NetBSD Problem Report #57839

From martin@duskware.de  Fri Jan 12 18:07:24 2024
Return-Path: <martin@duskware.de>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 1B5101A9238
	for <gnats-bugs@gnats.NetBSD.org>; Fri, 12 Jan 2024 18:07:24 +0000 (UTC)
From: martin@NetBSD.org
Reply-To: martin@NetBSD.org
To: gnats-bugs@NetBSD.org
Subject: Reproducable VAX pmap bug
X-Send-Pr-Version: 3.95

>Number:         57839
>Category:       port-vax
>Synopsis:       Reproducable VAX pmap bug
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    port-vax-maintainer
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Fri Jan 12 18:10:00 +0000 2024
>Originator:     Martin Husemann
>Release:        NetBSD 10.99.10
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD dead-to-the-world.duskware.de 10.99.10 NetBSD 10.99.10 (DEAD) #19: Wed Jan 10 15:59:25 CET 2024 martin@seven-days-to-the-wolves.aprisoft.de:/work/src/sys/arch/vax/compile/DEAD vax
Architecture: vax
Machine: vax
>Description:

Running the atf test suite crashes the kernel:

[ 2155.0184746] panic: pmap_destroy used pmap
[ 2155.0309698] cpu0: Begin traceback...
[ 2155.0447079] panic: pmap_destroy used pmap
[ 2155.0537111] Stack traceback : 
[ 2155.0611692]          Process is executing in user space.
[ 2155.0684572] cpu0: End traceback...
Stopped in pid 337.337 (t_lwp_create) at        netbsd:vpanic+0x179:    pushl   
$0
db> bt
panic: pmap_destroy used pmap
Stack traceback :
0x8b9b8d40: vpanic+0x179(0x802116e5,0x8b9b8dd8)
0x8b9b8d60: printf_nostamp+0x0(0x802116e5)
0x8b9b8d8c: pmap_kenter_pa+0x0(0x87687d40)
0x8b9b8ddc: uvmspace_free+0x73(0x867d2900)
0x8b9b8e04: uvm_proc_exit+0x53(0x85a09530)
0x8b9b8e28: exit1+0x15b(0x877a6ac0,0,0)
0x8b9b8ed8: sys_exit+0x31(0x877a6ac0,0x8b9b8f54,0x8b9b8f4c)
0x8b9b8f18: syscall+0x126(0x8b9b8fb4)


>How-To-Repeat:

cd /usr/tests/lib/libc/sys && atf-run t_lwp_create 


>Fix:
n/a

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.47 2022/09/11 19:34:41 kim Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2024 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.