[Bug 197503] Kernel panic during wake up from suspend to ram (pmap_copy)

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Feb 10 01:36:09 UTC 2015


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=197503

            Bug ID: 197503
           Summary: Kernel panic during wake up from suspend to ram
                    (pmap_copy)
           Product: Base System
           Version: 11.0-CURRENT
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: freebsd-bugs at FreeBSD.org
          Reporter: danilo at FreeBSD.org

Created attachment 152827
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=152827&action=edit
core.txt

After dozen times using suspend to RAM... :(


Unread portion of the kernel message buffer:


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address    = 0xfffffe758ffff000
fault code        = supervisor read data, page not present
instruction pointer    = 0x20:0xffffffff80961158
stack pointer            = 0x28:0xfffffe0120a1d780
frame pointer            = 0x28:0xfffffe0120a1d820
code segment        = base 0x0, limit 0xfffff, type 0x1b
            = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags    = interrupt enabled, resume, IOPL = 0
current process        = 1581 (sh)


(kgdb) bt
#0  doadump (textdump=Unhandled dwarf expression opcode 0x93
) at pcpu.h:219
#1  0xffffffff8031abae in db_dump (dummy=<value optimized out>,
dummy2=Unhandled dwarf expression opcode 0x93
) at /usr/src/sys/ddb/db_command.c:533
#2  0xffffffff8031a68c in db_command (cmd_table=0x0) at
/usr/src/sys/ddb/db_command.c:440
#3  0xffffffff8031a3f4 in db_command_loop () at
/usr/src/sys/ddb/db_command.c:493
#4  0xffffffff8031cfb0 in db_trap (type=<value optimized out>, code=Unhandled
dwarf expression opcode 0x93
) at /usr/src/sys/ddb/db_main.c:251
#5  0xffffffff8067074e in kdb_trap (type=Unhandled dwarf expression opcode 0x93
) at /usr/src/sys/kern/subr_kdb.c:654
#6  0xffffffff8096b739 in trap_fatal (frame=0xfffffe0120a1d6d0, eva=<value
optimized out>) at /usr/src/sys/amd64/amd64/trap.c:856
#7  0xffffffff8096bab1 in trap_pfault (frame=0xfffffe0120a1d6d0,
usermode=<value optimized out>)
    at /usr/src/sys/amd64/amd64/trap.c:678
#8  0xffffffff8096b0ee in trap (frame=0xfffffe0120a1d6d0) at
/usr/src/sys/amd64/amd64/trap.c:426
#9  0xffffffff8094e7d2 in calltrap () at
/usr/src/sys/amd64/amd64/exception.S:235
#10 0xffffffff80961158 in pmap_copy (dst_pmap=0xfffff800ad55b8f8,
src_pmap=0xfffff80002960ae8, dst_addr=<value optimized out>, 
    len=<value optimized out>, src_addr=<value optimized out>) at
/usr/src/sys/amd64/amd64/pmap.c:581
#11 0xffffffff8092b20d in vmspace_fork (vm1=0xfffff800029609b0,
fork_charge=0xfffffe0120a1d940) at /usr/src/sys/vm/vm_map.c:3192
#12 0xffffffff805f0e51 in fork1 (td=0xfffff80007d534a0, flags=20, pages=Cannot
access memory at address 0x4
) at /usr/src/sys/kern/kern_fork.c:849
#13 0xffffffff805f0bbf in sys_fork (td=0xfffff80007d534a0, uap=<value optimized
out>) at /usr/src/sys/kern/kern_fork.c:106
#14 0xffffffff8096c1a7 in amd64_syscall (td=0xfffff80007d534a0, traced=0) at
subr_syscall.c:133
#15 0xffffffff8094eabb in Xfast_syscall () at
/usr/src/sys/amd64/amd64/exception.S:395
#16 0x0000000800b4d56a in ?? ()
Previous frame inner to this frame (corrupt stack?)
Current language:  auto; currently minimal
(kgdb) frame 10
#10 0xffffffff80961158 in pmap_copy (dst_pmap=0xfffff800ad55b8f8,
src_pmap=0xfffff80002960ae8, dst_addr=<value optimized out>, 
    len=<value optimized out>, src_addr=<value optimized out>) at
/usr/src/sys/amd64/amd64/pmap.c:581
581        if (pdpe == NULL || (*pdpe & PG_V) == 0)
(kgdb) l
576        pdp_entry_t *pdpe;
577        pt_entry_t PG_V;
578    
579        PG_V = pmap_valid_bit(pmap);
580        pdpe = pmap_pdpe(pmap, va);
581        if (pdpe == NULL || (*pdpe & PG_V) == 0)
582            return (NULL);
583        return (pmap_pdpe_to_pde(pdpe, va));
584    }
585    
(kgdb) p pdpe
$1 = <value optimized out>
(kgdb) p *pdpe
Cannot access memory at address 0xa5a5a5a5a5a5a5a5

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-bugs mailing list