock, "pmap pv list", RW
>>> _NEW);
>>> >> > + TAILQ_INIT(&pvd->pv_page.pv_list);
>>> >> > + pvd->pv_page.pv_gen = 0;
>>> >> > + pvd->pv_page.pat_mode = 0;
>>> >> > + pvd->pv_invl_gen = 0;
>>> >> > + pvd++;
>>> >> > + }
>>> >> > + }
>>> >> > + TAILQ_INIT(&pv_dummy.pv_list);
>>> >> > +}
>>> >> > +#else
>>> >> > +static void
>>> >> > +pmap_init_pv_table(void)
>>> >> > +{
>>> >> > + vm_size_t s;
>>> >> > + long i, pv_npg;
>>> >> > +
>>> >> > + /*
>>> >> > + * Initialize the pool of pv list locks.
>>> >> > + */
>>> >> > + for (i = 0; i < NPV_LIST_LOCKS; i++)
>>> >> > + rw_init(&pv_list_locks[i], "pmap pv list");
>>> >> > +
>>> >> > + /*
>>> >> > + * Calculate the size of the pv head table for superpages.
>>> >> > + */
>>> >> > + pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR);
>>> >> > +
>>> >> > + /*
>>> >> > + * Allocate memory for the pv head table for superpages.
>>> >> > + */
>>> >> > + s = (vm_size_t)pv_npg * sizeof(struct md_page);
>>> >> > + s = round_page(s);
>>> >> > + pv_table = (struct md_page *)kmem_malloc(s, M_WAITOK | M_ZERO);
>>> >> > + for (i = 0; i < pv_npg; i++)
>>> >> > + TAILQ_INIT(&pv_table[i].pv_list);
>>> >> > + TAILQ_INIT(&pv_dummy.pv_list);
>>> >> > +}
>>> >> > +#endif
>>> >> > +
>>> >> > /*
>>> >> > * Initialize the pmap module.
>>> >> > * Called by vm_init, to initialize any structures that the pmap
>>> >> > @@ -1813,8 +1948,7 @@ pmap_init(void)
>>> >> > {
>>> >> > struct pmap_preinit_mapping *ppim;
>>> >> > vm_page_t m, mpte;
>>> >> > - vm_size_t s;
>>> >> > - int error, i, pv_npg, ret, skz63;
>>> >> > + int error, i, ret, skz63;
>>> >> >
>>> >> > /* L1TF, reserve page @0 unconditionally */
>>> >> > vm_page_blacklist_add(0, bootverbose);
>>> >> > @@ -1902,26 +2036,7 @@ pmap_init(void)
>>> >> > */
>>> >> > mtx_init(&pv_chunks_mutex, "pmap pv chunk list", NULL, MTX_DEF)
>>> ;
>>> >> >
>>> >> > - /*
>>> >> > - * Initialize the pool of pv list locks.
>>> >> > - */
>>> >> > - for (i = 0; i < NPV_LIST_LOCKS; i++)
>>> >> > - rw_init(&pv_list_locks[i], "pmap pv list");
>>> >> > -
>>> >> > - /*
>>> >> > - * Calculate the size of the pv head table for superpages.
>>> >> > - */
>>> >> > - pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR);
>>> >> > -
>>> >> > - /*
>>> >> > - * Allocate memory for the pv head table for superpages.
>>> >> > - */
>>> >> > - s = (vm_size_t)(pv_npg * sizeof(struct md_page));
>>> >> > - s = round_page(s);
>>> >> > - pv_table = (struct md_page *)kmem_malloc(s, M_WAITOK | M_ZERO);
>>> >> > - for (i = 0; i < pv_npg; i++)
>>> >> > - TAILQ_INIT(&pv_table[i].pv_list);
>>> >> > - TAILQ_INIT(&pv_dummy.pv_list);
>>> >> > + pmap_init_pv_table();
>>> >> >
>>> >> > pmap_initialized = 1;
>>> >> > for (i = 0; i < PMAP_PREINIT_MAPPING_COUNT; i++) {
>>> >> >
>>> >>
>>> >> This causes a page fault during X (xdm) startup, which loads
>>> >> drm-current-kmod.
>>> >>
>>> >> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame
>>> >> 0xfffffe0093e9c260
>>> >> vpanic() at vpanic+0x19d/frame 0xfffffe0093e9c2b0
>>> >> panic() at panic+0x43/frame 0xfffffe0093e9c310
>>> >> vm_fault() at vm_fault+0x2126/frame 0xfffffe0093e9c460
>>> >> vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c4b0
>>> >> trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c510
>>> >> trap() at trap+0x2a1/frame 0xfffffe0093e9c620
>>> >> calltrap() at calltrap+0x8/frame 0xfffffe0093e9c620
>>> >> --- trap 0xc, rip = 0xffffffff80a054b1, rsp = 0xfffffe0093e9c6f0, rbp
>>> >> =
>>> >> 0xfffffe0093e9c7a0 ---
>>> >> pmap_enter() at pmap_enter+0x861/frame 0xfffffe0093e9c7a0
>>> >> vm_fault() at vm_fault+0x1c69/frame 0xfffffe0093e9c8f0
>>> >> vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c940
>>> >> trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c9a0
>>> >> trap() at trap+0x438/frame 0xfffffe0093e9cab0
>>> >> calltrap() at calltrap+0x8/frame 0xfffffe0093e9cab0
>>> >> --- trap 0xc, rip = 0x30e2a9c3, rsp = 0x7fffffffea50, rbp =
>>> >> 0x7fffffffeaa0
>>> >>
>>> >> ---
>>> >> Uptime: 3m33s
>>> >> Dumping 945 out of 7974
>>> >> MB:..2%..11%..21%..31%..41%..51%..61%..72%..82%..92%
>>> >>
>>> >> (kgdb) bt
>>> >> #0 doadump (textdump=1) at pcpu_aux.h:55
>>> >> #1 0xffffffff8068c5ed in kern_reboot (howto=260)
>>> >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:479
>>> >> #2 0xffffffff8068caa9 in vpanic (fmt=<value optimized out>,
>>> >> ap=<value optimized out>)
>>> >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:908
>>> >> #3 0xffffffff8068c8a3 in panic (fmt=<value optimized out>)
>>> >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:835
>>> >> #4 0xffffffff8098c966 in vm_fault (map=<value optimized out>,
>>> >> vaddr=<value optimized out>, fault_type=<value optimized out>,
>>> >> fault_flags=<value optimized out>, m_hold=<value optimized out>)
>>> >> at /opt/src/svn-current/sys/vm/vm_fault.c:672
>>> >> #5 0xffffffff8098a723 in vm_fault_trap (map=0xfffff80002001000,
>>> >> vaddr=<value optimized out>, fault_type=2 '\002',
>>> >> fault_flags=<value optimized out>, signo=0x0, ucode=0x0)
>>> >> at /opt/src/svn-current/sys/vm/vm_fault.c:568
>>> >> #6 0xffffffff80a18326 in trap_pfault (frame=0xfffffe0093e9c630,
>>> >> signo=<value optimized out>, ucode=<value optimized out>)
>>> >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:828
>>> >> #7 0xffffffff80a177f1 in trap (frame=0xfffffe0093e9c630)
>>> >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:407
>>> >> #8 0xffffffff809f1aac in calltrap ()
>>> >> at /opt/src/svn-current/sys/amd64/amd64/exception.S:289
>>> >> ---Type <return> to continue, or q <return> to quit---
>>> >> #9 0xffffffff80a054b1 in pmap_enter (pmap=<value optimized out>,
>>> >> va=851443712, m=0xfffffe0005b25ce8, prot=<value optimized out>,
>>> >> flags=2677542912, psind=<value optimized out>) at atomic.h:221
>>> >> #10 0xffffffff8098c4a9 in vm_fault (map=<value optimized out>,
>>> >> vaddr=<value optimized out>, fault_type=232 '\ufffd',
>>> >> fault_flags=<value optimized out>, m_hold=0x0)
>>> >> at /opt/src/svn-current/sys/vm/vm_fault.c:489
>>> >> #11 0xffffffff8098a723 in vm_fault_trap (map=0xfffff80173eb5000,
>>> >> vaddr=<value optimized out>, fault_type=2 '\002',
>>> >> fault_flags=<value optimized out>, signo=0xfffffe0093e9ca84,
>>> >> ucode=0xfffffe0093e9ca80) at
>>> >> /opt/src/svn-current/sys/vm/vm_fault.c:568
>>> >> #12 0xffffffff80a18326 in trap_pfault (frame=0xfffffe0093e9cac0,
>>> >> signo=<value optimized out>, ucode=<value optimized out>)
>>> >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:828
>>> >> #13 0xffffffff80a17988 in trap (frame=0xfffffe0093e9cac0)
>>> >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:347
>>> >> #14 0xffffffff809f1aac in calltrap ()
>>> >> at /opt/src/svn-current/sys/amd64/amd64/exception.S:289
>>> >> #15 0x0000000030e2a9c3 in ?? ()
>>> >> Previous frame inner to this frame (corrupt stack?)
>>> >> Current language: auto; currently minimal
>>> >> (kgdb) frame 9
>>> >> #9 0xffffffff80a054b1 in pmap_enter (pmap=<value optimized out>,
>>> >> va=851443712, m=0xfffffe0005b25ce8, prot=<value optimized out>,
>>> >> flags=2677542912, psind=<value optimized out>) at atomic.h:221
>>> >> 221 ATOMIC_CMPSET(long);
>>> >> (kgdb) l
>>> >> 216 }
>>> >> 217
>>> >> 218 ATOMIC_CMPSET(char);
>>> >> 219 ATOMIC_CMPSET(short);
>>> >> 220 ATOMIC_CMPSET(int);
>>> >> 221 ATOMIC_CMPSET(long);
>>> >> 222
>>> >> 223 /*
>>> >> 224 * Atomically add the value of v to the integer pointed to by p
>>> and
>>> >> return
>>> >> 225 * the previous value of *p.
>>> >> (kgdb)
>>> >
>>> > I should use kgdb from ports instead of /usr/libexec version. Similar
>>> > result.
>>> >
>>> > <4>WARN_ON(!mutex_is_locked(&fbc->lock))WARN_ON(!mutex_is_locked(&fbc->
>>> > lock))
>>> > panic: vm_fault: fault on nofault entry, addr: 0xfffffe000e01c000
>>> > cpuid = 1
>>> > time = 1570417211
>>> > KDB: stack backtrace:
>>> > db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame
>>> > 0xfffffe0093e9c260
>>> > vpanic() at vpanic+0x19d/frame 0xfffffe0093e9c2b0
>>> > panic() at panic+0x43/frame 0xfffffe0093e9c310
>>> > vm_fault() at vm_fault+0x2126/frame 0xfffffe0093e9c460
>>> > vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c4b0
>>> > trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c510
>>> > trap() at trap+0x2a1/frame 0xfffffe0093e9c620
>>> > calltrap() at calltrap+0x8/frame 0xfffffe0093e9c620
>>> > --- trap 0xc, rip = 0xffffffff80a054b1, rsp = 0xfffffe0093e9c6f0, rbp
>>> > =
>>> > 0xfffffe0093e9c7a0 ---
>>> > pmap_enter() at pmap_enter+0x861/frame 0xfffffe0093e9c7a0
>>> > vm_fault() at vm_fault+0x1c69/frame 0xfffffe0093e9c8f0
>>> > vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c940
>>> > trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c9a0
>>> > trap() at trap+0x438/frame 0xfffffe0093e9cab0
>>> > calltrap() at calltrap+0x8/frame 0xfffffe0093e9cab0
>>> > --- trap 0xc, rip = 0x30e2a9c3, rsp = 0x7fffffffea50, rbp =
>>> > 0x7fffffffeaa0
>>> > ---
>>> > Uptime: 3m33s
>>> > Dumping 945 out of 7974
>>> > MB:..2%..11%..21%..31%..41%..51%..61%..72%..82%..92%
>>> >
>>> > __curthread () at /opt/src/svn-current/sys/amd64/include/pcpu_aux.h:55
>>> > 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcp
>>> u,
>>> > (kgdb)
>>> >
>>> > Backtrace stopped: Cannot access memory at address 0x7fffffffea50
>>> > (kgdb) frame 10
>>> > #10 0xffffffff80a054b1 in atomic_fcmpset_long (dst=<optimized out>,
>>> > src=<optimized out>, expect=<optimized out>)
>>> > at /opt/src/svn-current/sys/amd64/include/atomic.h:221
>>> > 221 ATOMIC_CMPSET(long);
>>> > (kgdb) l
>>> > 216 }
>>> > 217
>>> > 218 ATOMIC_CMPSET(char);
>>> > 219 ATOMIC_CMPSET(short);
>>> > 220 ATOMIC_CMPSET(int);
>>> > 221 ATOMIC_CMPSET(long);
>>> > 222
>>> > 223 /*
>>> > 224 * Atomically add the value of v to the integer pointed to by p
>>> > and
>>> > return
>>> > 225 * the previous value of *p.
>>> > (kgdb)
>>> >
>>> >
>>> >
>>> > --
>>> > Cheers,
>>> > Cy Schubert <Cy.Schubert at cschubert.com>
>>> > FreeBSD UNIX: <cy at FreeBSD.org> Web: http://www.FreeBSD.org
>>> >
>>> > The need of the many outweighs the greed of the few.
>>> >
>>> >
>>> >
>>>
>>>
>>> --
>>> Mateusz Guzik <mjguzik gmail.com>
>>
>>
>>
>>
>>
>
>
> --
> Mateusz Guzik <mjguzik gmail.com>
>
--
Mateusz Guzik <mjguzik gmail.com>
More information about the svn-src-all
mailing list