NetBSD Problem Report #55354

From ad@netbsd.org  Sat Jun  6 23:00:11 2020
Return-Path: <ad@netbsd.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id A60BD1A9219
	for <gnats-bugs@gnats.NetBSD.org>; Sat,  6 Jun 2020 23:00:11 +0000 (UTC)
Message-Id: <20200606230010.6D9B91A921E@mollari.NetBSD.org>
Date: Sat,  6 Jun 2020 23:00:10 +0000 (UTC)
From: ad@netbsd.org
Reply-To: ad@netbsd.org
To: gnats-bugs@NetBSD.org
Subject: TSAN reportedly crashes the kernel
X-Send-Pr-Version: 3.95

>Number:         55354
>Category:       kern
>Synopsis:       TSAN reportedly crashes the kernel
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    ad
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Sat Jun 06 23:05:00 +0000 2020
>Last-Modified:  Sat Jun 06 23:05:28 +0000 2020
>Originator:     Andrew Doran
>Release:        NetBSD-current
>Organization:
NetBSD
>Environment:
amd64
>Description:
	According to Kamil tsan can crash the kernel.
>How-To-Repeat:
 ./build.sh -j8 -N0 -U -u -V MAKECONF=/dev/null -V MKCOMPAT=no -V                                                                                                                                                                
MKDEBUGLIB=yes -V MKDEBUG=yes -V MKSANITIZER=yes -V USE_SANITIZER=thread                                                                                                                                                         
-V MKLLVM=yes -V MKGCC=no -V HAVE_LLVM=yes -O /public/netbsd.fuzzer                                                                                                                                                              
distribution                                                                                                                                                                                                                     

Null mount /dev /dev/pts /tmp and chroot into it.                                                                                                                                                                                

Try to run some basic applications and see creation unkillable                                                                                                                                                                   
processes. Unless that was fixed by an accident/indirectly, you will                                                                                                                                                             
quickly reproduce it.     
>Fix:
	?

>Release-Note:

>Audit-Trail:

Responsible-Changed-From-To: kern-bug-people->ad
Responsible-Changed-By: ad@NetBSD.org
Responsible-Changed-When: Sat, 06 Jun 2020 23:05:28 +0000
Responsible-Changed-Why:
take


>Unformatted:

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.46 2020/01/03 16:35:01 leot Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2020 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.