[Bug 220493] [exp-run] with security.bsd.stack_guard_page=16
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sun Jul 9 10:30:43 UTC 2017
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220493
--- Comment #12 from Antoine Brodin <antoine at FreeBSD.org> ---
procstat -kka shows that the unkillable processes are in vm_* :
34132 102070 miniruby - vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb
53019 101683 polyimport - vm_map_find+0xe1
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb
54072 100377 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb
54072 100453 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb
54072 100513 beam.smp - vm_map_find_min+0xaa
vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a amd64_syscall+0x660
Xfast_syscall+0xfb
58892 100366 xpcshell - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
58892 101550 xpcshell Gecko_IOThread mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 kqueue_kevent+0x294
kern_kevent+0xb5 kern_kevent_generic+0x14a sys_kevent+0x5a amd64_syscall+0x660
Xfast_syscall+0xfb
59455 100263 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb
59455 100305 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb
59455 101860 beam.smp - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
64688 101310 miniruby - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
69986 101565 miniruby - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
80388 101170 beam.smp - vm_map_find+0xb3
vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496 sys_mmap+0x2a
amd64_syscall+0x660 Xfast_syscall+0xfb
80388 102303 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb
80388 102304 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb
80926 100297 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb
80926 100314 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb
80926 102057 beam.smp - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
82832 100296 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 pipe_read+0x2d5
dofileread+0xba kern_readv+0x68 sys_read+0x86 amd64_syscall+0x660
Xfast_syscall+0xfb
82832 100316 beam.smp - mi_switch+0xf4
sleepq_catch_signals+0x464 sleepq_wait_sig+0xf _sleep+0x248 umtxq_sleep+0x145
do_wait+0x3b1 __umtx_op_wait_uint_private+0x53 amd64_syscall+0x660
Xfast_syscall+0xfb
82832 102195 beam.smp - vm_map_findspace+0x5f
vm_map_find+0xe1 vm_map_find_min+0xaa vm_mmap_object+0x387 kern_mmap+0x496
sys_mmap+0x2a amd64_syscall+0x660 Xfast_syscall+0xfb
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the freebsd-ports-bugs
mailing list