From nobody Fri Jul 7 00:45:29 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Qxvnj6Yn1z4l4Mf for ; Fri, 7 Jul 2023 00:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Qxvnj5GQCz3KYf for ; Fri, 7 Jul 2023 00:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1688690729; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5jG0/JW1qQEInFuI59bogSSdOuYW9c9Sf3rt61SbpPM=; b=nA7uirzgRMcH0LLqCQXzaB/hWE7QTAdXdSg2m3z86p56IN+flinZZFZN0KHveKAgg2nPlv vnnpMRey6FWNYGFftHvIg2bR+vX6ZzwBksKKfrrt0OVIAhGJNEGcs+uVxZ5ERgD9jV2eYt mieNyLSiXodNtCCILqmbR1VvZij0xJtgH7GKUsALLnMY/FL7d6Ba2BkRUW4l6Unj1gG9lL /uqV4VgycjJsq50Ko6ZYgdmIlgcVo1EkeLUt8hFi6uTz/VQBQL6d0KCOiB8ZuFamyodZcq R3Ihg6FSgvW+C1yTyunn4D0Bg2SrzMBqfY/mYnjZGx1AAjmMvgSZ/DtT65ok4A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1688690729; a=rsa-sha256; cv=none; b=i0UeiHYK1Z11K+BtMnplEZwzkxZuHSYyyuF1PDyocf3zuea6B/wIrZj9qCgkwo/dEK1ViM eavbfXRCX5oED7QCGCfRHmrvp/AluUz8ekdjQ39SxiDybvf9O7++FHTuKxnaTfsPtFOxNd gfP4ABv6W8UpabyYoxqUH+jwTty/UGov+XG/qwIMSWmYiRe2TsOdvX7N7fXMQaiAFmQL18 10moTaprZyBhVE1HNTm6jltuFnTQId0L5Z5GZMe6mmo9qaFwPLcJkvfCGEC+x1gxIg/5Wv A6JQIh0XgCM4MIa7lUrmp+8lXcooNWwhnjzYc50Hn8c07lN7FEGIh/cr+KayNg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Qxvnj4FtczJgW for ; Fri, 7 Jul 2023 00:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3670jTJn053696 for ; Fri, 7 Jul 2023 00:45:29 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3670jTbT053695 for bugs@FreeBSD.org; Fri, 7 Jul 2023 00:45:29 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 272401] 32 bit sysctl KERN_PROC_VM_LAYOUT hangs unkillable on 64 bit ARM Date: Fri, 07 Jul 2023 00:45:29 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jfc@mit.edu X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272401 --- Comment #1 from John F. Carr --- The corresponding test of an i386 binary on amd64 causes a panic. It does = not require a chroot environment so it is allows an unprivileged user to crash = the machine. I don't think this is a bug in any released version. The test program does not compile on 13.2. Running on amd64 and current from a few weeks back. First a 64 bit version= of the reproducer: root@monax-vm:/tmp # ./a.out=20 user address range 0x1000..0x7ffffffff000 Now recompile as a 32 bit binary: root@monax-vm:/tmp # cc -g hang.c -target i386-freebsd root@monax-vm:/tmp # file a.out a.out: ELF 32-bit LSB executable, Intel 80386, version 1 (FreeBSD), dynamic= ally linked, interpreter /libexec/ld-elf.so.1, for FreeBSD 14.0 (1400091), FreeBSD-style, with debug_info, not stripped root@monax-vm:/tmp # ./a.out panic: releasing active pmap 0xfffffe00cdcdc170 cpuid =3D 4 time =3D 1688690396 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00b0d9b= 940 vpanic() at vpanic+0x150/frame 0xfffffe00b0d9b990 panic() at panic+0x43/frame 0xfffffe00b0d9b9f0 pmap_release() at pmap_release+0x2a5/frame 0xfffffe00b0d9ba20 vmspace_free() at vmspace_free+0x43/frame 0xfffffe00b0d9ba40 sysctl_kern_proc_vm_layout() at sysctl_kern_proc_vm_layout+0x35b/frame 0xfffffe00b0d9bbb0 sysctl_root_handler_locked() at sysctl_root_handler_locked+0x9c/frame 0xfffffe00b0d9bc00 sysctl_root() at sysctl_root+0x230/frame 0xfffffe00b0d9bc80 userland_sysctl() at userland_sysctl+0x184/frame 0xfffffe00b0d9bd30 freebsd32___sysctl() at freebsd32___sysctl+0xa6/frame 0xfffffe00b0d9bdf0 ia32_syscall() at ia32_syscall+0x157/frame 0xfffffe00b0d9bf30 int0x80_syscall_common() at int0x80_syscall_common+0x9c/frame 0xffffdc2c --=20 You are receiving this mail because: You are the assignee for the bug.=