NetBSD Problem Report #55261

From gson@gson.org  Thu May 14 13:14:00 2020
Return-Path: <gson@gson.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 9292E1A9213
	for <gnats-bugs@gnats.NetBSD.org>; Thu, 14 May 2020 13:14:00 +0000 (UTC)
Message-Id: <20200514131356.2175F253F45@guava.gson.org>
Date: Thu, 14 May 2020 16:13:56 +0300 (EEST)
From: gson@gson.org (Andreas Gustafsson)
Reply-To: gson@gson.org (Andreas Gustafsson)
To: gnats-bugs@NetBSD.org
Subject: sparc still panics running ATF tests
X-Send-Pr-Version: 3.95

>Number:         55261
>Category:       port-sparc
>Synopsis:       sparc still panics running ATF tests
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    port-sparc-maintainer
>State:          closed
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu May 14 13:15:00 +0000 2020
>Closed-Date:    Wed May 20 11:01:35 +0000 2020
>Last-Modified:  Wed May 20 11:01:35 +0000 2020
>Originator:     Andreas Gustafsson
>Release:        NetBSD-current
>Organization:
>Environment:
System: NetBSD
Architecture: sparc
Machine: sparc
>Description:

As of source date 2020.05.13.22.13.49, NetBSD-current/sparc panics
while running the ATF tests.  For example,

  http://releng.netbsd.org/b5reports/sparc/2020/2020.05.13.22.13.49/test.log

contains:

  lib/libc/sys/t_getrusage (284/855): 6 test cases
      getrusage_err: [0.129183s] Passed.
      getrusage_maxrss: [ 5381.6208205] panic: kernel diagnostic assertion "cv_is_valid(cv)" failed: file "/tmp/bracket/build/2020.05.13.22.13.49-sparc/src/sys/kern/kern_condvar.c", line 455
  [ 5381.6370615] cpu0: Begin traceback...
  [ 5381.6370615] 0x0(0xf0468498, 0xf53f7c78, 0xf0568800, 0xf0569400, 0x104, 0xf0569620) at netbsd:kern_assert+0x38
  [ 5381.6370615] kern_assert(0xf0468498, 0xf0468488, 0xf04acee0, 0xf04ace70, 0x1c7, 0x4400fe1) at netbsd:cv_signal+0x5c
  [ 5381.6370615] cv_signal(0xf0002008, 0xf04b08b0, 0xf045d0c8, 0xf053eb9c, 0xf085c480, 0xf085c480) at netbsd:xc_broadcast+0x1ec
  [ 5381.6370615] xc_broadcast(0x0, 0x41, 0x1, 0xf054edf8, 0x0, 0xf054e140) at netbsd:xc_barrier+0x14
  [ 5381.6497795] xc_barrier(0x0, 0xf0df4a40, 0xf085c480, 0xf04b0800, 0x222, 0x130) at netbsd:pool_cache_invalidate_groups+0x5c
  [ 5381.6497795] pool_cache_invalidate_groups(0xf070f248, 0xf0cf8de8, 0xf0cf8f68, 0xf0cf8df4, 0xf0df4a40, 0x0) at netbsd:pool_cache_invalidate+0xa4
  [ 5381.6497795] pool_cache_invalidate(0xf070f248, 0xf0cfcf78, 0xf085c480, 0xf04b8c00, 0xf0cf8de8, 0x0) at netbsd:pool_reclaim+0x64
  [ 5381.6593860] pool_reclaim(0xf070f248, 0xf04b08b0, 0xf070f2c0, 0xf053eb9c, 0xf085c480, 0xf054c740) at netbsd:pool_drain+0x6c
  [ 5381.6593860] pool_drain(0xf53f7f4c, 0xf04b08b0, 0xf53f7f4c, 0xf053f800, 0xf0568c00, 0xf070f248) at netbsd:uvmpd_pool_drain_thread+0xe0
  [ 5381.6593860] uvmpd_pool_drain_thread(0xf0564fd0, 0xf053b1c4, 0xf054e600, 0xf0545cc0, 0x0, 0x0) at netbsd:lwp_trampoline+0x8
  [ 5381.6694230] cpu0: End traceback...
  [ 5381.6694230] Frame pointer is at 0xf53f7a30
  [ 5381.6694230] Call traceback:
  [ 5381.6694230]	  pc = 0xf002cc94  args = (0xf05697bc, 0xf048cd80, 0xf53f7b50, 0xf04b0800, 0x8, 0xf0545000) fp = 0xf53f7aa0
  [ 5381.6694230]	  pc = 0xf02ddf8c  args = (0x104, 0x0, 0xf085c480, 0x0, 0x44000e6, 0xf0566c00) fp = 0xf53f7b08
  [ 5381.6694230]	  pc = 0xf031c9c4  args = (0x104, 0x0, 0xf0468498, 0xf53f7c78, 0x0, 0xf0002000) fp = 0xf53f7b68
  [ 5381.6694230]	  pc = 0xf0435830  args = (0xf0468498, 0xf53f7c78, 0xf0568800, 0xf0569400, 0x104, 0xf0569620) fp = 0xf53f7bc8
  [ 5381.6694230]	  pc = 0xf02b36cc  args = (0xf0468498, 0xf0468488, 0xf04acee0, 0xf04ace70, 0x1c7, 0x4400fe1) fp = 0xf53f7c30
  [ 5381.6694230]	  pc = 0xf0327458  args = (0xf0002008, 0xf04b08b0, 0xf045d0c8, 0xf053eb9c, 0xf085c480, 0xf085c480) fp = 0xf53f7c90
  [ 5381.6694230]	  pc = 0xf032759c  args = (0x0, 0x41, 0x1, 0xf054edf8, 0x0, 0xf054e140) fp = 0xf53f7cf0
  [ 5381.6694230]	  pc = 0xf0318d98  args = (0x0, 0xf0df4a40, 0xf085c480, 0xf04b0800, 0x222, 0x130) fp = 0xf53f7d50
  [ 5381.6694230]	  pc = 0xf0319d34  args = (0xf070f248, 0xf0cf8de8, 0xf0cf8f68, 0xf0cf8df4, 0xf0df4a40, 0x0) fp = 0xf53f7db0
  [ 5381.6694230]	  pc = 0xf0319df0  args = (0xf070f248, 0xf0cfcf78, 0xf085c480, 0xf04b8c00, 0xf0cf8de8, 0x0) fp = 0xf53f7e10
  [ 5381.6694230]	  pc = 0xf031a230  args = (0xf070f248, 0xf04b08b0, 0xf070f2c0, 0xf053eb9c, 0xf085c480, 0xf054c740) fp = 0xf53f7e88
  [ 5381.6694230]	  pc = 0xf029b47c  args = (0xf53f7f4c, 0xf04b08b0, 0xf53f7f4c, 0xf053f800, 0xf0568c00, 0xf070f248) fp = 0xf53f7ee8
  [ 5381.6694230]	  pc = 0xf000a190  args = (0xf0564fd0, 0xf053b1c4, 0xf054e600, 0xf0545cc0, 0x0, 0x0) fp = 0xf53f7f50
  [ 5381.6694230]	  pc = 0x0  args = (0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fp = 0x0

  [ 5381.6694230] dumping to dev 7,1 offset 164063
  [ 5381.6694230] dump succeeded
  [ 5381.6694230] rebooting

  rebooting ()
  qemu: fatal: Trap 0x06 while interrupts disabled, Error state
  pc: ffd023ec  npc: 00000008
  %g0-7: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
  %o0-7: 00000000 00000200 00000000 00000048 00000000 fffffe00 fffffd98 ffd023bc
  %l0-7: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
  %i0-7: 00000000 00000000 00000000 00000000 00000000 fffffe00 00000000 00000000
  %f00:  0000000000000000 0000000000000000 0000000000000000 0000000000000000
  %f08:  0000000000000000 0000000000000000 0000000000000000 0000000000000000
  %f16:  0000000000000000 0000000000000000 0000000000000000 0000000000000000
  %f24:  0000000000000000 0000000000000000 0000000000000000 0000000000000000
  psr: 044000c7 (icc: -Z-- SPE: SP-) wim: 00000001
  fsr: 00000000 y: 00000000

It was previously panicing in the same test case with a different panic message as
reported in PR 54734, but changed to the present one some time between source
dates 2020.03.24.22.09.50 and 2020.03.27.11.15.33.  I'm filing this separate PR
about the new panic as requested by kamil who says it's an unrelated bug.

>How-To-Repeat:

>Fix:

>Release-Note:

>Audit-Trail:
From: "Andrew Doran" <ad@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/55261 CVS commit: src/sys/arch/sparc/include
Date: Fri, 15 May 2020 18:45:09 +0000

 Module Name:	src
 Committed By:	ad
 Date:		Fri May 15 18:45:08 UTC 2020

 Modified Files:
 	src/sys/arch/sparc/include: cpu.h

 Log Message:
 PR port-sparc/55261: sparc still panics running ATF tests

 Put cpu_data at the end of cpu_info to see how that modifies the symptom.


 To generate a diff of this commit:
 cvs rdiff -u -r1.105 -r1.106 src/sys/arch/sparc/include/cpu.h

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

From: "Andrew Doran" <ad@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/55261 CVS commit: src/sys/arch/sparc/include
Date: Sat, 16 May 2020 17:52:42 +0000

 Module Name:	src
 Committed By:	ad
 Date:		Sat May 16 17:52:42 UTC 2020

 Modified Files:
 	src/sys/arch/sparc/include: cpu.h types.h

 Log Message:
 PR port-sparc/55261: sparc still panics running ATF tests

 Reinstate the cpu_info change and remove __HAVE_CPU_DATA_FIRST to fix
 build failure.


 To generate a diff of this commit:
 cvs rdiff -u -r1.107 -r1.108 src/sys/arch/sparc/include/cpu.h
 cvs rdiff -u -r1.66 -r1.67 src/sys/arch/sparc/include/types.h

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

From: Andreas Gustafsson <gson@gson.org>
To: gnats-bugs@netbsd.org
Cc: gson@gson.org (Andreas Gustafsson)
Subject: Re: port-sparc/55261: sparc still panics running ATF tests
Date: Wed, 20 May 2020 13:51:59 +0300

 The sparc tests are running to completion again since this commit:

   2020.05.17.17.12.28 ad src/sys/uvm/uvm_page.c 1.236

 -- 
 Andreas Gustafsson, gson@gson.org

State-Changed-From-To: open->closed
State-Changed-By: gson@NetBSD.org
State-Changed-When: Wed, 20 May 2020 11:01:35 +0000
State-Changed-Why:
Fixed, thanks.


>Unformatted:

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.46 2020/01/03 16:35:01 leot Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2020 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.