NetBSD Problem Report #55261
From gson@gson.org Thu May 14 13:14:00 2020
Return-Path: <gson@gson.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
by mollari.NetBSD.org (Postfix) with ESMTPS id 9292E1A9213
for <gnats-bugs@gnats.NetBSD.org>; Thu, 14 May 2020 13:14:00 +0000 (UTC)
Message-Id: <20200514131356.2175F253F45@guava.gson.org>
Date: Thu, 14 May 2020 16:13:56 +0300 (EEST)
From: gson@gson.org (Andreas Gustafsson)
Reply-To: gson@gson.org (Andreas Gustafsson)
To: gnats-bugs@NetBSD.org
Subject: sparc still panics running ATF tests
X-Send-Pr-Version: 3.95
>Number: 55261
>Category: port-sparc
>Synopsis: sparc still panics running ATF tests
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: port-sparc-maintainer
>State: closed
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Thu May 14 13:15:00 +0000 2020
>Closed-Date: Wed May 20 11:01:35 +0000 2020
>Last-Modified: Wed May 20 11:01:35 +0000 2020
>Originator: Andreas Gustafsson
>Release: NetBSD-current
>Organization:
>Environment:
System: NetBSD
Architecture: sparc
Machine: sparc
>Description:
As of source date 2020.05.13.22.13.49, NetBSD-current/sparc panics
while running the ATF tests. For example,
http://releng.netbsd.org/b5reports/sparc/2020/2020.05.13.22.13.49/test.log
contains:
lib/libc/sys/t_getrusage (284/855): 6 test cases
getrusage_err: [0.129183s] Passed.
getrusage_maxrss: [ 5381.6208205] panic: kernel diagnostic assertion "cv_is_valid(cv)" failed: file "/tmp/bracket/build/2020.05.13.22.13.49-sparc/src/sys/kern/kern_condvar.c", line 455
[ 5381.6370615] cpu0: Begin traceback...
[ 5381.6370615] 0x0(0xf0468498, 0xf53f7c78, 0xf0568800, 0xf0569400, 0x104, 0xf0569620) at netbsd:kern_assert+0x38
[ 5381.6370615] kern_assert(0xf0468498, 0xf0468488, 0xf04acee0, 0xf04ace70, 0x1c7, 0x4400fe1) at netbsd:cv_signal+0x5c
[ 5381.6370615] cv_signal(0xf0002008, 0xf04b08b0, 0xf045d0c8, 0xf053eb9c, 0xf085c480, 0xf085c480) at netbsd:xc_broadcast+0x1ec
[ 5381.6370615] xc_broadcast(0x0, 0x41, 0x1, 0xf054edf8, 0x0, 0xf054e140) at netbsd:xc_barrier+0x14
[ 5381.6497795] xc_barrier(0x0, 0xf0df4a40, 0xf085c480, 0xf04b0800, 0x222, 0x130) at netbsd:pool_cache_invalidate_groups+0x5c
[ 5381.6497795] pool_cache_invalidate_groups(0xf070f248, 0xf0cf8de8, 0xf0cf8f68, 0xf0cf8df4, 0xf0df4a40, 0x0) at netbsd:pool_cache_invalidate+0xa4
[ 5381.6497795] pool_cache_invalidate(0xf070f248, 0xf0cfcf78, 0xf085c480, 0xf04b8c00, 0xf0cf8de8, 0x0) at netbsd:pool_reclaim+0x64
[ 5381.6593860] pool_reclaim(0xf070f248, 0xf04b08b0, 0xf070f2c0, 0xf053eb9c, 0xf085c480, 0xf054c740) at netbsd:pool_drain+0x6c
[ 5381.6593860] pool_drain(0xf53f7f4c, 0xf04b08b0, 0xf53f7f4c, 0xf053f800, 0xf0568c00, 0xf070f248) at netbsd:uvmpd_pool_drain_thread+0xe0
[ 5381.6593860] uvmpd_pool_drain_thread(0xf0564fd0, 0xf053b1c4, 0xf054e600, 0xf0545cc0, 0x0, 0x0) at netbsd:lwp_trampoline+0x8
[ 5381.6694230] cpu0: End traceback...
[ 5381.6694230] Frame pointer is at 0xf53f7a30
[ 5381.6694230] Call traceback:
[ 5381.6694230] pc = 0xf002cc94 args = (0xf05697bc, 0xf048cd80, 0xf53f7b50, 0xf04b0800, 0x8, 0xf0545000) fp = 0xf53f7aa0
[ 5381.6694230] pc = 0xf02ddf8c args = (0x104, 0x0, 0xf085c480, 0x0, 0x44000e6, 0xf0566c00) fp = 0xf53f7b08
[ 5381.6694230] pc = 0xf031c9c4 args = (0x104, 0x0, 0xf0468498, 0xf53f7c78, 0x0, 0xf0002000) fp = 0xf53f7b68
[ 5381.6694230] pc = 0xf0435830 args = (0xf0468498, 0xf53f7c78, 0xf0568800, 0xf0569400, 0x104, 0xf0569620) fp = 0xf53f7bc8
[ 5381.6694230] pc = 0xf02b36cc args = (0xf0468498, 0xf0468488, 0xf04acee0, 0xf04ace70, 0x1c7, 0x4400fe1) fp = 0xf53f7c30
[ 5381.6694230] pc = 0xf0327458 args = (0xf0002008, 0xf04b08b0, 0xf045d0c8, 0xf053eb9c, 0xf085c480, 0xf085c480) fp = 0xf53f7c90
[ 5381.6694230] pc = 0xf032759c args = (0x0, 0x41, 0x1, 0xf054edf8, 0x0, 0xf054e140) fp = 0xf53f7cf0
[ 5381.6694230] pc = 0xf0318d98 args = (0x0, 0xf0df4a40, 0xf085c480, 0xf04b0800, 0x222, 0x130) fp = 0xf53f7d50
[ 5381.6694230] pc = 0xf0319d34 args = (0xf070f248, 0xf0cf8de8, 0xf0cf8f68, 0xf0cf8df4, 0xf0df4a40, 0x0) fp = 0xf53f7db0
[ 5381.6694230] pc = 0xf0319df0 args = (0xf070f248, 0xf0cfcf78, 0xf085c480, 0xf04b8c00, 0xf0cf8de8, 0x0) fp = 0xf53f7e10
[ 5381.6694230] pc = 0xf031a230 args = (0xf070f248, 0xf04b08b0, 0xf070f2c0, 0xf053eb9c, 0xf085c480, 0xf054c740) fp = 0xf53f7e88
[ 5381.6694230] pc = 0xf029b47c args = (0xf53f7f4c, 0xf04b08b0, 0xf53f7f4c, 0xf053f800, 0xf0568c00, 0xf070f248) fp = 0xf53f7ee8
[ 5381.6694230] pc = 0xf000a190 args = (0xf0564fd0, 0xf053b1c4, 0xf054e600, 0xf0545cc0, 0x0, 0x0) fp = 0xf53f7f50
[ 5381.6694230] pc = 0x0 args = (0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fp = 0x0
[ 5381.6694230] dumping to dev 7,1 offset 164063
[ 5381.6694230] dump succeeded
[ 5381.6694230] rebooting
rebooting ()
qemu: fatal: Trap 0x06 while interrupts disabled, Error state
pc: ffd023ec npc: 00000008
%g0-7: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
%o0-7: 00000000 00000200 00000000 00000048 00000000 fffffe00 fffffd98 ffd023bc
%l0-7: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
%i0-7: 00000000 00000000 00000000 00000000 00000000 fffffe00 00000000 00000000
%f00: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
%f08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
%f16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
%f24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
psr: 044000c7 (icc: -Z-- SPE: SP-) wim: 00000001
fsr: 00000000 y: 00000000
It was previously panicing in the same test case with a different panic message as
reported in PR 54734, but changed to the present one some time between source
dates 2020.03.24.22.09.50 and 2020.03.27.11.15.33. I'm filing this separate PR
about the new panic as requested by kamil who says it's an unrelated bug.
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
From: "Andrew Doran" <ad@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc:
Subject: PR/55261 CVS commit: src/sys/arch/sparc/include
Date: Fri, 15 May 2020 18:45:09 +0000
Module Name: src
Committed By: ad
Date: Fri May 15 18:45:08 UTC 2020
Modified Files:
src/sys/arch/sparc/include: cpu.h
Log Message:
PR port-sparc/55261: sparc still panics running ATF tests
Put cpu_data at the end of cpu_info to see how that modifies the symptom.
To generate a diff of this commit:
cvs rdiff -u -r1.105 -r1.106 src/sys/arch/sparc/include/cpu.h
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
From: "Andrew Doran" <ad@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc:
Subject: PR/55261 CVS commit: src/sys/arch/sparc/include
Date: Sat, 16 May 2020 17:52:42 +0000
Module Name: src
Committed By: ad
Date: Sat May 16 17:52:42 UTC 2020
Modified Files:
src/sys/arch/sparc/include: cpu.h types.h
Log Message:
PR port-sparc/55261: sparc still panics running ATF tests
Reinstate the cpu_info change and remove __HAVE_CPU_DATA_FIRST to fix
build failure.
To generate a diff of this commit:
cvs rdiff -u -r1.107 -r1.108 src/sys/arch/sparc/include/cpu.h
cvs rdiff -u -r1.66 -r1.67 src/sys/arch/sparc/include/types.h
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
From: Andreas Gustafsson <gson@gson.org>
To: gnats-bugs@netbsd.org
Cc: gson@gson.org (Andreas Gustafsson)
Subject: Re: port-sparc/55261: sparc still panics running ATF tests
Date: Wed, 20 May 2020 13:51:59 +0300
The sparc tests are running to completion again since this commit:
2020.05.17.17.12.28 ad src/sys/uvm/uvm_page.c 1.236
--
Andreas Gustafsson, gson@gson.org
State-Changed-From-To: open->closed
State-Changed-By: gson@NetBSD.org
State-Changed-When: Wed, 20 May 2020 11:01:35 +0000
State-Changed-Why:
Fixed, thanks.
>Unformatted:
(Contact us)
$NetBSD: query-full-pr,v 1.46 2020/01/03 16:35:01 leot Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2020
The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.