Date: Wed, 06 Aug 2014 10:12:06 -0400 From: Eric van Gyzen <eric@vangyzen.net> To: freebsd-hackers@freebsd.org Subject: Sanity Check: Bogus(?) General Protection Fault Message-ID: <53E237B6.4040703@vangyzen.net>
next in thread | raw e-mail | index | archive | help
Can someone give me a quick sanity check? I'm debugging a General Protection Fault on an amd64 system. The faulting instruction appears to be an immediate mov into %r11...right? I ask because I can't imagine how that instruction could cause a GPF. Any ideas? Thanks, Eric ==== Fatal trap 9: general protection fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff805d6e23 stack pointer = 0x28:0xfffffe0463d45660 frame pointer = 0x28:0xfffffe0463d456d0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 db> bt Tracing pid 1017 tid 100169 td 0xfffff801d4500000 vm_reserv_alloc_contig() at vm_reserv_alloc_contig+0x3b3/frame 0xfffffe0463d456d0 vm_page_alloc_contig() at vm_page_alloc_contig+0x13b/frame 0xfffffe0463d45760 kmem_alloc_contig() at kmem_alloc_contig+0x12f/frame 0xfffffe0463d45810 contigmalloc() at contigmalloc+0x33/frame 0xfffffe0463d45850 [snip] 0xffffffff805d6e0f <vm_reserv_alloc_contig+927>: mov 0x30(%rax),%r9 0xffffffff805d6e13 <vm_reserv_alloc_contig+931>: shr $0x15,%r9 0xffffffff805d6e17 <vm_reserv_alloc_contig+935>: shl $0x6,%r9 0xffffffff805d6e1b <vm_reserv_alloc_contig+939>: mov 0xffffffff809bf7a8,%r11 0xffffffff805d6e23 <vm_reserv_alloc_contig+947>: mov %rcx,0x10(%r11,%r9,1)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53E237B6.4040703>