[haiku-bugs] Re: [Haiku] #5138: PANIC: remove page 0x82868278 from cache 0xd19e7680: page still has mappings!

  • From: "mmadia" <trac@xxxxxxxxxxxx>
  • Date: Mon, 21 Dec 2009 19:00:13 -0000

#5138: PANIC: remove page 0x82868278 from cache 0xd19e7680: page still has
mappings!
---------------------------+------------------------------------------------
 Reporter:  mmadia         |       Owner:  bonefish      
     Type:  bug            |      Status:  new           
 Priority:  normal         |   Milestone:  R1            
Component:  System/Kernel  |     Version:  R1/Development
 Keywords:                 |   Blockedby:                
 Platform:  All            |    Blocking:                
---------------------------+------------------------------------------------
Description changed by mmadia:

Old description:

> r34679 x86gcc2hybrid. My previous installation was r34464. This KDL has
> cropped several times since installing this revision. I don't know an
> exact step to reproduce it at will.  Normally it occurs while using
> bezilla.
>
> {{{
> PANIC: remove page 0x82868278 from cache 0xd19e7680: page still has
> mappings!
>
> Welcome to Kernel Debugging Land...
> Thread 3129 "ShowImage" running on CPU 1
> kdebug> dmbf    bf  bt
> stack trace for thread 3129 "ShowImage"
>     kernel stack: 0xd2d08000 to 0xd2d0c000
>       user stack: 0x7efef000 to 0x7ffef000
> frame               caller     <image>:function + offset
>  0 d2d0b7a8 (+  48) 8006bd84   <kernel_x86>:debug_builtin_commands_init
> (nearest) + 0x01e0
>  1 d2d0b7d8 (+  12) 800e7d13
> <kernel_x86>:arch_debug_call_with_fault_handler + 0x001b
>  2 d2d0b7e4 (+  48) 8006af50   <kernel_x86>:debug_call_with_fault_handler
> + 0x0060
>  3 d2d0b814 (+  64) 8006bfdd   <kernel_x86>:invoke_debugger_command +
> 0x00b9
>  4 d2d0b854 (+  64) 8006be09   <kernel_x86>:debug_builtin_commands_init
> (nearest) + 0x0265
>  5 d2d0b894 (+  64) 8006c148   <kernel_x86>:invoke_debugger_command_pipe
> + 0x009c
>  6 d2d0b8d4 (+  48) 8006db44   <kernel_x86>
> ExpressionParser<0xd2d0b984>::_ParseCommandPipe(0xd2d0b980) + 0x0234
>  7 d2d0b904 (+  64) 8006cf7e   <kernel_x86>
> ExpressionParser<0xd2d0b984>::EvaluateCommand(0x80133ce0 "bt",
> 0xd2d0b980) + 0x02ba
>  8 d2d0b944 (+ 224) 8006ef58   <kernel_x86>:evaluate_debug_command +
> 0x0080
>  9 d2d0ba24 (+  64) 80069ad6   <kernel_x86>:kgets (nearest) + 0x02b2
> 10 d2d0ba64 (+  48) 80069d2a   <kernel_x86>:kgets (nearest) + 0x0506
> 11 d2d0ba94 (+  48) 8006b11b   <kernel_x86>:kernel_debugger + 0x0023
> 12 d2d0bac4 (+ 192) 8006b0ed   <kernel_x86>:panic + 0x0029
> 13 d2d0bb84 (+  96) 800da88b   <kernel_x86>
> VMCache<0xd19e7680>::Delete(0xd19e7680) + 0x0077
> 14 d2d0bbe4 (+  64) 800dad4c   <kernel_x86>
> VMCache<0xd19e7680>::Unlock(0xd1a20000) + 0x0124
> 15 d2d0bc24 (+  48) 800dae53   <kernel_x86>
> VMCache<0xd19e7680>::ReleaseRef(0xd1a22f88) + 0x002b
> 16 d2d0bc54 (+  48) 800cc2bc   <kernel_x86>:vm_clone_area (nearest) +
> 0x048c
> 17 d2d0bc84 (+  48) 800ce9db   <kernel_x86>:vm_delete_areas + 0x0057
> 18 d2d0bcb4 (+  48) 800d64db   <kernel_x86>
> VMAddressSpace<0xd1a22f78>::RemoveAndPut(0x0) + 0x0033
> 19 d2d0bce4 (+ 112) 8005b2ee   <kernel_x86>:team_delete_team + 0x0272
> 20 d2d0bd54 (+ 368) 8005ef57   <kernel_x86>:thread_exit + 0x0473
> 21 d2d0bec4 (+  64) 80053149   <kernel_x86>:handle_signals + 0x03d1
> 22 d2d0bf04 (+  64) 8005f52e   <kernel_x86>:thread_at_kernel_exit +
> 0x008e
> 23 d2d0bf44 (+ 100) 800e83cb   <kernel_x86>:trap99 (nearest) + 0x01ab
> user iframe at 0xd2d0bfa8 (end = 0xd2d0c000)
>  eax 0x0            ebx 0x775a20        ecx 0x7ffeef40   edx 0x216
>  esi 0x77a460       edi 0x7ffef540      ebp 0x7ffeef6c   esp 0xd2d0bfdc
>  eip 0xffff0114  eflags 0x207      user esp 0x7ffeef40
>  vector: 0x63, error code: 0x0
> 24 d2d0bfa8 (+   0) ffff0114   <commpage>:commpage_syscall + 0x0004
> 25 7ffeef6c (+   0) 1806f8f0
> 26 180cc978 (+   0) 180cab20
> 27 180cac90 (+ 296) 180cab20
> 28 180cadb8 (+   0) 180cab20
> 29 180cab68 (+   0) 180cab20
> kdebug>
> }}}
>
> Are there any other KDL commands that can be used? I'm willing to run a
> build with tracing or other debugging as well.

New description:

 r34679 x86gcc2hybrid. My previous installation was r34464. This KDL has
 cropped several times since installing this revision. I don't know an
 exact step to reproduce it at will. It is not limited to a particular
 application.

 {{{
 PANIC: remove page 0x82868278 from cache 0xd19e7680: page still has
 mappings!

 Welcome to Kernel Debugging Land...
 Thread 3129 "ShowImage" running on CPU 1
 kdebug> dmbf    bf  bt
 stack trace for thread 3129 "ShowImage"
     kernel stack: 0xd2d08000 to 0xd2d0c000
       user stack: 0x7efef000 to 0x7ffef000
 frame               caller     <image>:function + offset
  0 d2d0b7a8 (+  48) 8006bd84   <kernel_x86>:debug_builtin_commands_init
 (nearest) + 0x01e0
  1 d2d0b7d8 (+  12) 800e7d13
 <kernel_x86>:arch_debug_call_with_fault_handler + 0x001b
  2 d2d0b7e4 (+  48) 8006af50   <kernel_x86>:debug_call_with_fault_handler
 + 0x0060
  3 d2d0b814 (+  64) 8006bfdd   <kernel_x86>:invoke_debugger_command +
 0x00b9
  4 d2d0b854 (+  64) 8006be09   <kernel_x86>:debug_builtin_commands_init
 (nearest) + 0x0265
  5 d2d0b894 (+  64) 8006c148   <kernel_x86>:invoke_debugger_command_pipe +
 0x009c
  6 d2d0b8d4 (+  48) 8006db44   <kernel_x86>
 ExpressionParser<0xd2d0b984>::_ParseCommandPipe(0xd2d0b980) + 0x0234
  7 d2d0b904 (+  64) 8006cf7e   <kernel_x86>
 ExpressionParser<0xd2d0b984>::EvaluateCommand(0x80133ce0 "bt", 0xd2d0b980)
 + 0x02ba
  8 d2d0b944 (+ 224) 8006ef58   <kernel_x86>:evaluate_debug_command +
 0x0080
  9 d2d0ba24 (+  64) 80069ad6   <kernel_x86>:kgets (nearest) + 0x02b2
 10 d2d0ba64 (+  48) 80069d2a   <kernel_x86>:kgets (nearest) + 0x0506
 11 d2d0ba94 (+  48) 8006b11b   <kernel_x86>:kernel_debugger + 0x0023
 12 d2d0bac4 (+ 192) 8006b0ed   <kernel_x86>:panic + 0x0029
 13 d2d0bb84 (+  96) 800da88b   <kernel_x86>
 VMCache<0xd19e7680>::Delete(0xd19e7680) + 0x0077
 14 d2d0bbe4 (+  64) 800dad4c   <kernel_x86>
 VMCache<0xd19e7680>::Unlock(0xd1a20000) + 0x0124
 15 d2d0bc24 (+  48) 800dae53   <kernel_x86>
 VMCache<0xd19e7680>::ReleaseRef(0xd1a22f88) + 0x002b
 16 d2d0bc54 (+  48) 800cc2bc   <kernel_x86>:vm_clone_area (nearest) +
 0x048c
 17 d2d0bc84 (+  48) 800ce9db   <kernel_x86>:vm_delete_areas + 0x0057
 18 d2d0bcb4 (+  48) 800d64db   <kernel_x86>
 VMAddressSpace<0xd1a22f78>::RemoveAndPut(0x0) + 0x0033
 19 d2d0bce4 (+ 112) 8005b2ee   <kernel_x86>:team_delete_team + 0x0272
 20 d2d0bd54 (+ 368) 8005ef57   <kernel_x86>:thread_exit + 0x0473
 21 d2d0bec4 (+  64) 80053149   <kernel_x86>:handle_signals + 0x03d1
 22 d2d0bf04 (+  64) 8005f52e   <kernel_x86>:thread_at_kernel_exit + 0x008e
 23 d2d0bf44 (+ 100) 800e83cb   <kernel_x86>:trap99 (nearest) + 0x01ab
 user iframe at 0xd2d0bfa8 (end = 0xd2d0c000)
  eax 0x0            ebx 0x775a20        ecx 0x7ffeef40   edx 0x216
  esi 0x77a460       edi 0x7ffef540      ebp 0x7ffeef6c   esp 0xd2d0bfdc
  eip 0xffff0114  eflags 0x207      user esp 0x7ffeef40
  vector: 0x63, error code: 0x0
 24 d2d0bfa8 (+   0) ffff0114   <commpage>:commpage_syscall + 0x0004
 25 7ffeef6c (+   0) 1806f8f0
 26 180cc978 (+   0) 180cab20
 27 180cac90 (+ 296) 180cab20
 28 180cadb8 (+   0) 180cab20
 29 180cab68 (+   0) 180cab20
 kdebug>
 }}}

 Are there any other KDL commands that can be used? I'm willing to run a
 build with tracing or other debugging as well.

--

-- 
Ticket URL: <http://dev.haiku-os.org/ticket/5138#comment:4>
Haiku <http://dev.haiku-os.org>
Haiku - the operating system.

Other related posts: