Date: Fri, 13 Feb 2009 13:21:55 -0500 From: Andrew Gallatin <gallatin@cs.duke.edu> To: Artem Belevich <fbsdlist@src.cx> Cc: current@freebsd.org Subject: Re: Dtrace panic'ed Message-ID: <4995BA43.5020108@cs.duke.edu> In-Reply-To: <ed91d4a80902130917p31dc34e2k7c828f3851afdedd@mail.gmail.com> References: <4995A792.5050003@cs.duke.edu> <ed91d4a80902130917p31dc34e2k7c828f3851afdedd@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Artem Belevich wrote: >> --- trap 0xc, rip = 0xffffffff80e33187, rsp = 0xfffffffe4004aa70, rbp = >> 0xfffffffe4004aa80 --- >> cyclic_disable_xcall() at cyclic_disable_xcall+0x7 >> smp_rendezvous_action() at smp_rendezvous_action+0xb3 >> Xrendezvous() at Xrendezvous+0x64 > > It seems to be the same issue that few other folks including myself > have seen. Search -current archives around October for 'hotkernel in > the subject. Ah, I see. > By the way, if you dump stack tracess for all processes, do you see > any of them in smp_tlb_shootdown ? No idea. I've rebooted, and am poking around in gdb. I thought that getting backtraces for everything from gdb was i386 specific, and I'm on amd64. I'm pretty weak on amd64 assembly language, but I think I know enough to think that this very weird. In my case, I'm also seeing a 0x20 faulting address, and the instruction pointer is here: push %rbp mov (%rdi),%rax mov %rsp,%rbp --> mov 0x20(%rax),%rax mov 0x30(%rax),%rdi mov 0x18(%rax),%r11 If I look at the caller: (kgdb) p/x local_func_arg $2 = 0xffffffff226567c0 That matches %rdi. in the cyclic_disable_xcall() function. Then if I then dereference this, I get something which is non-null. (kgdb) p/x *(long *)0xffffffff226567c0 $3 = 0xffffffff22656820 I was expecting it to be 0, given the faulting address of 0x20. But it wasn't. Drew
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4995BA43.5020108>