[Bug 220493] [exp-run] with security.bsd.stack_guard_page=16

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Sun Jul 9 10:30:43 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220493

--- Comment #12 from Antoine Brodin <antoine at FreeBSD.org> ---
procstat -kka shows that the unkillable processes are in vm_* :

34132 102070 miniruby            -                   vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb 
53019 101683 polyimport          -                   vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb 
54072 100377 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb 
54072 100453 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb 
54072 100513 beam.smp            -                   vm_map_find_min+0xaa
vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a amd64_syscall+0x660
Xfast_syscall+0xfb 
58892 100366 xpcshell            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb 
58892 101550 xpcshell            Gecko_IOThread      mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 kqueue_kevent+0x294
kern_kevent+0xb5 kern_kevent_generic+0x14a sys_kevent+0x5a amd64_syscall+0x660
Xfast_syscall+0xfb 
59455 100263 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb 
59455 100305 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb 
59455 101860 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb 
64688 101310 miniruby            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb 
69986 101565 miniruby            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb 
80388 101170 beam.smp            -                   vm_map_find+0xb3
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb 
80388 102303 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb 
80388 102304 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb 
80926 100297 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb 
80926 100314 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb 
80926 102057 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb 
82832 100296 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb 
82832 100316 beam.smp            -                   mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb 
82832 102195 beam.smp            -                   vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the freebsd-ports-bugs mailing list