https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=258932

--- Comment #11 from Bryan Drewery <bdrew...@freebsd.org> ---
Just hit it again on a recent kernel from main April 22nd.

panic: vm_page_free_prep: freeing mapped page 0xfffffe0020bccfe8
cpuid = 4
time = 1651629479
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01d929c660
vpanic() at vpanic+0x17f/frame 0xfffffe01d929c6b0
panic() at panic+0x43/frame 0xfffffe01d929c710
vm_page_free_prep() at vm_page_free_prep+0x20c/frame 0xfffffe01d929c730
vm_page_free_toq() at vm_page_free_toq+0x12/frame 0xfffffe01d929c760
vm_object_page_remove() at vm_object_page_remove+0xb1/frame 0xfffffe01d929c7c0
vm_map_entry_delete() at vm_map_entry_delete+0x110/frame 0xfffffe01d929c810
vm_map_delete() at vm_map_delete+0xc8/frame 0xfffffe01d929c880
vm_map_remove() at vm_map_remove+0x81/frame 0xfffffe01d929c8b0
exec_new_vmspace() at exec_new_vmspace+0x211/frame 0xfffffe01d929c900
exec_elf64_imgact() at exec_elf64_imgact+0xb59/frame 0xfffffe01d929ca00
kern_execve() at kern_execve+0x76d/frame 0xfffffe01d929cd80
sys_execve() at sys_execve+0x5a/frame 0xfffffe01d929ce00
amd64_syscall() at amd64_syscall+0x6a6/frame 0xfffffe01d929cf30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01d929cf30
--- syscall (59, FreeBSD ELF64, sys_execve), rip = 0x821e0d36a, rsp =
0x82072dd08, rbp = 0x82072de10 ---
KDB: enter: panic
[ thread pid 24172 tid 101498 ]
Stopped at      kdb_enter+0x32: movq    $0,0x127ce23(%rip)

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to