NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/55300: ubciomove triggers page not dirty assertion



>Number:         55300
>Category:       kern
>Synopsis:       ubciomove triggers page not dirty assertion
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon May 25 12:30:00 +0000 2020
>Originator:     Martin Husemann
>Release:        NetBSD 9.99.64
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD thirdstage.duskware.de 9.99.64 NetBSD 9.99.64 (MODULAR) #343: Mon May 25 13:22:20 CEST 2020 martin%thirdstage.duskware.de@localhost:/usr/src/sys/arch/sparc64/compile/MODULAR sparc64
Architecture: sparc64
Machine: sparc64
>Description:

Running atf tests with /tmp mounted as a tmpfs the machine crashes after
a short while:

[ 1678.3843402] panic: kernel diagnostic assertion "uvm_pagegetdirty(pg) == UVM_PAGE_STATUS_DIRTY" failed: file "../../../../uvm/uvm_bio.c", line 673 page 0x100adfdd0 not dirty

Backtrace is:

vpanic(19d5a10, 1e1a9b768, 1cc0c00, 1cc2000, 104, 1cc1ec0) at netbsd:vpanic+0x1c0
kern_assert(19d5a10, 1953de8, 19d59e0, 19d5808, 2a1, 100adfdd0) at netbsd:kern_assert+0x34
ubc_release(2000, 1e1a9b898, 1e1a9b890, 2, 1042f8480, 100adfdd0) at netbsd:ubc_release+0x4f4
ubc_uiomove(109bdca00, 1e1a9bc00, 2800, 0, 6, 0) at netbsd:ubc_uiomove+0x118
tmpfs_write(0, 0, 0, 104e66f40, 108dd6d40, 1e1a9bc00) at tmpfs:tmpfs_write+0x1a8
VOP_WRITE(108dd6d40, 1e1a9bc00, 10, 1037599c0, 1c73000, 10f87cd00) at netbsd:VOP_WRITE+0x34
vn_write(0, 105344780, 1e1a9bc00, 1037599c0, 1, 10) at netbsd:vn_write+0xf0
dofilewrite(16, 105344780, 4749879c, 2800, 105344780, 1) at netbsd:dofilewrite+0x5c
sys_write(9, 1e1a9bde0, 1e1a9bdd0, 19ea400, 4, 4) at netbsd:sys_write+0x44
syscall(1e1a9bed0, 1e1a9bf58, 457644e0, 3, 2, 10f87cd00) at netbsd:syscall+0x40c


db{0}> show page 0x100adfdd0
PAGE 0x100adfdd0:
  flags=0x604<BUSY,TABLED,AOBJ>
  pqflags=0xc<INTENT_SET,INTENT_QUEUED>
  uobject=0x109bdca00, uanon=0x0, offset=0x2000
  loan_count=0 wire_count=0 bucket=1 freelist=0
  pa=0x3527c000
  [page ownership tracking disabled]



>How-To-Repeat:
s/a

>Fix:
n/a



Home | Main Index | Thread Index | Old Index