https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=258932
--- Comment #11 from Bryan Drewery <bdrew...@freebsd.org> --- Just hit it again on a recent kernel from main April 22nd. panic: vm_page_free_prep: freeing mapped page 0xfffffe0020bccfe8 cpuid = 4 time = 1651629479 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01d929c660 vpanic() at vpanic+0x17f/frame 0xfffffe01d929c6b0 panic() at panic+0x43/frame 0xfffffe01d929c710 vm_page_free_prep() at vm_page_free_prep+0x20c/frame 0xfffffe01d929c730 vm_page_free_toq() at vm_page_free_toq+0x12/frame 0xfffffe01d929c760 vm_object_page_remove() at vm_object_page_remove+0xb1/frame 0xfffffe01d929c7c0 vm_map_entry_delete() at vm_map_entry_delete+0x110/frame 0xfffffe01d929c810 vm_map_delete() at vm_map_delete+0xc8/frame 0xfffffe01d929c880 vm_map_remove() at vm_map_remove+0x81/frame 0xfffffe01d929c8b0 exec_new_vmspace() at exec_new_vmspace+0x211/frame 0xfffffe01d929c900 exec_elf64_imgact() at exec_elf64_imgact+0xb59/frame 0xfffffe01d929ca00 kern_execve() at kern_execve+0x76d/frame 0xfffffe01d929cd80 sys_execve() at sys_execve+0x5a/frame 0xfffffe01d929ce00 amd64_syscall() at amd64_syscall+0x6a6/frame 0xfffffe01d929cf30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01d929cf30 --- syscall (59, FreeBSD ELF64, sys_execve), rip = 0x821e0d36a, rsp = 0x82072dd08, rbp = 0x82072de10 --- KDB: enter: panic [ thread pid 24172 tid 101498 ] Stopped at kdb_enter+0x32: movq $0,0x127ce23(%rip) -- You are receiving this mail because: You are the assignee for the bug.