Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 09 Jul 2017 10:30:43 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 220493] [exp-run] with security.bsd.stack_guard_page=16
Message-ID:  <bug-220493-13-qgyQPXZYHQ@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-220493-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-220493-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220493

--- Comment #12 from Antoine Brodin <antoine@FreeBSD.org> ---
procstat -kka shows that the unkillable processes are in vm_* :

34132 102070 miniruby            -                   vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb=20
53019 101683 polyimport          -                   vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb=20
54072 100377 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb=20
54072 100453 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x1=
45
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb=20
54072 100513 beam.smp            -                   vm_map_find_min+0xaa
vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a amd64_syscall+0x660
Xfast_syscall+0xfb=20
58892 100366 xpcshell            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb=20
58892 101550 xpcshell            Gecko_IOThread      mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 kqueue_kevent+0=
x294
kern_kevent+0xb5 kern_kevent_generic+0x14a sys_kevent+0x5a amd64_syscall+0x=
660
Xfast_syscall+0xfb=20
59455 100263 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb=20
59455 100305 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x1=
45
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb=20
59455 101860 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb=20
64688 101310 miniruby            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb=20
69986 101565 miniruby            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb=20
80388 101170 beam.smp            -                   vm_map_find+0xb3
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb=20
80388 102303 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb=20
80388 102304 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x1=
45
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb=20
80926 100297 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb=20
80926 100314 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x1=
45
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb=20
80926 102057 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb=20
82832 100296 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb=20
82832 100316 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x1=
45
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb=20
82832 102195 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-220493-13-qgyQPXZYHQ>