On Sat, Mar 08, 2003 at 11:46:34AM +0100, Poul-Henning Kamp wrote: > > Just got this crash on -current, and I belive I have seen similar > before. addr2line(1) reports the faulting address to be > ../../../kern/kern_fork.c:395 > which is in the inner loop of pid collision avoidance.
I've been running this patch from Alfred for the past month or so on bento, which has fixed a similar panic I was seeing regularly. Kris Index: kern/kern_fork.c =================================================================== RCS file: /home/ncvs/src/sys/kern/kern_fork.c,v retrieving revision 1.186 diff -u -r1.186 kern_fork.c --- kern/kern_fork.c 27 Feb 2003 02:05:17 -0000 1.186 +++ kern/kern_fork.c 4 Mar 2003 00:28:09 -0000 @@ -325,6 +325,7 @@ * exceed the limit. The variable nprocs is the current number of * processes, maxproc is the limit. */ + sx_xlock(&proctree_lock); sx_xlock(&allproc_lock); uid = td->td_ucred->cr_ruid; if ((nprocs >= maxproc - 10 && uid != 0) || nprocs >= maxproc) { @@ -432,6 +433,7 @@ LIST_INSERT_HEAD(&allproc, p2, p_list); LIST_INSERT_HEAD(PIDHASH(p2->p_pid), p2, p_hash); sx_xunlock(&allproc_lock); + sx_xunlock(&proctree_lock); /* * Malloc things while we don't hold any locks. @@ -757,6 +759,7 @@ return (0); fail: sx_xunlock(&allproc_lock); + sx_xunlock(&proctree_lock); uma_zfree(proc_zone, newproc); if (p1->p_flag & P_THREADED) { PROC_LOCK(p1); > > Poul-Henning > > Fatal trap 12: page fault while in kernel mode > cpuid = 0; lapic.id = 00000000 > fault virtual address = 0x14 > fault code = supervisor read, page not present > instruction pointer = 0x8:0xc01c3eec > stack pointer = 0x10:0xe74e3c74 > frame pointer = 0x10:0xe74e3cbc > code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, def32 1, gran 1 > processor eflags = interrupt enabled, resume, IOPL = 0 > current process = 99777 (sh) > trap number = 12 > panic: page fault > cpuid = 0; lapic.id = 00000000 > Stack backtrace: > backtrace(c032ff8e,0,c03394ce,e74e3b68,1) at 0xc01d86a7 = backtrace+0x17 > panic(c03394ce,c0342131,cfe5496c,1,1) at 0xc01d87ba = panic+0x10a > trap_fatal(e74e3c34,14,c03422ba,2e3,cfe4fa50) at 0xc02fa672 = trap_fatal+0x322 > trap_pfault(e74e3c34,0,14,c035a038,14) at 0xc02fa322 = trap_pfault+0x1c2 > trap(18,10,10,cf19c3f8,cf76b9ec) at 0xc02f9e9d = trap+0x3cd > calltrap() at 0xc02e2cd8 = calltrap+0x5 > --- trap 0xc, eip = 0xc01c3eec, esp = 0xe74e3c74, ebp = 0xe74e3cbc --- > fork1(cfe4fa50,14,0,e74e3cd4,cfe54858) at 0xc01c3eec = fork1+0x3fc > fork(cfe4fa50,e74e3d10,c03422ba,404,0) at 0xc01c3852 = fork+0x52 > syscall(2f,2f,2f,0,80ff000) at 0xc02fa98e = syscall+0x26e > Xint0x80_syscall() at 0xc02e2d2d = Xint0x80_syscall+0x1d > --- syscall (2), eip = 0x807ba9f, esp = 0xbfbff6bc, ebp = 0xbfbff6e8 --- > boot() called on cpu#0 > > -- > Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 > [EMAIL PROTECTED] | TCP/IP since RFC 956 > FreeBSD committer | BSD since 4.3-tahoe > Never attribute to malice what can adequately be explained by incompetence. > > To Unsubscribe: send mail to [EMAIL PROTECTED] > with "unsubscribe freebsd-current" in the body of the message
pgp00000.pgp
Description: PGP signature