FreeBSD Bugzilla – Attachment 203654 Details for
Bug 236917
emulators/virtualbox-ose: Sleeping thread owns a non-sleepable lock kernel panic
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
Three set of panic backtraces
vbox.txt (text/plain), 5.86 KB, created by
Derek Schrock
on 2019-04-13 23:35:20 UTC
(
hide
)
Description:
Three set of panic backtraces
Filename:
MIME Type:
Creator:
Derek Schrock
Created:
2019-04-13 23:35:20 UTC
Size:
5.86 KB
patch
obsolete
>kernel: Sleeping thread (tid 100922, pid 1172) owns a non-sleepable lock >kernel: KDB: stack backtrace of thread 100922: >kernel: #0 0xffffffff80ba6de1 at mi_switch+0xe1 >kernel: #1 0xffffffff80bf5c45 at sleepq_catch_signals+0x405 >kernel: #2 0xffffffff80bf578f at sleepq_wait_sig+0xf >kernel: #3 0xffffffff8266a54a at rtR0SemEventWait+0x2ba >kernel: #4 0xffffffff82649333 at SUPSemEventWaitNoResume+0x93 >kernel: #5 0xffffffff8263fc66 at supdrvIOCtlInnerUnrestricted+0x986 >kernel: #6 0xffffffff8264e3fd at VBoxDrvFreeBSDIOCtl+0xed >kernel: #7 0xffffffff80a51acd at devfs_ioctl+0xad >kernel: #8 0xffffffff811f945e at VOP_IOCTL_APV+0x7e >kernel: #9 0xffffffff80c7a144 at vn_ioctl+0x1a4 >kernel: #10 0xffffffff80a520af at devfs_ioctl_f+0x1f >kernel: #11 0xffffffff80c04f3d at kern_ioctl+0x26d >kernel: #12 0xffffffff80c04c5e at sys_ioctl+0x15e >kernel: #13 0xffffffff81075449 at amd64_syscall+0x369 >kernel: #14 0xffffffff8104fd1d at fast_syscall_common+0x101 >kernel: panic: sleeping thread >kernel: cpuid = 3 >kernel: time = 1555196191 >kernel: KDB: stack backtrace: >kernel: #0 0xffffffff80be7977 at kdb_backtrace+0x67 >kernel: #1 0xffffffff80b9b563 at vpanic+0x1a3 >kernel: #2 0xffffffff80b9b3b3 at panic+0x43 >kernel: #3 0xffffffff80bfd412 at propagate_priority+0x2b2 >kernel: #4 0xffffffff80bfe048 at turnstile_wait+0x338 >kernel: #5 0xffffffff80b7ade6 at __mtx_lock_sleep+0x196 >kernel: #6 0xffffffff80f013dc at vm_reserv_reclaim_inactive+0x9c >kernel: #7 0xffffffff80ef2db0 at vm_page_alloc_domain_after+0x210 >kernel: #8 0xffffffff80ef2aa4 at vm_page_alloc+0x74 >kernel: #9 0xffffffff8106449e at get_pv_entry+0x5e >kernel: #10 0xffffffff8106386c at pmap_enter+0x78c >kernel: #11 0xffffffff80edc78e at vm_fault_hold+0x1dfe >kernel: #12 0xffffffff80eda940 at vm_fault+0x60 >kernel: #13 0xffffffff81074ae3 at trap_pfault+0x163 >kernel: #14 0xffffffff81074175 at trap+0x425 >kernel: #15 0xffffffff8104f435 at calltrap+0x8 >kernel: Uptime: 28s > >kernel: Sleeping thread (tid 100920, pid 1245) owns a non-sleepable lock >kernel: KDB: stack backtrace of thread 100920: >kernel: #0 0xffffffff80ba6de1 at mi_switch+0xe1 >kernel: #1 0xffffffff80bf5c45 at sleepq_catch_signals+0x405 >kernel: #2 0xffffffff80bf578f at sleepq_wait_sig+0xf >kernel: #3 0xffffffff8267154a at rtR0SemEventWait+0x2ba >kernel: #4 0xffffffff82650333 at SUPSemEventWaitNoResume+0x93 >kernel: #5 0xffffffff82646c66 at supdrvIOCtlInnerUnrestricted+0x986 >kernel: #6 0xffffffff826553fd at VBoxDrvFreeBSDIOCtl+0xed >kernel: #7 0xffffffff80a51acd at devfs_ioctl+0xad >kernel: #8 0xffffffff811f945e at VOP_IOCTL_APV+0x7e >kernel: #9 0xffffffff80c7a144 at vn_ioctl+0x1a4 >kernel: #10 0xffffffff80a520af at devfs_ioctl_f+0x1f >kernel: #11 0xffffffff80c04f3d at kern_ioctl+0x26d >kernel: #12 0xffffffff80c04c5e at sys_ioctl+0x15e >kernel: #13 0xffffffff81075449 at amd64_syscall+0x369 >kernel: #14 0xffffffff8104fd1d at fast_syscall_common+0x101 >kernel: panic: sleeping thread >kernel: cpuid = 2 >kernel: time = 1555196533 >kernel: KDB: stack backtrace: >kernel: #0 0xffffffff80be7977 at kdb_backtrace+0x67 >kernel: #1 0xffffffff80b9b563 at vpanic+0x1a3 >kernel: #2 0xffffffff80b9b3b3 at panic+0x43 >kernel: #3 0xffffffff80bfd412 at propagate_priority+0x2b2 >kernel: #4 0xffffffff80bfe048 at turnstile_wait+0x338 >kernel: #5 0xffffffff80b7ade6 at __mtx_lock_sleep+0x196 >kernel: #6 0xffffffff80f013dc at vm_reserv_reclaim_inactive+0x9c >kernel: #7 0xffffffff80ef2db0 at vm_page_alloc_domain_after+0x210 >kernel: #8 0xffffffff81075fac at uma_small_alloc+0x5c >kernel: #9 0xffffffff80ed71bc at keg_alloc_slab+0xdc >kernel: #10 0xffffffff80ed9e3c at keg_fetch_slab+0x19c >kernel: #11 0xffffffff80ed95b9 at zone_fetch_slab+0x69 >kernel: #12 0xffffffff80ed96a1 at zone_import+0x51 >kernel: #13 0xffffffff80ed5867 at uma_zalloc_arg+0x3e7 >kernel: #14 0xffffffff82911a22 at abd_alloc+0x102 >kernel: #15 0xffffffff829178ae at arc_hdr_alloc_pabd+0x8e >kernel: #16 0xffffffff829145df at arc_hdr_alloc+0x11f >kernel: #17 0xffffffff82916763 at arc_read+0x233 >kernel: Uptime: 2m54s > > >kernel: Sleeping thread (tid 100916, pid 1205) owns a non-sleepable lock >kernel: KDB: stack backtrace of thread 100916: >kernel: #0 0xffffffff80ba6de1 at mi_switch+0xe1 >kernel: #1 0xffffffff80bf5c45 at sleepq_catch_signals+0x405 >kernel: #2 0xffffffff80bf578f at sleepq_wait_sig+0xf >kernel: #3 0xffffffff8267154a at rtR0SemEventWait+0x2ba >kernel: #4 0xffffffff82650333 at SUPSemEventWaitNoResume+0x93 >kernel: #5 0xffffffff82646c66 at supdrvIOCtlInnerUnrestricted+0x986 >kernel: #6 0xffffffff826553fd at VBoxDrvFreeBSDIOCtl+0xed >kernel: #7 0xffffffff80a51acd at devfs_ioctl+0xad >kernel: #8 0xffffffff811f945e at VOP_IOCTL_APV+0x7e >kernel: #9 0xffffffff80c7a144 at vn_ioctl+0x1a4 >kernel: #10 0xffffffff80a520af at devfs_ioctl_f+0x1f >kernel: #11 0xffffffff80c04f3d at kern_ioctl+0x26d >kernel: #12 0xffffffff80c04c5e at sys_ioctl+0x15e >kernel: #13 0xffffffff81075449 at amd64_syscall+0x369 >kernel: #14 0xffffffff8104fd1d at fast_syscall_common+0x101 >kernel: panic: sleeping thread >kernel: cpuid = 4 >kernel: time = 1555196306 >kernel: KDB: stack backtrace: >kernel: #0 0xffffffff80be7977 at kdb_backtrace+0x67 >kernel: #1 0xffffffff80b9b563 at vpanic+0x1a3 >kernel: #2 0xffffffff80b9b3b3 at panic+0x43 >kernel: #3 0xffffffff80bfd412 at propagate_priority+0x2b2 >kernel: #4 0xffffffff80bfe048 at turnstile_wait+0x338 >kernel: #5 0xffffffff80b7ade6 at __mtx_lock_sleep+0x196 >kernel: #6 0xffffffff80f013dc at vm_reserv_reclaim_inactive+0x9c >kernel: #7 0xffffffff80ef2db0 at vm_page_alloc_domain_after+0x210 >kernel: #8 0xffffffff81075fac at uma_small_alloc+0x5c >kernel: #9 0xffffffff80ed71bc at keg_alloc_slab+0xdc >kernel: #10 0xffffffff80ed9e3c at keg_fetch_slab+0x19c >kernel: #11 0xffffffff80ed95b9 at zone_fetch_slab+0x69 >kernel: #12 0xffffffff80ed96a1 at zone_import+0x51 >kernel: #13 0xffffffff80ed5867 at uma_zalloc_arg+0x3e7 >kernel: #14 0xffffffff80c01fa4 at bt_fill+0x104 >kernel: #15 0xffffffff80c016a5 at vmem_xalloc+0x1d5 >kernel: #16 0xffffffff80c01491 at vmem_alloc+0x31 >kernel: #17 0xffffffff80ee01d3 at kmem_malloc_domainset+0x83 >kernel: Uptime: 55s
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 236917
: 203654