Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Feb 2008 15:24:55 +0200
From:      Kostik Belousov <kostikbel@gmail.com>
To:        Michiel Boland <michiel@boland.org>
Cc:        alc@freebsd.org, freebsd-current@freebsd.org
Subject:   Re: panic upon starting X in recent -CURRENTs (intel driver)
Message-ID:  <20080219132455.GD57756@deviant.kiev.zoral.com.ua>
In-Reply-To: <Pine.GSO.4.64.0802182330040.26002@neerbosch.nijmegen.internl.net>
References:  <Pine.GSO.4.64.0802011632120.15586@neerbosch.nijmegen.internl.net> <Pine.GSO.4.64.0802182330040.26002@neerbosch.nijmegen.internl.net>

next in thread | previous in thread | raw e-mail | index | archive | help

--p0yZhIIvPymhuc7/
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Feb 18, 2008 at 11:35:31PM +0100, Michiel Boland wrote:
> >Hi. After recent upgrade (from 21 dec to today's src) the kernel crashes=
=20
> >when starting X with
> >
> >panic: pmap_remove_all: page 0xc56e07f8 is fictitious
>=20
> FWIW below is a trivial program to re-create a similar crash. Needs root,=
=20
> obviously. But still shouldn't cause a panic though. Note that the trick=
=20
> in the program is that we mmap two pages, then munmap only half of them.
>=20
> #include <sys/types.h>
> #include <sys/mman.h>
> #include <fcntl.h>
> #include <stdio.h>
> #include <unistd.h>
>=20
> static const off_t map_address =3D 0xa0000;
> static const size_t map_size =3D 0x1000;
>=20
> static int testit(int fd)
> {
> 	void *p;
> 	int rv;
>=20
> 	p =3D mmap(NULL, 2 * map_size, PROT_READ | PROT_WRITE, MAP_SHARED, fd,
> 		  map_address);
> 	if (p =3D=3D MAP_FAILED) {
> 		perror("mmap");
> 		return -1;
> 	}
> 	rv =3D *(char *) p;
> 	if (munmap(p, map_size) =3D=3D -1) {
> 		perror("munmap");
> 		return -1;
> 	}
> 	return rv;
> }
>=20
> int main(void)
> {
> 	int fd, rv;
>=20
> 	fd =3D open("/dev/mem", O_RDWR);
> 	if (fd =3D=3D -1) {
> 		perror("open");
> 		return 1;
> 	}
> 	rv =3D testit(fd);
> 	close(fd);
> 	return rv;
> }

What happen there is that munmap() do the split for the /dev/mem mapping.
This caused the OBJT_DEVICE ref_count to be bumped, and vm_map_entry_delete=
()
called vm_object_page_remove(). The later called pmap_remove_all()
unconditionally.

pmap_remove_all has the KASSERT that fails exactly when supplied
fictitious page. It becomes KASSERT in the rev. 1.106 of i386/pmap.c,
committed 2008/01/08, it was under the PMAP_DIAGNOSTIC before.

Since such page has md.pv_list empty anyway, this KASSERT seems to be
only the statement of intent. The change below would prevent the panic
by not calling pmap_remove_all from vm_object_page_remove for such pages.

Alan, do you have objections ? [Alternative seems to be a removal of the
assertions from all pmap implementations, that also weaken the invariants
for other callers that do skip fictitious pages].

diff --git a/sys/vm/vm_object.c b/sys/vm/vm_object.c
index 21c0ac6..21ee10d 100644
--- a/sys/vm/vm_object.c
+++ b/sys/vm/vm_object.c
@@ -1884,7 +1884,8 @@ again:
 		 */
 		if ((wirings =3D p->wire_count) !=3D 0 &&
 		    (wirings =3D pmap_page_wired_mappings(p)) !=3D p->wire_count) {
-			pmap_remove_all(p);
+			if ((p->flags & PG_FICTITIOUS) =3D=3D 0)
+				pmap_remove_all(p);
 			/* Account for removal of managed, wired mappings. */
 			p->wire_count -=3D wirings;
 			if (!clean_only)
@@ -1898,7 +1899,8 @@ again:
 			if (p->valid & p->dirty)
 				continue;
 		}
-		pmap_remove_all(p);
+		if ((p->flags & PG_FICTITIOUS) =3D=3D 0)
+			pmap_remove_all(p);
 		/* Account for removal of managed, wired mappings. */
 		if (wirings !=3D 0)
 			p->wire_count -=3D wirings;

--p0yZhIIvPymhuc7/
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (FreeBSD)

iEYEARECAAYFAke62KYACgkQC3+MBN1Mb4jA6wCgx09AvshM2AbjR/FEKDFBCeAe
HssAn3801VxP8WIJjiNIuMRjaNcdY3uS
=FRNq
-----END PGP SIGNATURE-----

--p0yZhIIvPymhuc7/--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080219132455.GD57756>