From owner-svn-src-head@freebsd.org Mon Oct 7 14:25:00 2019 Return-Path: Delivered-To: svn-src-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C7EBD130A2A; Mon, 7 Oct 2019 14:25:00 +0000 (UTC) (envelope-from mjguzik@gmail.com) Received: from mail-oi1-x244.google.com (mail-oi1-x244.google.com [IPv6:2607:f8b0:4864:20::244]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46n2n82D6Cz44qX; Mon, 7 Oct 2019 14:25:00 +0000 (UTC) (envelope-from mjguzik@gmail.com) Received: by mail-oi1-x244.google.com with SMTP id w6so11770312oie.11; Mon, 07 Oct 2019 07:25:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=z2Ye/OD9y8IiGVQg1q8nyxdu6P+sFfyVBz31eDixN+o=; b=WLR1QjG94lt3EVmE5d3f4lKYPv7N6boad/bGrrOmugv5T1u/wgVZnhiKsRaIf5y6fm fLLDMs48dY3TaLnS04ZG5JEuIcTgWfjFFZw9vTxuzqoChDFEDar492bpL7uDv+acriKG 6AHGFgrEz9ekpHhYigpXzkyQ1lfgRWxDM2bkmK25SCVno7sfpySaUYBe91P88Ans4Yxc Lc481SsD9ndSKk1aJdEXWT8/wRUOFmAIPLMCjRaNPV4fOskdw2CUCDfz7xy7USAycdvg rvzNRDgBw3ZY3ppXhFdkCRRVhPVqAW4ZI7w6oezqW9YEzhj5MVZTt+injQjRDHhre2EG lctg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=z2Ye/OD9y8IiGVQg1q8nyxdu6P+sFfyVBz31eDixN+o=; b=ki+mO2rhq8uhTsb7CYp+TjmhkzDmcFf2N3b+QWZzdreU73M3eYYC+DemBPCnop4Elz p1w4pNqSuxdZazx4NoRM84jX71GrZzSexs0urco8brftwGNP9LnF/rHVIB7PQaQZMtmo 6mgWNJEH4T0/RNDSXASwp3pR6gKOjAVuO49wUevocI49nBTyuWjQtsGjktZIgIb0OIkc DquC6mjG5ATl3FQlN6KZlYvHg37g7umhB7XI2M7FaVyu+8HBxLbSmkPl+z1wOGRQeMM5 wDVbgsc+MvQXQXET/RofBjRIpPOIktjJeZgBCzIqkZV0G8DsQFTPRi6B41Y7vZe2so6H qPVA== X-Gm-Message-State: APjAAAV//38GB0bS1jA0h2xONCBtgzZbw8T066p2o3ufLAadJFy/Txks Qv6zQxa8YZjdxjX5LcS4A9Em9Trx7QMPuRtZZRoXDQ== X-Google-Smtp-Source: APXvYqyWxOaYjCviKcjIBqCG83D9ilACytfY45wGbOwicuC5vap3h1A+2R1iOKo1d9axNkjml8GrcLcHOlbBPJygsNc= X-Received: by 2002:a54:4e1d:: with SMTP id a29mr18541696oiy.5.1570458299167; Mon, 07 Oct 2019 07:24:59 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a4a:458d:0:0:0:0:0 with HTTP; Mon, 7 Oct 2019 07:24:58 -0700 (PDT) In-Reply-To: <201910070419.x974JOkQ020574@slippy.cwsent.com> References: <201910062213.x96MDZv3085523@repo.freebsd.org> <201910070406.x9746N0U009068@slippy.cwsent.com> <201910070419.x974JOkQ020574@slippy.cwsent.com> From: Mateusz Guzik Date: Mon, 7 Oct 2019 16:24:58 +0200 Message-ID: Subject: Re: svn commit: r353149 - head/sys/amd64/amd64 To: Cy Schubert Cc: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 46n2n82D6Cz44qX X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=WLR1QjG9; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of mjguzik@gmail.com designates 2607:f8b0:4864:20::244 as permitted sender) smtp.mailfrom=mjguzik@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(0.00)[ip: (2.14), ipnet: 2607:f8b0::/32(-2.54), asn: 15169(-2.14), country: US(-0.05)]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[4.4.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Oct 2019 14:25:00 -0000 Can you show: sysctl vm.phys_segs and from the crashdump: p pv_table On 10/7/19, Cy Schubert wrote: > In message <201910070406.x9746N0U009068@slippy.cwsent.com>, Cy Schubert > writes: >> In message <201910062213.x96MDZv3085523@repo.freebsd.org>, Mateusz Guzik >> writes >> : >> > Author: mjg >> > Date: Sun Oct 6 22:13:35 2019 >> > New Revision: 353149 >> > URL: https://svnweb.freebsd.org/changeset/base/353149 >> > >> > Log: >> > amd64 pmap: implement per-superpage locks >> > >> > The current 256-lock sized array is a problem in the following ways: >> > - it's way too small >> > - there are 2 locks per cacheline >> > - it is not NUMA-aware >> > >> > Solve these issues by introducing per-superpage locks backed by pages >> > allocated from respective domains. >> > >> > This significantly reduces contention e.g. during poudriere -j 104. >> > See the review for results. >> > >> > Reviewed by: kib >> > Discussed with: jeff >> > Sponsored by: The FreeBSD Foundation >> > Differential Revision: https://reviews.freebsd.org/D21833 >> > >> > Modified: >> > head/sys/amd64/amd64/pmap.c >> > >> > Modified: head/sys/amd64/amd64/pmap.c >> > =========================================================================== >> == >> > = >> > --- head/sys/amd64/amd64/pmap.c Sun Oct 6 20:36:25 2019 (r35314 >> > 8) >> > +++ head/sys/amd64/amd64/pmap.c Sun Oct 6 22:13:35 2019 (r35314 >> > 9) >> > @@ -316,13 +316,25 @@ pmap_pku_mask_bit(pmap_t pmap) >> > #define PV_STAT(x) do { } while (0) >> > #endif >> > >> > -#define pa_index(pa) ((pa) >> PDRSHIFT) >> > +#undef pa_index >> > +#define pa_index(pa) ({ \ >> > + KASSERT((pa) <= vm_phys_segs[vm_phys_nsegs - 1].end, \ >> > + ("address %lx beyond the last segment", (pa))); \ >> > + (pa) >> PDRSHIFT; \ >> > +}) >> > +#if VM_NRESERVLEVEL > 0 >> > +#define pa_to_pmdp(pa) (&pv_table[pa_index(pa)]) >> > +#define pa_to_pvh(pa) (&(pa_to_pmdp(pa)->pv_page)) >> > +#define PHYS_TO_PV_LIST_LOCK(pa) \ >> > + (&(pa_to_pmdp(pa)->pv_lock)) >> > +#else >> > #define pa_to_pvh(pa) (&pv_table[pa_index(pa)]) >> > >> > #define NPV_LIST_LOCKS MAXCPU >> > >> > #define PHYS_TO_PV_LIST_LOCK(pa) \ >> > (&pv_list_locks[pa_index(pa) % NPV_LIST_LOCKS]) >> > +#endif >> > >> > #define CHANGE_PV_LIST_LOCK_TO_PHYS(lockp, pa) do { \ >> > struct rwlock **_lockp = (lockp); \ >> > @@ -400,14 +412,22 @@ static int pmap_initialized; >> > >> > /* >> > * Data for the pv entry allocation mechanism. >> > - * Updates to pv_invl_gen are protected by the pv_list_locks[] >> > - * elements, but reads are not. >> > + * Updates to pv_invl_gen are protected by the pv list lock but reads >> > are >> no >> > t. >> > */ >> > static TAILQ_HEAD(pch, pv_chunk) pv_chunks = >> > TAILQ_HEAD_INITIALIZER(pv_chu >> nk >> > s); >> > static struct mtx __exclusive_cache_line pv_chunks_mutex; >> > +#if VM_NRESERVLEVEL > 0 >> > +struct pmap_large_md_page { >> > + struct rwlock pv_lock; >> > + struct md_page pv_page; >> > + u_long pv_invl_gen; >> > +}; >> > +static struct pmap_large_md_page *pv_table; >> > +#else >> > static struct rwlock __exclusive_cache_line >> > pv_list_locks[NPV_LIST_LOCKS]; >> > static u_long pv_invl_gen[NPV_LIST_LOCKS]; >> > static struct md_page *pv_table; >> > +#endif >> > static struct md_page pv_dummy; >> > >> > /* >> > @@ -918,12 +938,21 @@ SYSCTL_LONG(_vm_pmap, OID_AUTO, invl_wait_slow, >> > CTLFL >> A >> > "Number of slow invalidation waits for lockless DI"); >> > #endif >> > >> > +#if VM_NRESERVLEVEL > 0 >> > static u_long * >> > pmap_delayed_invl_genp(vm_page_t m) >> > { >> > >> > + return (&pa_to_pmdp(VM_PAGE_TO_PHYS(m))->pv_invl_gen); >> > +} >> > +#else >> > +static u_long * >> > +pmap_delayed_invl_genp(vm_page_t m) >> > +{ >> > + >> > return (&pv_invl_gen[pa_index(VM_PAGE_TO_PHYS(m)) % NPV_LIST_LOCKS]); >> > } >> > +#endif >> > >> > static void >> > pmap_delayed_invl_callout_func(void *arg __unused) >> > @@ -1803,6 +1832,112 @@ pmap_page_init(vm_page_t m) >> > m->md.pat_mode = PAT_WRITE_BACK; >> > } >> > >> > +#if VM_NRESERVLEVEL > 0 >> > +static void >> > +pmap_init_pv_table(void) >> > +{ >> > + struct pmap_large_md_page *pvd; >> > + vm_size_t s; >> > + long start, end, highest, pv_npg; >> > + int domain, i, j, pages; >> > + >> > + /* >> > + * We strongly depend on the size being a power of two, so the assert >> > + * is overzealous. However, should the struct be resized to a >> > + * different power of two, the code below needs to be revisited. >> > + */ >> > + CTASSERT((sizeof(*pvd) == 64)); >> > + >> > + /* >> > + * Calculate the size of the array. >> > + */ >> > + pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR); >> > + s = (vm_size_t)pv_npg * sizeof(struct pmap_large_md_page); >> > + s = round_page(s); >> > + pv_table = (struct pmap_large_md_page *)kva_alloc(s); >> > + if (pv_table == NULL) >> > + panic("%s: kva_alloc failed\n", __func__); >> > + >> > + /* >> > + * Iterate physical segments to allocate space for respective pages. >> > + */ >> > + highest = -1; >> > + s = 0; >> > + for (i = 0; i < vm_phys_nsegs; i++) { >> > + start = vm_phys_segs[i].start / NBPDR; >> > + end = vm_phys_segs[i].end / NBPDR; >> > + domain = vm_phys_segs[i].domain; >> > + >> > + if (highest >= end) >> > + continue; >> > + >> > + if (start < highest) { >> > + start = highest + 1; >> > + pvd = &pv_table[start]; >> > + } else { >> > + /* >> > + * The lowest address may land somewhere in the middle >> > + * of our page. Simplify the code by pretending it is >> > + * at the beginning. >> > + */ >> > + pvd = pa_to_pmdp(vm_phys_segs[i].start); >> > + pvd = (struct pmap_large_md_page *)trunc_page(pvd); >> > + start = pvd - pv_table; >> > + } >> > + >> > + pages = end - start + 1; >> > + s = round_page(pages * sizeof(*pvd)); >> > + highest = start + (s / sizeof(*pvd)) - 1; >> > + >> > + for (j = 0; j < s; j += PAGE_SIZE) { >> > + vm_page_t m = vm_page_alloc_domain(NULL, 0, >> > + domain, VM_ALLOC_NORMAL | VM_ALLOC_NOOBJ); >> > + if (m == NULL) >> > + panic("vm_page_alloc_domain failed for %lx\n", >> > (vm_offset_t)pvd + j); >> > + pmap_qenter((vm_offset_t)pvd + j, &m, 1); >> > + } >> > + >> > + for (j = 0; j < s / sizeof(*pvd); j++) { >> > + rw_init_flags(&pvd->pv_lock, "pmap pv list", RW_NEW); >> > + TAILQ_INIT(&pvd->pv_page.pv_list); >> > + pvd->pv_page.pv_gen = 0; >> > + pvd->pv_page.pat_mode = 0; >> > + pvd->pv_invl_gen = 0; >> > + pvd++; >> > + } >> > + } >> > + TAILQ_INIT(&pv_dummy.pv_list); >> > +} >> > +#else >> > +static void >> > +pmap_init_pv_table(void) >> > +{ >> > + vm_size_t s; >> > + long i, pv_npg; >> > + >> > + /* >> > + * Initialize the pool of pv list locks. >> > + */ >> > + for (i = 0; i < NPV_LIST_LOCKS; i++) >> > + rw_init(&pv_list_locks[i], "pmap pv list"); >> > + >> > + /* >> > + * Calculate the size of the pv head table for superpages. >> > + */ >> > + pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR); >> > + >> > + /* >> > + * Allocate memory for the pv head table for superpages. >> > + */ >> > + s = (vm_size_t)pv_npg * sizeof(struct md_page); >> > + s = round_page(s); >> > + pv_table = (struct md_page *)kmem_malloc(s, M_WAITOK | M_ZERO); >> > + for (i = 0; i < pv_npg; i++) >> > + TAILQ_INIT(&pv_table[i].pv_list); >> > + TAILQ_INIT(&pv_dummy.pv_list); >> > +} >> > +#endif >> > + >> > /* >> > * Initialize the pmap module. >> > * Called by vm_init, to initialize any structures that the pmap >> > @@ -1813,8 +1948,7 @@ pmap_init(void) >> > { >> > struct pmap_preinit_mapping *ppim; >> > vm_page_t m, mpte; >> > - vm_size_t s; >> > - int error, i, pv_npg, ret, skz63; >> > + int error, i, ret, skz63; >> > >> > /* L1TF, reserve page @0 unconditionally */ >> > vm_page_blacklist_add(0, bootverbose); >> > @@ -1902,26 +2036,7 @@ pmap_init(void) >> > */ >> > mtx_init(&pv_chunks_mutex, "pmap pv chunk list", NULL, MTX_DEF); >> > >> > - /* >> > - * Initialize the pool of pv list locks. >> > - */ >> > - for (i = 0; i < NPV_LIST_LOCKS; i++) >> > - rw_init(&pv_list_locks[i], "pmap pv list"); >> > - >> > - /* >> > - * Calculate the size of the pv head table for superpages. >> > - */ >> > - pv_npg = howmany(vm_phys_segs[vm_phys_nsegs - 1].end, NBPDR); >> > - >> > - /* >> > - * Allocate memory for the pv head table for superpages. >> > - */ >> > - s = (vm_size_t)(pv_npg * sizeof(struct md_page)); >> > - s = round_page(s); >> > - pv_table = (struct md_page *)kmem_malloc(s, M_WAITOK | M_ZERO); >> > - for (i = 0; i < pv_npg; i++) >> > - TAILQ_INIT(&pv_table[i].pv_list); >> > - TAILQ_INIT(&pv_dummy.pv_list); >> > + pmap_init_pv_table(); >> > >> > pmap_initialized = 1; >> > for (i = 0; i < PMAP_PREINIT_MAPPING_COUNT; i++) { >> > >> >> This causes a page fault during X (xdm) startup, which loads >> drm-current-kmod. >> >> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame >> 0xfffffe0093e9c260 >> vpanic() at vpanic+0x19d/frame 0xfffffe0093e9c2b0 >> panic() at panic+0x43/frame 0xfffffe0093e9c310 >> vm_fault() at vm_fault+0x2126/frame 0xfffffe0093e9c460 >> vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c4b0 >> trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c510 >> trap() at trap+0x2a1/frame 0xfffffe0093e9c620 >> calltrap() at calltrap+0x8/frame 0xfffffe0093e9c620 >> --- trap 0xc, rip = 0xffffffff80a054b1, rsp = 0xfffffe0093e9c6f0, rbp = >> 0xfffffe0093e9c7a0 --- >> pmap_enter() at pmap_enter+0x861/frame 0xfffffe0093e9c7a0 >> vm_fault() at vm_fault+0x1c69/frame 0xfffffe0093e9c8f0 >> vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c940 >> trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c9a0 >> trap() at trap+0x438/frame 0xfffffe0093e9cab0 >> calltrap() at calltrap+0x8/frame 0xfffffe0093e9cab0 >> --- trap 0xc, rip = 0x30e2a9c3, rsp = 0x7fffffffea50, rbp = 0x7fffffffeaa0 >> >> --- >> Uptime: 3m33s >> Dumping 945 out of 7974 >> MB:..2%..11%..21%..31%..41%..51%..61%..72%..82%..92% >> >> (kgdb) bt >> #0 doadump (textdump=1) at pcpu_aux.h:55 >> #1 0xffffffff8068c5ed in kern_reboot (howto=260) >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:479 >> #2 0xffffffff8068caa9 in vpanic (fmt=, >> ap=) >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:908 >> #3 0xffffffff8068c8a3 in panic (fmt=) >> at /opt/src/svn-current/sys/kern/kern_shutdown.c:835 >> #4 0xffffffff8098c966 in vm_fault (map=, >> vaddr=, fault_type=, >> fault_flags=, m_hold=) >> at /opt/src/svn-current/sys/vm/vm_fault.c:672 >> #5 0xffffffff8098a723 in vm_fault_trap (map=0xfffff80002001000, >> vaddr=, fault_type=2 '\002', >> fault_flags=, signo=0x0, ucode=0x0) >> at /opt/src/svn-current/sys/vm/vm_fault.c:568 >> #6 0xffffffff80a18326 in trap_pfault (frame=0xfffffe0093e9c630, >> signo=, ucode=) >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:828 >> #7 0xffffffff80a177f1 in trap (frame=0xfffffe0093e9c630) >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:407 >> #8 0xffffffff809f1aac in calltrap () >> at /opt/src/svn-current/sys/amd64/amd64/exception.S:289 >> ---Type to continue, or q to quit--- >> #9 0xffffffff80a054b1 in pmap_enter (pmap=, >> va=851443712, m=0xfffffe0005b25ce8, prot=, >> flags=2677542912, psind=) at atomic.h:221 >> #10 0xffffffff8098c4a9 in vm_fault (map=, >> vaddr=, fault_type=232 '\ufffd', >> fault_flags=, m_hold=0x0) >> at /opt/src/svn-current/sys/vm/vm_fault.c:489 >> #11 0xffffffff8098a723 in vm_fault_trap (map=0xfffff80173eb5000, >> vaddr=, fault_type=2 '\002', >> fault_flags=, signo=0xfffffe0093e9ca84, >> ucode=0xfffffe0093e9ca80) at >> /opt/src/svn-current/sys/vm/vm_fault.c:568 >> #12 0xffffffff80a18326 in trap_pfault (frame=0xfffffe0093e9cac0, >> signo=, ucode=) >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:828 >> #13 0xffffffff80a17988 in trap (frame=0xfffffe0093e9cac0) >> at /opt/src/svn-current/sys/amd64/amd64/trap.c:347 >> #14 0xffffffff809f1aac in calltrap () >> at /opt/src/svn-current/sys/amd64/amd64/exception.S:289 >> #15 0x0000000030e2a9c3 in ?? () >> Previous frame inner to this frame (corrupt stack?) >> Current language: auto; currently minimal >> (kgdb) frame 9 >> #9 0xffffffff80a054b1 in pmap_enter (pmap=, >> va=851443712, m=0xfffffe0005b25ce8, prot=, >> flags=2677542912, psind=) at atomic.h:221 >> 221 ATOMIC_CMPSET(long); >> (kgdb) l >> 216 } >> 217 >> 218 ATOMIC_CMPSET(char); >> 219 ATOMIC_CMPSET(short); >> 220 ATOMIC_CMPSET(int); >> 221 ATOMIC_CMPSET(long); >> 222 >> 223 /* >> 224 * Atomically add the value of v to the integer pointed to by p and >> return >> 225 * the previous value of *p. >> (kgdb) > > I should use kgdb from ports instead of /usr/libexec version. Similar > result. > > <4>WARN_ON(!mutex_is_locked(&fbc->lock))WARN_ON(!mutex_is_locked(&fbc-> > lock)) > panic: vm_fault: fault on nofault entry, addr: 0xfffffe000e01c000 > cpuid = 1 > time = 1570417211 > KDB: stack backtrace: > db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame > 0xfffffe0093e9c260 > vpanic() at vpanic+0x19d/frame 0xfffffe0093e9c2b0 > panic() at panic+0x43/frame 0xfffffe0093e9c310 > vm_fault() at vm_fault+0x2126/frame 0xfffffe0093e9c460 > vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c4b0 > trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c510 > trap() at trap+0x2a1/frame 0xfffffe0093e9c620 > calltrap() at calltrap+0x8/frame 0xfffffe0093e9c620 > --- trap 0xc, rip = 0xffffffff80a054b1, rsp = 0xfffffe0093e9c6f0, rbp = > 0xfffffe0093e9c7a0 --- > pmap_enter() at pmap_enter+0x861/frame 0xfffffe0093e9c7a0 > vm_fault() at vm_fault+0x1c69/frame 0xfffffe0093e9c8f0 > vm_fault_trap() at vm_fault_trap+0x73/frame 0xfffffe0093e9c940 > trap_pfault() at trap_pfault+0x1b6/frame 0xfffffe0093e9c9a0 > trap() at trap+0x438/frame 0xfffffe0093e9cab0 > calltrap() at calltrap+0x8/frame 0xfffffe0093e9cab0 > --- trap 0xc, rip = 0x30e2a9c3, rsp = 0x7fffffffea50, rbp = 0x7fffffffeaa0 > --- > Uptime: 3m33s > Dumping 945 out of 7974 > MB:..2%..11%..21%..31%..41%..51%..61%..72%..82%..92% > > __curthread () at /opt/src/svn-current/sys/amd64/include/pcpu_aux.h:55 > 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, > (kgdb) > > Backtrace stopped: Cannot access memory at address 0x7fffffffea50 > (kgdb) frame 10 > #10 0xffffffff80a054b1 in atomic_fcmpset_long (dst=, > src=, expect=) > at /opt/src/svn-current/sys/amd64/include/atomic.h:221 > 221 ATOMIC_CMPSET(long); > (kgdb) l > 216 } > 217 > 218 ATOMIC_CMPSET(char); > 219 ATOMIC_CMPSET(short); > 220 ATOMIC_CMPSET(int); > 221 ATOMIC_CMPSET(long); > 222 > 223 /* > 224 * Atomically add the value of v to the integer pointed to by p and > return > 225 * the previous value of *p. > (kgdb) > > > > -- > Cheers, > Cy Schubert > FreeBSD UNIX: Web: http://www.FreeBSD.org > > The need of the many outweighs the greed of the few. > > > -- Mateusz Guzik