From nobody Fri Jul 07 00:08:06 2023 X-Original-To: freebsd-current@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Qxtyy5VvJz4ldWx for ; Fri, 7 Jul 2023 00:08:26 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic310-22.consmr.mail.gq1.yahoo.com (sonic310-22.consmr.mail.gq1.yahoo.com [98.137.69.148]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Qxtyy3BbTz4cNh for ; Fri, 7 Jul 2023 00:08:26 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1688688504; bh=62a7Ozdq5qYy0PryQLomu6gReKP0W6YWeYU+ciM+mDc=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=PDRT/oUUlBLcpOu+Vb5ef7B3ZSsejslm/LaO6PEEOzN8loKjCo3qn1v84oRiXLQlWQZ+Xz5mkz+nINHhyyI8X1R+ZxloFw8eBgq0Qm/FQpohcvwUDkup7cR8Cke7rUkJoJGKJLWh/dukjtK+0oSIEKx0v6jpzwceTQhYzgMfpjjhgBsotmnvCec9YwLVXcN/XBU6B1iPVOzdOVdzhkCmA8ZdJzUD7+9uyzdX2Lh++MPYODNe74bCIOPs+Khc5GFcr/TcH2UsvWcPAmMG2KH09aFkAqvH5LvADWkzPeyt8g1e6JnaHSmw8+QfLIKFFjMLyKY3tazMqQTfmvwwlg1bpQ== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1688688504; bh=+GjIG4nwUl8DoLswMFyX2QmoqSXyhDDfqX61JCE2mIu=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=J2S0dY0FVujUgLqFAYfUAW/3VW69aQCOI/ggos+HTAwLQJHsYQ5aiWMmk6i1ErDWE33tgX5R3daT1f26YaLbgsGOZLh9yV4OJKJzJ5TfjlwKkPUejILKE7gxnmAZgE+MEjuurEjF42L6uRNaZnHhoycp/4SUm3IY347BnZ7QkRjNExkZ1+rVIc5mjt7zXPBLkkXY4/eYNhqCU+JxyGu5zc1GAlW5wjVTP4CftQ1yHEyyQ44Qav0Cq2ZK+c3xqx3A1ViYKHIPItD4nZZIsnp25UaszF7kXsP/1DonUtoSv+NRK7WZU4qCAAhdRL8jgJFikAr9Y1ybq8NopqEWdJbccg== X-YMail-OSG: mhDGZgUVM1lyWWOXJe1NrxIZV3iDQ7hLwXqvi7LyIyUhpC9k6yjqR1wNB4F8rhB uBX88GYw62brOnB_1zbOE6F1XGn69mn0NaId2W92i2F236lsrW3GuJysp17x6WpNaZKA4RWJvfow Xy1bjze_cFW2iV2XKEGEAt4zPA52hdOqlHeiohZ6bxvkb86nxh_sJ6uEN.9SHTQyjVcXdcFVuV6S 6_ZZugISsz7OCDnQoYSvgvZJBLYv5ny35Nhl8Sz2I8IzzcvQNwW_wghiQvzyQ8OYs_Q.a7ugglNq AdYnB50SQl3rTWHMFzTFe32N9AyM1zXkK7XQKeQLXFndyhckDUUjOG64ikc7GS9l7IAPjiFusLxL uenlKrLJuLHzJ20wwjPdW3SYFiDKyt_WdMQHiADTMfdU2viQxuZ1Cjlej71OyRgmRCGny67AwzPx Xz.wy4hboiCpJ0yksP.J6x_rEnv.pk7gA4xhEe28FyrLm26vc1f75nl4CawhL3nP31jfxmIyMROb vZhVY.ORR73G17qdg3CJeOGL4_9xE.pwO7LOs4QIOA6UZfIRJh5s0xvGfBG9YWJohDo4tnBVt4Gp OzHDw_VPFYLfenPG9SfM64DjpDeaOcQATp6MHR1nPl1o2wGv9AUZjmBrDWD6ahI7_RSEby7a6nSU IL7aBzuRIYs1nQrRnP_rZty5Gv.wfNfNYeaUrAFkx8LiNYdL98GPsOc9cqLCdB1sdXA6HDdAtznO YomJ6vfwzvk12OpHl88nHDxvzVgsmRN0WBSWmw6gxLgQu9RUDlSq.lNv.vQY_fewB_VBs9MVRLHo um.tdIuVf1m_UV3KoiyM7A0siflNHwUJ2vcJaNS3.spBXx24eO_qikkFijr7hC2aSmkoVRXKaYca 4db9dLUe17OF4Eci6Ohf5Efyo7GAxXIvLzHOc8ViAEk4Bse1sdtqq3FjfuALyCJGUQsr7BnhKYzy 31uCU0FCPOX_S9aNIamLOpG7zkzWV73kVhYYRcQy.DrniitAGDELe8_RK4LlIZCc9T2OT9V1MN3x MDUa3FqeUxd0_qN_GSRHqMJV6vZTG1jZRDFtiFdJc0EBG0.o1HL.PklJUgteGk5QQV_LlnpHFhAL MJ0oh8bLqr5dYQDb20hhVVkyMylKAwTSvQTI4QANVjzIj9XzUgeZrLgdD6QAzb2XQZkpYY3z12Uy j5oNdD3IgSj3typgLVWmyWpyg16X2AMzfiDV2Wgb4JGOKnMk5vcphBEFoa1EGsSMx.vqo3qGrZHn FlV79BaA66MeSFnc.bS9xWz.Br8NGGCGqaArCryhqfcCT_UcuNYO5otR4VScz4KTtFjmCrW5.J_B eq2xMqgqNPrw5cw1JN3X5xGy9.FFFDlhO4VwPg0SBovzZc1rv_HKkyv8H9LfYTU.UunR9nnCFy8e PxTjKT9hVuMOMU7RPgxGM4ZSanYGr9Q3SJYnui7Ez2b9sC8ZqbbImjVxCXNZjkDBkTeTax87.VCB BzgDbv_skUYj.HNvL8eJL0YdctrTvKYqr7otdmKSvaoY7xL5uChVVPppxkuldekiLcEgB04JNeSC uv7ZRAu5gsgw5W9Vgc8BxILUZ_KNzZxscCtLt6yPRXlOMIQ0_ZGjCJGbOpp1fpeAWRNh034ZY99W QpAosTc.8ghIhwHPF2RAIXeFqE3_ZCnfwdq1bGRMz.OLtzbC_hse0lORIpzCd8.8wmu4aBtuTEKj T1sKW_Ape8nY39DJmYSzR.35kbCACD7O2nOkkEBeAljz2SUEelHeaozl2R_l4MAJD_ZuH4ueMXle uHae3505UIeoK2GBeql1vh3tHswf_lVNQZH_3WB_h1wtTMPc3T89T.QQPZupSf9HPwBuADM.R86J A0VgdoMyYTvQ4GUgG9YsDpLb4p8kWkZwVKhCk0Z6K.7IlikNCABd33.3on0GTcQayW76u35E7_.. 1ykcP0qPUbdQ3EyRepysD16ktJsYLgGEImcxcxlNNeY0yU37H.yzBxWmh03thQWqkC574uH75OOJ lyiRtvKSmAwam4cJkJYH_CnABxYObTxM53oN_oh7D4fDeM6cV8V.3kn4Ehkp5iDpUVOz8Ka9o7n8 xQ_Z1dLT2fSDXEcjRsaMjS4nqWNDHUIYGu4l6u8sZbbSySoKrBtm500dwAPR9VIesy22Wsw6p_xY m2qTEHoatGONaVjN8fCHH7xu_gM7S_9dkFWulb6nw0pOwlCCqvxaRxVlUbjT.rsZmp3mDRiPHrxL Krdcp6nhCbh4ws6rhyRXGFAqgAO4CsxV.NQsZNJsZVSGkhsLiCaItpxW5nd7Q_mIkfgAFOpk9iyu K X-Sonic-MF: X-Sonic-ID: fd98659e-d514-478b-9ee9-4b3c358f5ebe Received: from sonic.gate.mail.ne1.yahoo.com by sonic310.consmr.mail.gq1.yahoo.com with HTTP; Fri, 7 Jul 2023 00:08:24 +0000 Received: by hermes--production-bf1-5d96b4b9f-2ghnc (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID 3b751054b067ae646f3c756d0d89e67c; Fri, 07 Jul 2023 00:08:18 +0000 (UTC) Content-Type: text/plain; charset=us-ascii List-Id: Discussions about the use of FreeBSD-current List-Archive: https://lists.freebsd.org/archives/freebsd-current List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-current@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.600.7\)) Subject: Re: For snapshot builds: armv7 chroot on aarch64 has kyua test -k /usr/tests/Kyuafile sys/kern/kern_copyin hung up [in getpid?], unkillable, prevents reboot From: Mark Millard In-Reply-To: Date: Thu, 6 Jul 2023 17:08:06 -0700 Cc: Current FreeBSD , freebsd-arm Content-Transfer-Encoding: quoted-printable Message-Id: <1DA4804D-38FA-4844-9869-63563C473B7D@yahoo.com> References: <7A41DED4-876F-4270-A980-549A4832B39A.ref@yahoo.com> <7A41DED4-876F-4270-A980-549A4832B39A@yahoo.com> To: John F Carr X-Mailer: Apple Mail (2.3731.600.7) X-Rspamd-Queue-Id: 4Qxtyy3BbTz4cNh X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N On Jul 6, 2023, at 16:53, John F Carr wrote: > On Jun 25, 2023, at 20:16, Mark Millard wrote: >>=20 >> . . . >>=20 >=20 > The hang is caused by the sysctl call in tests/sys/kern/kern_copyin.c. = The function below hangs when called in a 32 bit ARM process running in = a chroot environment on a 64 bit ARM system. I will write up a bug = report. >=20 > static int > get_vm_layout(struct kinfo_vm_layout *kvm) > { > size_t len; > int mib[4]; >=20 > mib[0] =3D CTL_KERN; > mib[1] =3D KERN_PROC; > mib[2] =3D KERN_PROC_VM_LAYOUT; > mib[3] =3D getpid(); > len =3D sizeof(*kvm); >=20 > return (sysctl(mib, nitems(mib), kvm, &len, NULL, 0)); > } >=20 Thanks for the tiny-reproducer analysis! That should help make getting to a fix more actionable. =3D=3D=3D Mark Millard marklmi at yahoo.com