From owner-freebsd-current@freebsd.org Mon Apr 16 10:38:03 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 51668F9DAFE for ; Mon, 16 Apr 2018 10:38:03 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id CDEA57DAFF for ; Mon, 16 Apr 2018 10:38:02 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (220-253-154-11.dyn.iinet.net.au [220.253.154.11]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id w3GAbwSx019874 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Mon, 16 Apr 2018 03:38:01 -0700 (PDT) (envelope-from julian@freebsd.org) To: freebsd-current From: Julian Elischer Subject: anyone running with ngroups increased from 16? Message-ID: Date: Mon, 16 Apr 2018 18:37:53 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 10:38:03 -0000 Windows users seem to have an almost unlimited number of groups and soem places seem to use them a LOT. This gives Posix systems problems with deciding how to handle them all. Especially when getting user credentials from winbindd (samba). Does anyone know of any work done to either bypass this limit or to at least expand it? Thanks Julian From owner-freebsd-current@freebsd.org Mon Apr 16 10:58:24 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 32935F9F29D; Mon, 16 Apr 2018 10:58:24 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B974082C0C; Mon, 16 Apr 2018 10:58:23 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f81Lq-000NYe-KY ; Mon, 16 Apr 2018 13:27:10 +0300 Date: Mon, 16 Apr 2018 13:27:10 +0300 From: Vitalij Satanivskij To: hackers@freebsd.org, freebsd-current@freebsd.org Subject: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180416102710.GA90028@hell.ukr.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 10:58:24 -0000 Hello. We have a kernel panic when loading current or 11.1 snapshot As while booting from usb steck or from hdd/ssd with installed system Kernel - GENERIC DUMP can be found here http://hell.ukr.net/panic/panic.jpg or even video record from screen http://hell.ukr.net/panic/recorder.webm Hardware is - 2x AMD EPYC 7251 Processor on Supermicro H11DSI mother board. Only way to boot system is - disable HPET in bios and set hw.pci.enable_msix=0 hw.pci.enable_msi=0 We already try different's loader.conf setting like machdep.disable_msix_migration=1 hint.hpet.0.clock=0 hint.hpet.0.per_cpu=0 #hw.pci.enable_msix=0 #hw.pci.enable_msi=0 #dev.igb.1.iflib.disable_msix=1 #dev.igb.0.iflib.disable_msix=1 #machdep.disable_msix_migration = 1 #hw.pci.msix_rewrite_table=1 #hw.pci.honor_msi_blacklist=0 In differents combination with no success. Any suggestion we can try to test? ANy additional information from ower side? Thank you. From owner-freebsd-current@freebsd.org Mon Apr 16 10:58:59 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DBF87F9F36C for ; Mon, 16 Apr 2018 10:58:58 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 7D9AA83193 for ; Mon, 16 Apr 2018 10:58:58 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (220-253-154-11.dyn.iinet.net.au [220.253.154.11]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id w3GAwqwN019958 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 16 Apr 2018 03:58:55 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: Module compiles looking in /usr/src when alternate src tree is in use To: "Rodney W. Grimes" , "Simon J. Gerraty" Cc: freebsd-current@freebsd.org References: <201804110029.w3B0TPUf025467@pdx.rh.CN85.dnsmgr.net> From: Julian Elischer Message-ID: <0c3bc880-625d-030a-392c-935d46ec9c96@freebsd.org> Date: Mon, 16 Apr 2018 18:58:47 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <201804110029.w3B0TPUf025467@pdx.rh.CN85.dnsmgr.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 10:58:59 -0000 On 11/4/18 8:29 am, Rodney W. Grimes wrote: >> Rodney W. Grimes wrote: >> >>> I am having a compile time issue for a patched that compiled fine on my >>> r329294 system, but now failes to compile with what looks like a wrong >>> header being included. >> You may find it helpful to do something like: >> >> make -dv -C sys/modules/vmm -V CFLAGS > /tmp/dvo 2>&1 >> egrep ':.PARSE|/usr/src/sys' /tmp/dvo | grep -B1 usr/src | more >> >> The arg to -V doesn't matter btw. >> You could narrow that down if you know what var -I/usr/src/sys is in >> (probably CFLAGS but you never know) >> the above should help find the makefile that is introducing the bogus -I >> > Thank you, that does help narrow it down: (I backed up a vew lines > from the first place I saw src/.) > > ... > Global:.PARSEFILE = bsd.kmod.mk > Global:.PARSEDIR = /usr/src-topo/share/mk > Global:.PARSEFILE = bsd.kmod.mk > Result[] of :U is "/usr/src/sys" > Result[] of :U is "/usr/src/sys" > Global:SYSDIR = ${:U/usr/src/sys:tA} > Global:.PARSEDIR = /usr/src-topo/share/mk > Global:.PARSEFILE = bsd.kmod.mk > Result[] of :U is "/usr/src/sys" > Applying[] :t to "/usr/src/sys" > Result[] of :t is "/usr/src/sys" > Result[] of :U is "/usr/src/sys" > Applying[] :t to "/usr/src/sys" > Result[] of :t is "/usr/src/sys" > Result[] of :U is "/usr/src/sys" > Applying[] :t to "/usr/src/sys" > Result[] of :t is "/usr/src/sys" > Global:.MAKE.MAKEFILES = /usr/src-topo/share/mk/sys.mk /usr/src-topo/share/mk/local.sys.env.mk /usr/src-topo/share/mk/src.sys.env.mk /usr/src-topo/share/mk/bsd.mkopt.m > k /usr/src-topo/share/mk/src.sys.obj.mk /usr/src-topo/share/mk/auto.obj.mk /usr/src-topo/share/mk/bsd.suffixes.mk /usr/src-topo/share/mk/local.sys.mk /usr/src-topo/sha > re/mk/src.sys.mk /usr/src-topo/sys/modules/vmm/Makefile /usr/src-topo/share/mk/bsd.kmod.mk /usr/src/sys/conf/kmod.mk > ^^^^^^^^^^^^^^^^^^^^^^^^^ > Thats gona bust something some day.... > > Global:.PARSEDIR = /usr/src/sys/conf > Global:.PARSEFILE = kmod.mk > Global:.INCLUDEDFROMDIR = /usr/src/sys/conf > Oh my! Uggggg > > > So something in bsd.kmod.mk is going very wrong... it looks like it > starts to pull all sorts of stuff from /usr/src/sys! I seem to remember that there is code in the Makefiles that looks for the sys directory. I believe it can be directed to use a directory but in its absence it looks at some well known locations, which would probably fail if there is already a DIFFERENT tree in /usr/src. > >>> I have wrapped the long line so I can point to a difference between >>> r329294 and r332262 make log of this file. >>> >>> r329294 make output: >>> >>> cc -O2 -pipe -DVMM_KEEP_STATS -DSMP -fno-strict-aliasing -Werror -D_KERNEL \ >>> -DKLD_MODULE -nostdinc -I/usr/src-topo/sys/amd64/vmm \ >>> -I/usr/src-topo/sys/amd64/vmm/io -I/usr/src-topo/sys/amd64/vmm/intel \ >>> -I/usr/src-topo/sys/amd64/vmm/amd -I. -I/usr/src-topo/sys -fno-common \ >>> ^^^^^^^^^^^^^^^^^ this is what I would expect >> From owner-freebsd-current@freebsd.org Mon Apr 16 11:26:15 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA9B8FA1556 for ; Mon, 16 Apr 2018 11:26:15 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 5BE1D8A89E for ; Mon, 16 Apr 2018 11:26:15 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (220-253-154-11.dyn.iinet.net.au [220.253.154.11]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id w3GBQBAr020109 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Mon, 16 Apr 2018 04:26:14 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: anyone running with ngroups increased from 16? From: Julian Elischer To: freebsd-current References: Message-ID: Date: Mon, 16 Apr 2018 19:26:05 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 11:26:15 -0000 On 16/4/18 6:37 pm, Julian Elischer wrote: > Windows users seem to have an almost unlimited number of groups and > soem places seem to use them a LOT. > This gives Posix systems problems with deciding how to handle them > all. Especially when getting > user credentials from winbindd (samba). > > Does anyone know of any work done to either bypass this limit or to > at least expand it? I mean with the other applications such NFS usages etc. I know mountd explodes with > 16..  has anyone done a cleaning pass? > > Thanks > > Julian > > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to > "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-current@freebsd.org Mon Apr 16 12:12:55 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7E0EDFA53D6 for ; Mon, 16 Apr 2018 12:12:55 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670046.outbound.protection.outlook.com [40.107.67.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 059606D749; Mon, 16 Apr 2018 12:12:54 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB1394.CANPRD01.PROD.OUTLOOK.COM (52.132.68.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.675.9; Mon, 16 Apr 2018 12:12:53 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0675.015; Mon, 16 Apr 2018 12:12:53 +0000 From: Rick Macklem To: Julian Elischer , freebsd-current Subject: Re: anyone running with ngroups increased from 16? Thread-Topic: anyone running with ngroups increased from 16? Thread-Index: AQHT1W8IiHlm+FVR3U6/Xy7rruXn76QDQIyAgAALMJw= Date: Mon, 16 Apr 2018 12:12:53 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca; x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB1394; 7:5qNuFX8W+CG0WIRVTMFCsAJcj2pduT2j+CX06eyY4AS0eR6adnE0FSrz4cV9a4kfY6wsU6xEelM5Wef+frQTk7CGvaTi8sz75w5bHCtCD4gSdoAdGxGC/RfvlSZimYudp+0YvB1WDpGcjYwwCTh5TjT/pLfRFohxb7gTLOfSFAu9BaxWHv6Gvqk3mba9KSOYGKl45D9Ynnh6mOXRTRS398c+KwHNL7aPfPuAwOH/ksVz3FckKNqQEG6Cr8rzjBjI x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB1394; x-ms-traffictypediagnostic: YQBPR0101MB1394: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863)(278428928389397); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231232)(944501327)(52105095)(93006095)(93001095)(3002001)(6041310)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:YQBPR0101MB1394; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB1394; x-forefront-prvs: 0644578634 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(366004)(396003)(39380400002)(39860400002)(189003)(199004)(476003)(3660700001)(8936002)(106356001)(5660300001)(25786009)(11346002)(446003)(110136005)(6506007)(74316002)(305945005)(86362001)(76176011)(229853002)(2906002)(33656002)(26005)(97736004)(7696005)(186003)(99286004)(105586002)(59450400001)(102836004)(3280700002)(74482002)(786003)(316002)(55016002)(68736007)(5250100002)(14454004)(486006)(81156014)(81166006)(53936002)(8676002)(478600001)(2900100001)(6246003)(450100002)(9686003)(6436002); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB1394; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-microsoft-antispam-message-info: 74ztLP34fnNC1eEVc9EDM7U+c81w/U+MLaesb58ReLdimM7RiXqPsoBQ98zvkWzQDO0tEZubWcSyfNxZO6xBjPKmehCqiMFOBq1z/rNJsfpj+HJ4R+jBApWyT5eMiyIHKUfXqom7klmj/oyTQk8J6PeBnyabr2pKD0FOVazyw6vKB5bTPxBA1xZPMKw1lJGJ spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 3bafdf96-0626-404f-ccc6-08d5a39361bd X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 3bafdf96-0626-404f-ccc6-08d5a39361bd X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2018 12:12:53.7829 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB1394 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 12:12:55 -0000 Julian Elischer wrote: >On 16/4/18 6:37 pm, Julian Elischer wrote: >> Windows users seem to have an almost unlimited number of groups and >> soem places seem to use them a LOT. >> This gives Posix systems problems with deciding how to handle them >> all. Especially when getting >> user credentials from winbindd (samba). >> >> Does anyone know of any work done to either bypass this limit or to >> at least expand it? > >I mean with the other applications such NFS usages etc. >I know mountd explodes with > 16.. has anyone done a cleaning pass? 16 is the limit "on-the-wire" per RFCs for Sun RPC. You can use nfsuserd --manage-gids (see "man nfsuserd") on the NFS server so that the daemon uses the group list for the uid in the= RPC instead of the list of groups (limited to 16) in the RPC header. Works= fine so long as the server knows the same group list for a uid as the client(s) do. And, yes, this applies to NFSv3 as well as NFSv4. rick From owner-freebsd-current@freebsd.org Mon Apr 16 12:20:22 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CF2C4FA5AF0 for ; Mon, 16 Apr 2018 12:20:21 +0000 (UTC) (envelope-from tsoome@me.com) Received: from st13p35im-asmtp001.me.com (st13p35im-asmtp001.me.com [17.164.199.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7C0886E36E; Mon, 16 Apr 2018 12:20:21 +0000 (UTC) (envelope-from tsoome@me.com) Received: from process-dkim-sign-daemon.st13p35im-asmtp001.me.com by st13p35im-asmtp001.me.com (Oracle Communications Messaging Server 8.0.1.2.20170607 64bit (built Jun 7 2017)) id <0P7A00C00248XD00@st13p35im-asmtp001.me.com>; Mon, 16 Apr 2018 12:19:58 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=me.com; s=04042017; t=1523881198; bh=oUSRkIDHXFNYWEbdh8bVqq730vDYJ3EawxLtEGKKqsA=; h=Content-type:MIME-version:Subject:From:Date:Message-id:To; b=PvFizmVp67pAedT29Kj+hxfh/DpRDQft8XIxNIOB/oo62E39ljUdi7O0QCqerYKPG tX3pWnCK4+JHo0CeSuYNxCNvwdYfUlDHP9mHKF/249p7EK7lBkKrMZoaHgcJPHx8kr vJVKifQw45pG873sQkglmfPG6O/h8yvTYY1D1D+zN2b3DSOvoZ1w0PIA5Eby+J/1Zd XRs/sYeGhplA2dZKT0o79n/khgQIWzSszBBIdVy5O08h/pjtREfgewEIeKiyc1S6IP qrAtFA9onjKmvStxINu+dAZzpM3B+tLq8B2GACIfmguywN9FZI4/jxCv/RS/4VyNXD FJ6VGnd4j3e0Q== Received: from icloud.com ([127.0.0.1]) by st13p35im-asmtp001.me.com (Oracle Communications Messaging Server 8.0.1.2.20170607 64bit (built Jun 7 2017)) with ESMTPSA id <0P7A00GRS295DJ10@st13p35im-asmtp001.me.com>; Mon, 16 Apr 2018 12:19:56 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-04-16_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1011 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1804160118 Content-type: text/plain; charset=us-ascii MIME-version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\)) Subject: Re: anyone running with ngroups increased from 16? From: Toomas Soome In-reply-to: Date: Mon, 16 Apr 2018 15:19:53 +0300 Cc: Julian Elischer , freebsd-current Content-transfer-encoding: quoted-printable Message-id: <458372AF-081B-4508-910A-BCB46EB5D955@me.com> References: To: Rick Macklem X-Mailer: Apple Mail (2.3445.6.18) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 12:20:22 -0000 > On 16 Apr 2018, at 15:12, Rick Macklem wrote: >=20 > Julian Elischer wrote: >> On 16/4/18 6:37 pm, Julian Elischer wrote: >>> Windows users seem to have an almost unlimited number of groups and >>> soem places seem to use them a LOT. >>> This gives Posix systems problems with deciding how to handle them >>> all. Especially when getting >>> user credentials from winbindd (samba). >>>=20 >>> Does anyone know of any work done to either bypass this limit or to >>> at least expand it? >>=20 >> I mean with the other applications such NFS usages etc. >> I know mountd explodes with > 16.. has anyone done a cleaning pass? > 16 is the limit "on-the-wire" per RFCs for Sun RPC. You can use > nfsuserd --manage-gids (see "man nfsuserd") > on the NFS server so that the daemon uses the group list for the uid = in the RPC instead of the list of groups (limited to 16) in the RPC = header. Works fine so > long as the server knows the same group list for a uid as the = client(s) do. >=20 > And, yes, this applies to NFSv3 as well as NFSv4. >=20 it is not entirely exact. The number of supplemental groups is the limit = of AUTH_SYS (aka AUTH_UNIX) authentication mechanism used by ONC+ RPC. = So anything using/supporting this auth mechanism, has this limit too. Therefore, on paper, there is 2 possible ways to overcome the issue - = either use alternate authentication mechanism (such as AUTH_GSS), or = implement workaround for AUTH_SYS. rgds, toomas= From owner-freebsd-current@freebsd.org Mon Apr 16 15:49:11 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 08FCEF8D4AD for ; Mon, 16 Apr 2018 15:49:11 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A501187986; Mon, 16 Apr 2018 15:49:10 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 05F975A9F13; Mon, 16 Apr 2018 15:49:04 +0000 (UTC) Date: Mon, 16 Apr 2018 15:49:03 +0000 From: Brooks Davis To: Julian Elischer Cc: freebsd-current Subject: Re: anyone running with ngroups increased from 16? Message-ID: <20180416154903.GA44509@spindle.one-eyed-alien.net> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="XsQoSWH+UP9D9v3l" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 15:49:11 -0000 --XsQoSWH+UP9D9v3l Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Apr 16, 2018 at 06:37:53PM +0800, Julian Elischer wrote: > Windows users seem to have an almost unlimited number of groups and=20 > soem places seem to use them a LOT. > This gives Posix systems problems with deciding how to handle them=20 > all. Especially when getting > user credentials from winbindd (samba). >=20 > Does anyone know of any work done to either bypass this limit or to at=20 > least expand it? I fixed this in 2009 for everything but NFS AUTH_SYS. NGROUPS_MAX is 1023. IIRC the usual hack employed in storage systems is to ignore the groups provided by AUTH_SYS and get them from winbindd. I don't know of a public implementation of that. -- Brooks --XsQoSWH+UP9D9v3l Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJa1MXvAAoJEKzQXbSebgfAfMUH/3cAgVc4K+wYwqEszvbvbGrG V8WO8LCot3nwFMnVp1yfW4FpXf6Vsli4rTJIzQW9fuCgwAXHj5aiCDi8dp3HFLIK U7zlUrsMenNgPPdU/3yPlDAUo4Mmnh6qW5Vp4dsv8jnzoDRv0xeKXh4UffLi5+Rc gKjhPqeno+aG9aUiDUCFkkO/7bUG61qh5DWiwZFtuFyPzqUWm259OWvoxQoufgeE 6gFj5QOafFmN/xkrD2n0eMIcaX1VOpLG0vMGwxYoF+ZKSkbvvlByw1TjD0EV4/rm V8J/rvcU/ix6eIwdGUoJSknfmFeI1FynyIRUmiY6tBLOcRxT8k9qb+ze5Dw/dxM= =A7Eg -----END PGP SIGNATURE----- --XsQoSWH+UP9D9v3l-- From owner-freebsd-current@freebsd.org Mon Apr 16 17:27:45 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6AE1CF961BB; Mon, 16 Apr 2018 17:27:45 +0000 (UTC) (envelope-from cse.cem@gmail.com) Received: from mail-it0-f45.google.com (mail-it0-f45.google.com [209.85.214.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0779A80513; Mon, 16 Apr 2018 17:27:44 +0000 (UTC) (envelope-from cse.cem@gmail.com) Received: by mail-it0-f45.google.com with SMTP id 19-v6so12584191itw.3; Mon, 16 Apr 2018 10:27:44 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:in-reply-to:references :from:date:message-id:subject:to:cc; bh=DQobMNZ1/DTswlhV1dEpXO8nk3Cdsx15VOKeuC2zI2M=; b=TAOwCqBGvSVBkj8WocuyOy4Yg61hwS0aGv/NW5BaaHMWZmtxbLmSXPvZ8XOEU5UeCZ NIIgNOYzmO/ol5owpuiFyQvtg5+0wvBZ22k4yc1ObcTy5cSSV5ZxONJnCbir45Nrrnl/ 39399MT3gLANLbj7mBeD2ToYLzDuq1qlROJMPyN7gOqGhS+mKu8p/ihO1p848KAjqOGY 9Yp1Jn8D4voxiJYM6HGh8W9C5z6xnvA3pnPiNls+jMOleY7b6N2mmzzzrcmCzcGH+EWM KaJiX9iPdIFjm9t4jzuUt9nzqmJiesp0G0oxlDXJ4HI2ms1E/+4hCMnxddC3FxzBfxDL 1Z/Q== X-Gm-Message-State: ALQs6tD1cmqhFDJASa6auWDQm0PCgZeogWH6s0tSXTA84M5aF/I3I+rw oYLwf+AFs6l6TvY+5hXhJ5/lphxM X-Google-Smtp-Source: AIpwx49HvFnrmWT1Qf4lB99YqdlIpf/8e29XglcbpNK0u2F8g/O4eD66jZTYSaCfTyfMcjYZs+I6Jw== X-Received: by 2002:a24:5f45:: with SMTP id r66-v6mr16269890itb.126.1523899657945; Mon, 16 Apr 2018 10:27:37 -0700 (PDT) Received: from mail-io0-f171.google.com (mail-io0-f171.google.com. [209.85.223.171]) by smtp.gmail.com with ESMTPSA id j197sm1926459ioj.45.2018.04.16.10.27.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 16 Apr 2018 10:27:37 -0700 (PDT) Received: by mail-io0-f171.google.com with SMTP id a7so3109842ioc.12; Mon, 16 Apr 2018 10:27:37 -0700 (PDT) X-Received: by 10.107.69.23 with SMTP id s23mr19655812ioa.173.1523899657130; Mon, 16 Apr 2018 10:27:37 -0700 (PDT) MIME-Version: 1.0 Reply-To: cem@freebsd.org Received: by 10.2.34.77 with HTTP; Mon, 16 Apr 2018 10:27:36 -0700 (PDT) In-Reply-To: <20180416102710.GA90028@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> From: Conrad Meyer Date: Mon, 16 Apr 2018 10:27:36 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) To: Vitalij Satanivskij Cc: "freebsd-hackers@freebsd.org" , freebsd-current , Stephen Hurd , Sean Bruno , Matthew Macy Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 17:27:45 -0000 Hi Vitalij, On Mon, Apr 16, 2018 at 3:27 AM, Vitalij Satanivskij wrote: > DUMP can be found here http://hell.ukr.net/panic/panic.jpg > or even video record from screen http://hell.ukr.net/panic/recorder.webm Looks like the panic message is printed directly after: "igb0: using 2 rx queues 2 tx queues" (iflib_msix_init(), called by iflib_device_register()). And stack is indeed coming from iflib in probe (0:17 in linked video): panic() nexus_add_irq() msix_alloc() pci_alloc_msix_method() iflib_device_register() iflib_device_attach() device_attach() ... Stephen, Matt, or Sean might be able to help diagnose further. Best, Conrad From owner-freebsd-current@freebsd.org Mon Apr 16 19:12:17 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3C4DCF9DE93; Mon, 16 Apr 2018 19:12:17 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C8B3F6FB6C; Mon, 16 Apr 2018 19:12:16 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f89Xx-000DyA-9E ; Mon, 16 Apr 2018 22:12:13 +0300 Date: Mon, 16 Apr 2018 22:12:13 +0300 From: Vitalij Satanivskij To: Stephen Hurd Cc: cem@freebsd.org, Vitalij Satanivskij , "freebsd-hackers@freebsd.org" , freebsd-current , Stephen Hurd , Sean Bruno , Matthew Macy Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180416191213.GA53406@hell.ukr.net> Reply-To: satan@ukr.net References: <20180416102710.GA90028@hell.ukr.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 19:12:17 -0000 igb0@pci0:1:0:0: class=0x020000 card=0x152115d9 chip=0x15218086 rev=0x01 hdr=0x00 vendor = 'Intel Corporation' device = 'I350 Gigabit Network Connection' class = network subclass = ethernet cap 01[40] = powerspec 3 supports D0 D3 current D0 cap 05[50] = MSI supports 1 message, 64 bit, vector masks cap 11[70] = MSI-X supports 10 messages Table in map 0x1c[0x0], PBA in map 0x1c[0x2000] cap 10[a0] = PCI-Express 2 endpoint max data 512(512) FLR RO NS link x4(x4) speed 5.0(5.0) ASPM L1(L0s/L1) ecap 0001[100] = AER 2 0 fatal 0 non-fatal 1 corrected ecap 0003[140] = Serial 1 ac1f6bffff620e0c ecap 000e[150] = ARI 1 ecap 0010[160] = SR-IOV 1 IOV disabled, Memory Space disabled, ARI disabled 0 VFs configured out of 8 supported First VF RID Offset 0x0180, VF RID Stride 0x0004 VF Device ID 0x1520 Page Sizes: 4096 (enabled), 8192, 65536, 262144, 1048576, 4194304 ecap 0017[1a0] = TPH Requester 1 ecap 0018[1c0] = LTR 1 ecap 000d[1d0] = ACS 1 It's info from system booted with HPET disabled and hw.pci.enable_msix: 0 hw.pci.enable_msi: 0 If one of this parameters not set as described system not boot ^( Stephen Hurd wrote: SH> Hrm, it should be trying to allocate three msi-x vectors there, and it SH> appears that it's reported that 10 are available. What's the output of SH> ``pciconf -lcv pci1:0:0''? SH> SH> On Mon, Apr 16, 2018 at 1:27 PM, Conrad Meyer wrote: SH> SH> > Hi Vitalij, SH> > SH> > On Mon, Apr 16, 2018 at 3:27 AM, Vitalij Satanivskij SH> > wrote: SH> > > DUMP can be found here http://hell.ukr.net/panic/panic.jpg SH> > > or even video record from screen http://hell.ukr.net/panic/recorder.webm SH> > SH> > Looks like the panic message is printed directly after: "igb0: using 2 SH> > rx queues 2 tx queues" (iflib_msix_init(), called by SH> > iflib_device_register()). SH> > SH> > And stack is indeed coming from iflib in probe (0:17 in linked video): SH> > SH> > panic() SH> > nexus_add_irq() SH> > msix_alloc() SH> > pci_alloc_msix_method() SH> > iflib_device_register() SH> > iflib_device_attach() SH> > device_attach() SH> > ... SH> > SH> > Stephen, Matt, or Sean might be able to help diagnose further. SH> > SH> > Best, SH> > Conrad SH> > SH> SH> SH> SH> -- SH> [image: Limelight Networks] SH> Stephen Hurd* Principal Engineer* SH> EXPERIENCE FIRST. SH> +1 616 848 0643 <+1+616+848+0643> SH> www.limelight.com SH> [image: Facebook] [image: SH> LinkedIn] [image: SH> Twitter] From owner-freebsd-current@freebsd.org Mon Apr 16 19:51:32 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 18616FA0CAE; Mon, 16 Apr 2018 19:51:32 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9C09E73EB4; Mon, 16 Apr 2018 19:51:31 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f8A9w-000E2O-Pd ; Mon, 16 Apr 2018 22:51:28 +0300 Date: Mon, 16 Apr 2018 22:51:28 +0300 From: Vitalij Satanivskij To: Stephen Hurd Cc: cem@freebsd.org, Vitalij Satanivskij , "freebsd-hackers@freebsd.org" , freebsd-current , Stephen Hurd , Sean Bruno , Matthew Macy Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180416195128.GA53754@hell.ukr.net> Reply-To: satan@ukr.net References: <20180416102710.GA90028@hell.ukr.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 19:51:32 -0000 Dear Stephen I'm disable msix on igb both 1 and 0 and enable HPET in bios get hpet_attach panic. http://hell.ukr.net/panic/recorder_hpet.webm so i disable hpet again and get msi_alloc and so on http://hell.ukr.net/panic/recorder_msi.webm So for test I'm set hw.pci.enable_msi=0 and get panic in cpp_hw_attach wich autoloaded later wile system run rc scripts panic here - http://hell.ukr.net/panic/recorder_ccp.webm For me it's look like some kind of resource menegment problem? Stephen Hurd wrote: SH> If you disable msix just for igb0, does it crash somewhere else? SH> SH> On Mon, Apr 16, 2018 at 3:13 PM, Stephen Hurd wrote: SH> SH> > Oh, you may need to disable msix to boot... SH> > SH> > dev.igb.0.iflib.disable_msix=1 SH> > SH> > On Mon, Apr 16, 2018 at 3:02 PM, Stephen Hurd wrote: SH> > SH> >> Hrm, it should be trying to allocate three msi-x vectors there, and it SH> >> appears that it's reported that 10 are available. What's the output of SH> >> ``pciconf -lcv pci1:0:0''? SH> >> SH> >> On Mon, Apr 16, 2018 at 1:27 PM, Conrad Meyer wrote: SH> >> SH> >>> Hi Vitalij, SH> >>> SH> >>> On Mon, Apr 16, 2018 at 3:27 AM, Vitalij Satanivskij SH> >>> wrote: SH> >>> > DUMP can be found here http://hell.ukr.net/panic/panic.jpg SH> >>> > or even video record from screen http://hell.ukr.net/panic/reco SH> >>> rder.webm SH> >>> SH> >>> Looks like the panic message is printed directly after: "igb0: using 2 SH> >>> rx queues 2 tx queues" (iflib_msix_init(), called by SH> >>> iflib_device_register()). SH> >>> SH> >>> And stack is indeed coming from iflib in probe (0:17 in linked video): SH> >>> SH> >>> panic() SH> >>> nexus_add_irq() SH> >>> msix_alloc() SH> >>> pci_alloc_msix_method() SH> >>> iflib_device_register() SH> >>> iflib_device_attach() SH> >>> device_attach() SH> >>> ... SH> >>> SH> >>> Stephen, Matt, or Sean might be able to help diagnose further. SH> >>> SH> >>> Best, SH> >>> Conrad SH> >>> SH> >> SH> >> SH> >> SH> >> -- SH> >> [image: Limelight Networks] SH> >> Stephen Hurd* Principal Engineer* SH> >> EXPERIENCE FIRST. SH> >> +1 616 848 0643 <+1+616+848+0643> SH> >> www.limelight.com SH> >> [image: Facebook] [image: SH> >> LinkedIn] [image: SH> >> Twitter] SH> >> SH> > SH> > SH> > SH> > -- SH> > [image: Limelight Networks] SH> > Stephen Hurd* Principal Engineer* SH> > EXPERIENCE FIRST. SH> > +1 616 848 0643 <+1+616+848+0643> SH> > www.limelight.com SH> > [image: Facebook] [image: SH> > LinkedIn] [image: SH> > Twitter] SH> > SH> SH> SH> SH> -- SH> [image: Limelight Networks] SH> Stephen Hurd* Principal Engineer* SH> EXPERIENCE FIRST. SH> +1 616 848 0643 <+1+616+848+0643> SH> www.limelight.com SH> [image: Facebook] [image: SH> LinkedIn] [image: SH> Twitter] From owner-freebsd-current@freebsd.org Mon Apr 16 20:26:47 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2AEA6FA3144; Mon, 16 Apr 2018 20:26:47 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B201779D33; Mon, 16 Apr 2018 20:26:46 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f8Ai3-000E76-8W ; Mon, 16 Apr 2018 23:26:43 +0300 Date: Mon, 16 Apr 2018 23:26:43 +0300 From: Vitalij Satanivskij To: Stephen Hurd Cc: Vitalij Satanivskij , cem@freebsd.org, "freebsd-hackers@freebsd.org" , freebsd-current , Stephen Hurd , Sean Bruno , Matthew Macy Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180416202643.GA54226@hell.ukr.net> Reply-To: satan@ukr.net References: <20180416102710.GA90028@hell.ukr.net> <20180416195128.GA53754@hell.ukr.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2018 20:26:47 -0000 Oh bios. It's already lastest bios for now with agesa 1.0.0.5 in it. It's dated 2/14/2018 So most likely new version will not appear soon Stephen Hurd wrote: SH> Yeah, this looks like some sort of general MSI issue, not igb specific. SH> I'm not familiar with that part of the kernel, but maybe check if there's a SH> BIOS update available? SH> SH> On Mon, Apr 16, 2018 at 3:51 PM, Vitalij Satanivskij wrote: SH> SH> > Dear Stephen SH> > SH> > I'm disable msix on igb both 1 and 0 SH> > and enable HPET in bios SH> > SH> > get hpet_attach panic. http://hell.ukr.net/panic/recorder_hpet.webm SH> > so i disable hpet again and get msi_alloc and so on SH> > http://hell.ukr.net/panic/recorder_msi.webm SH> > SH> > So for test I'm set hw.pci.enable_msi=0 and get panic in cpp_hw_attach SH> > wich autoloaded later wile system run rc scripts SH> > SH> > panic here - http://hell.ukr.net/panic/recorder_ccp.webm SH> > SH> > For me it's look like some kind of resource menegment problem? SH> > SH> > SH> > Stephen Hurd wrote: SH> > SH> If you disable msix just for igb0, does it crash somewhere else? SH> > SH> SH> > SH> On Mon, Apr 16, 2018 at 3:13 PM, Stephen Hurd wrote: SH> > SH> SH> > SH> > Oh, you may need to disable msix to boot... SH> > SH> > SH> > SH> > dev.igb.0.iflib.disable_msix=1 SH> > SH> > SH> > SH> > On Mon, Apr 16, 2018 at 3:02 PM, Stephen Hurd SH> > wrote: SH> > SH> > SH> > SH> >> Hrm, it should be trying to allocate three msi-x vectors there, and SH> > it SH> > SH> >> appears that it's reported that 10 are available. What's the SH> > output of SH> > SH> >> ``pciconf -lcv pci1:0:0''? SH> > SH> >> SH> > SH> >> On Mon, Apr 16, 2018 at 1:27 PM, Conrad Meyer SH> > wrote: SH> > SH> >> SH> > SH> >>> Hi Vitalij, SH> > SH> >>> SH> > SH> >>> On Mon, Apr 16, 2018 at 3:27 AM, Vitalij Satanivskij < SH> > satan@ukr.net> SH> > SH> >>> wrote: SH> > SH> >>> > DUMP can be found here http://hell.ukr.net/panic/panic.jpg SH> > SH> >>> > or even video record from screen http://hell.ukr.net/panic/reco SH> > SH> >>> rder.webm SH> > SH> >>> SH> > SH> >>> Looks like the panic message is printed directly after: "igb0: SH> > using 2 SH> > SH> >>> rx queues 2 tx queues" (iflib_msix_init(), called by SH> > SH> >>> iflib_device_register()). SH> > SH> >>> SH> > SH> >>> And stack is indeed coming from iflib in probe (0:17 in linked SH> > video): SH> > SH> >>> SH> > SH> >>> panic() SH> > SH> >>> nexus_add_irq() SH> > SH> >>> msix_alloc() SH> > SH> >>> pci_alloc_msix_method() SH> > SH> >>> iflib_device_register() SH> > SH> >>> iflib_device_attach() SH> > SH> >>> device_attach() SH> > SH> >>> ... SH> > SH> >>> SH> > SH> >>> Stephen, Matt, or Sean might be able to help diagnose further. SH> > SH> >>> SH> > SH> >>> Best, SH> > SH> >>> Conrad SH> > SH> >>> SH> > SH> >> SH> > SH> >> SH> > SH> >> SH> > SH> >> -- SH> > SH> >> [image: Limelight Networks] SH> > SH> >> Stephen Hurd* Principal Engineer* SH> > SH> >> EXPERIENCE FIRST. SH> > SH> >> +1 616 848 0643 <+1+616+848+0643> SH> > SH> >> www.limelight.com SH> > SH> >> [image: Facebook] > >[image: SH> > SH> >> LinkedIn] [ SH> > image: SH> > SH> >> Twitter] SH> > SH> >> SH> > SH> > SH> > SH> > SH> > SH> > SH> > SH> > -- SH> > SH> > [image: Limelight Networks] SH> > SH> > Stephen Hurd* Principal Engineer* SH> > SH> > EXPERIENCE FIRST. SH> > SH> > +1 616 848 0643 <+1+616+848+0643> SH> > SH> > www.limelight.com SH> > SH> > [image: Facebook] > >[image: SH> > SH> > LinkedIn] [ SH> > image: SH> > SH> > Twitter] SH> > SH> > SH> > SH> SH> > SH> SH> > SH> SH> > SH> -- SH> > SH> [image: Limelight Networks] SH> > SH> Stephen Hurd* Principal Engineer* SH> > SH> EXPERIENCE FIRST. SH> > SH> +1 616 848 0643 <+1+616+848+0643> SH> > SH> www.limelight.com SH> > SH> [image: Facebook] [image: SH> > SH> LinkedIn] [image: SH> > SH> Twitter] SH> > SH> SH> SH> SH> -- SH> [image: Limelight Networks] SH> Stephen Hurd* Principal Engineer* SH> EXPERIENCE FIRST. SH> +1 616 848 0643 <+1+616+848+0643> SH> www.limelight.com SH> [image: Facebook] [image: SH> LinkedIn] [image: SH> Twitter] From owner-freebsd-current@freebsd.org Tue Apr 17 00:11:53 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 44F73F89251 for ; Tue, 17 Apr 2018 00:11:53 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670061.outbound.protection.outlook.com [40.107.67.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C6D226C2FD; Tue, 17 Apr 2018 00:11:52 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB1203.CANPRD01.PROD.OUTLOOK.COM (52.132.67.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.675.9; Tue, 17 Apr 2018 00:11:51 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0675.015; Tue, 17 Apr 2018 00:11:51 +0000 From: Rick Macklem To: Brooks Davis CC: freebsd-current Subject: Re: anyone running with ngroups increased from 16? Thread-Topic: anyone running with ngroups increased from 16? Thread-Index: AQHT1d+xGK+ZmudNRU+L71iIIFWgpQ== Date: Tue, 17 Apr 2018 00:11:51 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca; x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB1203; 7:HZ5ym18ftum8pcjIpe0ZuaB21AJpAp8mgrjw83zlOF1ymg6Bb8sSH1xi5Og3g02IDd5ho2oQ4UsdQxIEdbipxBT4SVLynp+lI2bgYIVkNk5/mLVUXexzdw9rcR+t+jPa2zd7wYku50txYRTfWB6i+1gj9fzBKs3tgHduYfztL2Pb7H808Uyoykf5nEKIRXkc+Q4ueVvJvxuPWiCleeu2xktY817CRUvWZ/rwdjTCgqUKWW43nUKd1J+dSHJCYysV x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB1203; x-ms-traffictypediagnostic: YQBPR0101MB1203: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231232)(944501327)(52105095)(3002001)(93006095)(93001095)(10201501046)(6041310)(20161123558120)(20161123564045)(20161123562045)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:YQBPR0101MB1203; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB1203; x-forefront-prvs: 0645BEB7AA x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39380400002)(39860400002)(346002)(396003)(376002)(199004)(189003)(53936002)(7696005)(229853002)(478600001)(4326008)(305945005)(6916009)(99286004)(2900100001)(6436002)(9686003)(102836004)(450100002)(59450400001)(55016002)(5250100002)(6246003)(25786009)(786003)(316002)(26005)(6506007)(486006)(86362001)(2906002)(476003)(14454004)(106356001)(3280700002)(3660700001)(5660300001)(97736004)(81166006)(81156014)(33656002)(74316002)(105586002)(74482002)(186003)(68736007)(8936002)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB1203; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-microsoft-antispam-message-info: 8dwV/R0BjqGRaDQcHPkhrsV0SrOPIfitY8UM1ABXnhMEH+9Yn3l19RHKhhWQuAMOt5cmbI6yE8BDyDRNthkjLO1f2clZOuJwwe2Pca2jq+Ydy/uxzuk03DfgQTyWp5nQhhLYVHXG7Kxsp25UvtIh/KeaHYThLbU04YRvfTfSiCkK000SDdIRHs1EyAzBLaTt spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: b1e69a06-056d-414c-d1a8-08d5a3f7d1c8 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: b1e69a06-056d-414c-d1a8-08d5a3f7d1c8 X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Apr 2018 00:11:51.3860 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB1203 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 00:11:53 -0000 Brooks Davis wrote: >On Mon, Apr 16, 2018 at 06:37:53PM +0800, Julian Elischer wrote: >> Windows users seem to have an almost unlimited number of groups and=3D20 >> soem places seem to use them a LOT. >> This gives Posix systems problems with deciding how to handle them=3D20 >> all. Especially when getting >> user credentials from winbindd (samba). >>=3D20 >> Does anyone know of any work done to either bypass this limit or to at= =3D20 >> least expand it? > >I fixed this in 2009 for everything but NFS AUTH_SYS. NGROUPS_MAX is >1023. IIRC the usual hack employed in storage systems is to ignore the >groups provided by AUTH_SYS and get them from winbindd. I don't know of >a public implementation of that. If winbindd gets the information from LDAP, then you can get the same effec= t from "nfsuserd -manage-gids" for AUTH_SYS (or as Toomas Soome noted, the gs= sd does the same thing for Kerberized mounts). Both of these utilities use getgrouplist() on the NFS server to acquire the= list of groups for the user. As such, anything configured for the library call, = such as LDAP, will provide the list of groups. rick From owner-freebsd-current@freebsd.org Tue Apr 17 00:22:41 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A0E93F89F37 for ; Tue, 17 Apr 2018 00:22:41 +0000 (UTC) (envelope-from waw@bsdmail.com) Received: from mout.gmx.com (mout.gmx.com [74.208.4.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mail.gmx.com", Issuer "thawte SSL CA - G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2E3546E4BE for ; Tue, 17 Apr 2018 00:22:41 +0000 (UTC) (envelope-from waw@bsdmail.com) Received: from [71.255.183.99] ([71.255.183.99]) by 3c-app-mailcom-lxa08.server.lan (via HTTP); Tue, 17 Apr 2018 02:17:27 +0200 Message-ID: From: "wes wroten" To: freebsd-current@freebsd.org Subject: snapshot of april 12th wont boot at all Date: Tue, 17 Apr 2018 02:17:27 +0200 Importance: normal Sensitivity: Normal X-Priority: 3 X-Provags-ID: V03:K1:ikl+D9lMailOPhU/MS1Vapu4pjYkOLfvg9n743uz6IK PJJya0diIpYNaNHI4ZE7CH4Ywm9vHaZsVu3w+pUxpWSuWV8pWr DNT8uKgxI+9+kNPGSRVPkg3qCaGklE3I+bF0lCiuVQDiIBnedm 3uv0PRrlbxL4QZXInRGa2QOiPOS5W9ke6nXNgVz9kS50JY5rdA /ozSYjmmF2BPG5/g+YF08CFMof/EVswPvYXqOtGmYX3uGGLPNh X/EUE+GHkwvKhV4LmoAr99sWfa2lbEsyssSq+tMDYLyRHe+La0 E2ZDMw= X-UI-Out-Filterresults: notjunk:1;V01:K0:0NuSBDElQXQ=:lrFlkBab+MI44p0idU3odA Efni8YyKlFiXNqtyFXKeRa701OQSvlxKq4GoS5TEGdh+BNDPSOUonUrtmyK82UsquXKoXHSrt BZ9cY13s7F4cHwf7H/ZjkMsqOUyTH9h/rqELsscluwa9ot0s7qskVHuOw1Z+JtGeCDbmoNjbM t7fZ1SQbKbvnhq+q9G6/G49dLggA9tZ3qAqG5ut3Cm00InVe1fGepmj4tA4johJM9nVRvzR85 s3NQXF2S01LopBP3bYe86EdQggdonyqgWdWsi75GGeH/p5GFAKJ2wVhM+Wg78tuuUGHKsZ6CF kCocUIuPD8PY+/R90chvCpE167MeXrF+evsixV2+zgvKl0kMslljGXtOV+yRqXJuu2AQVPQ6q kcvUXNTQ7m+SU/p0gFY8vG4/ifac/W5HWsAC47eGFSwfP5uSkW3wBFaOeE811MzHfftkPAjiR mtprq4/HldCUNhsu6wzvysDY7W49Indng47GOEIhC6Pd+BiGgnZq6eTsTU5J3HYnXgWmvWJwE rnC9mNfHkyJQMhldhYHh52Mlw7Am5QUxp+E3ZzwPa+h MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.25 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 00:22:41 -0000 From owner-freebsd-current@freebsd.org Tue Apr 17 09:55:31 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2FDC1F95455 for ; Tue, 17 Apr 2018 09:55:31 +0000 (UTC) (envelope-from dch@skunkwerks.at) Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CC7577B3B2 for ; Tue, 17 Apr 2018 09:55:30 +0000 (UTC) (envelope-from dch@skunkwerks.at) Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id E5CCC2127A; Tue, 17 Apr 2018 05:55:29 -0400 (EDT) Received: from web2 ([10.202.2.212]) by compute7.internal (MEProxy); Tue, 17 Apr 2018 05:55:29 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=skunkwerks.at; h=content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=8wehuRVzUUvJLAyYGG9SR7s2lbNUD NOSpc0Jh9iNb7E=; b=nkgWSlT1jKCsgWqXcmTWFcSKjHNfP5tQfzKMXE4ZpnLp+ d0y2QgCZ03vYKxpBKrJgRJP2XyLpgXLICJrTBXv7VmUiNgZ/f+/ERiA2AsCBsW6I OOK7MZ+CeAAm6Bk2ccrFWuPIjHGD2fxUjDQ/JFvDtA4WwUjBM5s7MaqxPWJwDQRq eKbk6p8iukIP5By7PmjNlW5N5qgIz5+0rOT5j2o+ryydYhJHjuNpkrXY57Qh+NYC 8XJegSsEPbHpO2y+/VhJ6sTdvMtzFni3FM0UwpGM7jBnQrImzKKpXons95h4Scsl Wg1L1/Sa6DanCBorjBH8UkkgSYjrGeYq5r+EXixdQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=8wehuR VzUUvJLAyYGG9SR7s2lbNUDNOSpc0Jh9iNb7E=; b=W4kcYyzU6e8hhIizPhj4zH DiY+1E5TUn63qBZOxGbiHId5kDe0/OFDNo0pUi4Dskj4sxD8wXvBJ6/dV/Zan6WD UqMA1cbSrdhpn9bcEDOYU1e4HlGdi7rcf9M3z+MZUR/gMlb4uzUuWjlkxytOT2WJ wOxejIu+qDx9o5VuIuIUOo8b4vDGrNU/95oRLKXr1xnUsEoYw0ydb4vVlDq668HL Cv/W5X5gOtFT0drw7k9836v+xaW/mX4kk8DqUv4KCk/l93YNFpa154io3RyO1SwO VAkv7iAmWcRCGaxFfzLe6gQFRS6nsp9KqXgULP9CwzGPGchVUjYnq2KYjseRhSeA == X-ME-Sender: Received: by mailuser.nyi.internal (Postfix, from userid 99) id A7222621BF; Tue, 17 Apr 2018 05:55:29 -0400 (EDT) Message-Id: <1523958929.2303858.1340762064.4C9AA00D@webmail.messagingengine.com> From: Dave Cottlehuber To: wes wroten , freebsd-current@freebsd.org MIME-Version: 1.0 X-Mailer: MessagingEngine.com Webmail Interface - ajax-f3006b89 References: Date: Tue, 17 Apr 2018 11:55:29 +0200 In-Reply-To: Subject: Re: snapshot of april 12th wont boot at all Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.25 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 09:55:31 -0000 On Tue, 17 Apr 2018, at 02:17, Wes wrote nothing. Wes, Can you share some info? Which architecture boot method uefi mbr =E2=80=A6 Which iso / img specifically=20 Fresh install or upgrade? Relevant loader.conf settings Your dmesg on a prior snapshot=20 Expand on won=E2=80=99t boot - start at system POST and explain from there Any variants you tried Do you just get a black screen? Good hunting! Dave From owner-freebsd-current@freebsd.org Tue Apr 17 14:47:12 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D1421F805A4 for ; Tue, 17 Apr 2018 14:47:11 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: from mail-lf0-x22a.google.com (mail-lf0-x22a.google.com [IPv6:2a00:1450:4010:c07::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B7A737D12E for ; Tue, 17 Apr 2018 14:47:08 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: by mail-lf0-x22a.google.com with SMTP id v207-v6so27723848lfa.10 for ; Tue, 17 Apr 2018 07:47:08 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:subject:message-id :mime-version:content-transfer-encoding; bh=eYxdoc8AiQlyC9jjIbDlXgzFo3gYK7fc9HLuqe+HD58=; b=DvGDJWRCWCu1T12gzOimEZjDK5ydwAqhY8OVKfuK0g4LRMF91Dl+kSZrxpBiwjBZo8 cO3rrBcZgJH9Y6ReHh8DnXfyoCbtwbReKGLuk+DuphZtl27thwLrAFBeA6d7BXVOiPlD MVrMR/Vs1/qtQ41oi+tK4jEvIITEfEdp/cJcsU/+EckHZSHDZTcDhHkn2WK4Tud+RLTo eR64ZlJxAVOV1itozmI3Bpa7pgMD5l/lPycGH0xNt5oThR/tIHEUttOVjdhZKjiLDZaY DT0dAcjsaNuVl6kelr3GA2BxFE6Ox/KXIvSRKTlGaLQArsLch7D0tjQG9hYg4F48qz2s u1/w== X-Gm-Message-State: ALQs6tBTRcNs97i6+hj0awXjvIzryCrIoOxW3Fp0qkd5QwwNbAhQUrU4 Vc0Eq6qX6ppvlQgel6H5v9G391SU X-Google-Smtp-Source: AIpwx49Kg0q3MX6l0nplbS7Y+HgsE/RUT2JmmG6t1A7x0hNC4QCw74KNe3PHmR5p/H8hPgRstVDKfQ== X-Received: by 2002:a19:d015:: with SMTP id h21-v6mr1784343lfg.124.1523976425820; Tue, 17 Apr 2018 07:47:05 -0700 (PDT) Received: from rsbsd.rsb.ber ([68.202.91.152]) by smtp.gmail.com with ESMTPSA id u13-v6sm3449968lfc.91.2018.04.17.07.47.03 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 07:47:04 -0700 (PDT) Sender: "Raif S. Berent" Date: Tue, 17 Apr 2018 10:47:00 -0400 From: Beeblebrox To: freebsd-current@freebsd.org Subject: snapshot of april 12th wont boot at all Message-ID: <20180417104700.4d6110b9@rsbsd.rsb.ber> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 14:47:12 -0000 I have (possibly) similar problem, running kernel from March 29 as fall-back (older kernel, latest world). * OS: HardenedBSD-12 on amd64 Athlon II X3 460 * Kernels built yesterday: MYKERN & HARDENEDBSD (GENERIC with Debug). Both kernels fail. No errors encountered during buildworld/kernel. World installs normally. * Boot process: Grub -> /boot/loader -> Kernel Selection. No EFI (MBR). Grub has own partition (ext2fs), /boot/loader on ZFS. * zpool: Striped on 2 HDD's, scrub returns clean pool. FAILURE POINT: System freeze, completely unresponsive, requires hard reset. * Initially seems like failure is at "Mount Root from zpool/ROOT/bsd". Further inspection of dmesg shows garbled text at services stage (start reading /etc/rc.conf) * /etc/rc.conf: Everything disabled for bug hunting. Cause does not seem related to linux / radeonkms either. * Selecting "Safe Mode" (kern.smp.disabled ?) gets me to single-user mode, and later multi-user but system freezes as soon as I login. Not 100% sure about this behaviour though, as I have been at it since early morning yesterday. * Have not tried with ACPI disabled. Dmesg: Firmware Warning (ACPI): 32/64X length mismatch in FADT/Gpe0Block: 64/32 (20180313/tbfadt-748) There was a recent bug involving databases failing to start due to "limits: NO: No such file or directory". I have Mariadb-Server-100 installed with the new patch for this bug. I wonder whether these two could be related? Would prefer not posting my verbose boot log dmesg file here, can email it (or download link) to developers (at FreeBSD.org) if needed though. Regards. -- HardenedBSD_amd64_12-Current_RadeonKMS Please CC my email when responding, mail from list is not delivered. From owner-freebsd-current@freebsd.org Tue Apr 17 14:50:52 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 00342F80A81 for ; Tue, 17 Apr 2018 14:50:51 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-yb0-x235.google.com (mail-yb0-x235.google.com [IPv6:2607:f8b0:4002:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B1FF67D5B3 for ; Tue, 17 Apr 2018 14:50:51 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-yb0-x235.google.com with SMTP id i13-v6so8592147ybl.4 for ; Tue, 17 Apr 2018 07:50:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=SDaZjEIQy0DSZJEYRRQyhZuuqwJitDUpk/I4agavZjE=; b=NFQ5DJQIB4jgk59gUmkwDd9qYjuYzWg1Z/A2fCtmpe3X4ERoVGrIbp0PkDaDaJKMLU c6UX/NnGhrW13wTPQ15z0VYgP2Cb93GZrI1G0HpD3VTgFMdMDh7Eu60fcxaR8loQ9mns 0np7mQWR7+roDj0tUUvTjMTcin5gfAgcl23uZrii6ElTw44XmCy9YXsF9JTl3UAxmCeA lwKsdHYTHLLF3QdPoBMwZVhD06GnfiaPM5Qc8r6PzvC+NMYvL0b3GN4DecnqRaT4VPg3 nS2hCtsNKUy1jl6iRI74kymhTFDZZ+Same/7+RdCDVPhB85EU7Hfe4Ugk5jLSN4TWNsa WRVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=SDaZjEIQy0DSZJEYRRQyhZuuqwJitDUpk/I4agavZjE=; b=Icah+/kpxmchw9iyHDMR4XbG3txGba/LjVkT50+WYgCjx5s5Ly9Q11fVqA/yj3aM1n TnS6Lx5oDlulYMwHJ/QjgOMd1TgpMC874Jgucxt0JA4zxYtLxmtoZ59nBF8cwRDIIO3e WKCEqy1SXVN0oiqkI7KljDTX/0l7MXs6IareS+fD5YieyXnX6W6u8KpxwO6/CPO80Dls ulR4iRcVLymYMOjUagLi62gFf0p4Acd+8xFgPy1SxLz+U6B2Ye7nDHpO4UBdbzlDI3t+ LPjbNJgtmo6y4qv3LhaJN410f9bgBAEz2zx0Osc7ASj7UiVaa4VcP/inF4sIW4ei2f2w 2jDA== X-Gm-Message-State: ALQs6tCjHWBu5j3UCvgQdv4FdSM52ZK5XtKPDf6zbp4xHsih2MwUlHf4 Y+S1UToyYVFKbi8Z4yFSUQzgraLp0Lw= X-Google-Smtp-Source: AIpwx4+jQ8Sh2Y0qwvnMCfuNxko7D4Wi3YB4QbAIQqH990iWRRpkTlNHXuhY0jUCtVtPH1oRasvgWA== X-Received: by 2002:a25:48b:: with SMTP id 133-v6mr1489462ybe.205.1523976650329; Tue, 17 Apr 2018 07:50:50 -0700 (PDT) Received: from mutt-hbsd (abelohost-199.95.217.185.dedicated-ip.abelons.com. [185.217.95.199]) by smtp.gmail.com with ESMTPSA id g2sm7164139ywa.63.2018.04.17.07.50.48 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 07:50:49 -0700 (PDT) Date: Tue, 17 Apr 2018 10:50:40 -0400 From: Shawn Webb To: Beeblebrox Cc: freebsd-current@freebsd.org Subject: Re: snapshot of april 12th wont boot at all Message-ID: <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="y6k2gqbdicu33vcs" Content-Disposition: inline In-Reply-To: <20180417104700.4d6110b9@rsbsd.rsb.ber> X-Operating-System: FreeBSD mutt-hbsd 12.0-CURRENT FreeBSD 12.0-CURRENT X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0x6A84658F52456EEE User-Agent: NeoMutt/20171215 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 14:50:52 -0000 --y6k2gqbdicu33vcs Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Apr 17, 2018 at 10:47:00AM -0400, Beeblebrox wrote: > I have (possibly) similar problem, running kernel from March 29 as > fall-back (older kernel, latest world). >=20 > * OS: HardenedBSD-12 on amd64 Athlon II X3 460 > * Kernels built yesterday: MYKERN & HARDENEDBSD (GENERIC with Debug). > Both kernels fail. No errors encountered during buildworld/kernel. > World installs normally. > * Boot process: Grub -> /boot/loader -> Kernel Selection. No EFI (MBR). > Grub has own partition (ext2fs), /boot/loader on ZFS. > * zpool: Striped on 2 HDD's, scrub returns clean pool. >=20 > FAILURE POINT: System freeze, completely unresponsive, requires hard > reset. > * Initially seems like failure is at "Mount Root from zpool/ROOT/bsd". > Further inspection of dmesg shows garbled text at services stage > (start reading /etc/rc.conf) > * /etc/rc.conf: Everything disabled for bug hunting. Cause does not > seem related to linux / radeonkms either. > * Selecting "Safe Mode" (kern.smp.disabled ?) gets me to single-user > mode, and later multi-user but system freezes as soon as I login. > Not 100% sure about this behaviour though, as I have been at it since > early morning yesterday. > * Have not tried with ACPI disabled. Dmesg: Firmware Warning (ACPI): > 32/64X length mismatch in FADT/Gpe0Block: 64/32 (20180313/tbfadt-748) >=20 > There was a recent bug involving databases failing to start due to > "limits: NO: No such file or directory". I have Mariadb-Server-100 > installed with the new patch for this bug. I wonder whether these two > could be related? >=20 > Would prefer not posting my verbose boot log dmesg file here, can email > it (or download link) to developers (at FreeBSD.org) if needed though. What happens when you set vm.pmap.pti=3D0 at the loader prompt? --=20 Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE --y6k2gqbdicu33vcs Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKrq2ve9q9Ia+iT2eaoRlj1JFbu4FAlrWCbwACgkQaoRlj1JF bu4qnBAAu+sClibaekZlzbIhAAJFYPFv4hxfnPv7mnR4RA+O6pj7uBnS7X3Valn2 6Zjx0Hhyt2b8gK1GGSnzeI8PPDRuxlmrYmiX+GisakA/dfNVswBPm90HAo3ufUz0 LzBVp5uELLayWh60SmnU+u18VKDid0e5s5QUxf68xTGEI2Y6T6HY4exEX7UGEk2M rycM3NmoQPn+ejBY6H9Xvhz84Cx7TYCGaowpgvcRSDNhUAC0TfB4nHk5biV0Dyx+ rgiRrOdqQIXLILVz21dR0hwCDlGNK12o2IlmnYyPVNLSbGQS9ShYdBPbPQoOz1ZO Bd7wb7mWrDsEPJJz5TgmUDUl8wQzMFAXEyZEoATAvuZJPHlpnDaYdi5tBOzLUPkd ym0j+jPEyQhELrMVqioGlByg1+hgvj7PNWAiiSMqbjLnC3Yt5NEVD10PTJOdUuw8 5AeIFo6h06aOMSje3D98lPpUESt7+zJPR6sWin6kXjdVN1zscp66JQuYRgfEWXlB vavggfkxnUf2DInrcN+ETO0yAyCkdtACT6QkYj8JfMYl0TL9b0n8Qr2eXx5/sVBs KTIjgUd3f4ZmRl52ygKa4CM16PZ91SkgY1pVGT+zo9Wwne1+HUzf4BHvwpq+TLnx TWRsRkcsGG3wybH5Quwj4Rw0lBIhcIcVogPhWr928uR+pBeK7c4= =Lpij -----END PGP SIGNATURE----- --y6k2gqbdicu33vcs-- From owner-freebsd-current@freebsd.org Tue Apr 17 14:52:44 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A12F3F80F06 for ; Tue, 17 Apr 2018 14:52:44 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from smtp.freebsd.org (unknown [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 786877D93D for ; Tue, 17 Apr 2018 14:52:44 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: from mail-lf0-f41.google.com (mail-lf0-f41.google.com [209.85.215.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) (Authenticated sender: kevans) by smtp.freebsd.org (Postfix) with ESMTPSA id 3CC00EC1C for ; Tue, 17 Apr 2018 14:52:44 +0000 (UTC) (envelope-from kevans@freebsd.org) Received: by mail-lf0-f41.google.com with SMTP id m202-v6so10503486lfe.8 for ; Tue, 17 Apr 2018 07:52:44 -0700 (PDT) X-Gm-Message-State: ALQs6tBPRkAwre2THkrlfmhPK/bH5IO/JsL2HWzPJB365rAUTcjdJsZm YAqfsRMsEL8LGQ3OVIIffPNu+zsYtENMWt71Uxg= X-Google-Smtp-Source: AIpwx48x1X/3qITCUtADZNlkpUyO+FFxr9gPp7Rt09bPFrdsc6T0cJ4hR6kMlYPcIBA3bUboQMN/6Qx9KmgJAaoFRh8= X-Received: by 2002:a19:d850:: with SMTP id p77-v6mr1807075lfg.52.1523976761720; Tue, 17 Apr 2018 07:52:41 -0700 (PDT) MIME-Version: 1.0 Received: by 10.46.129.90 with HTTP; Tue, 17 Apr 2018 07:52:21 -0700 (PDT) In-Reply-To: <20180417104700.4d6110b9@rsbsd.rsb.ber> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> From: Kyle Evans Date: Tue, 17 Apr 2018 09:52:21 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: snapshot of april 12th wont boot at all To: Beeblebrox Cc: FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 14:52:44 -0000 On Tue, Apr 17, 2018 at 9:47 AM, Beeblebrox wrote: > I have (possibly) similar problem, running kernel from March 29 as > fall-back (older kernel, latest world). > > * OS: HardenedBSD-12 on amd64 Athlon II X3 460 > * Kernels built yesterday: MYKERN & HARDENEDBSD (GENERIC with Debug). > Both kernels fail. No errors encountered during buildworld/kernel. > World installs normally. > * Boot process: Grub -> /boot/loader -> Kernel Selection. No EFI (MBR). > Grub has own partition (ext2fs), /boot/loader on ZFS. > * zpool: Striped on 2 HDD's, scrub returns clean pool. > > FAILURE POINT: System freeze, completely unresponsive, requires hard > reset. > * Initially seems like failure is at "Mount Root from zpool/ROOT/bsd". > Further inspection of dmesg shows garbled text at services stage > (start reading /etc/rc.conf) > * /etc/rc.conf: Everything disabled for bug hunting. Cause does not > seem related to linux / radeonkms either. > * Selecting "Safe Mode" (kern.smp.disabled ?) gets me to single-user > mode, and later multi-user but system freezes as soon as I login. > Not 100% sure about this behaviour though, as I have been at it since > early morning yesterday. > * Have not tried with ACPI disabled. Dmesg: Firmware Warning (ACPI): > 32/64X length mismatch in FADT/Gpe0Block: 64/32 (20180313/tbfadt-748) > > There was a recent bug involving databases failing to start due to > "limits: NO: No such file or directory". I have Mariadb-Server-100 > installed with the new patch for this bug. I wonder whether these two > could be related? > I can't speak much to the rest of your e-mail, but as far as this last bit goes: the bug you're referencing would've just failed to start the database server because `limits` was passed an invalid argument. If you have filesystem access, you can confirm this by setting mariadb_limits="" in your rc.conf(5) From owner-freebsd-current@freebsd.org Tue Apr 17 15:13:57 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EDB7CF8272C for ; Tue, 17 Apr 2018 15:13:56 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: from mail-lf0-x22e.google.com (mail-lf0-x22e.google.com [IPv6:2a00:1450:4010:c07::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6DFCD82571 for ; Tue, 17 Apr 2018 15:13:56 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: by mail-lf0-x22e.google.com with SMTP id p142-v6so27869997lfd.6 for ; Tue, 17 Apr 2018 08:13:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:cc:subject:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=CzV2d2tT25+aklt6hFovl/4j37NxtX8fnSF+BQytTbc=; b=rlkRuCeAeCc6s1+pLdvT/aZxtMESEJePkYkVj6rbZwUH7cyjh886wDRZ6iKcJCuupc IP8zEgYmWylD58MeoEt0+/0ovYjwITsoJfAyVdBjOecXXzwOMcfYHIsv5qE5W9qm7Isb m4Yqbc1Jav/JLsukDX1Bk2FNv1gppotRWxvvlXyP/Bn1+GEqXgfzR3ZnEvR0+kwcrYui i+gsJAfavZbmS8M4AemWOsiKcbIx2pBSW5KRRc4riWYe9LrVylVizaGG8t2pn8naEUFS VxM4d+oakh3Ja1ZSADPMdBM5INvwn1qWI36xElvF+wPJ99jjc7UjqaW//7Mx3tsriQaT 2K5g== X-Gm-Message-State: ALQs6tByb0Q+4HWeB/WdZVhb4md+S7s/Z2/DOLBvZvGEYo0Dd9cwPDoT 9iC+j96Ff1RgV31cTGyQTrHQEDbh X-Google-Smtp-Source: AIpwx4976tp+mushurZjcirezZP3LVkvx8ET2N2stl9mAzEJhQvzFsiDiE1ooUlNK992jqvR1g0pIQ== X-Received: by 10.46.128.139 with SMTP id i11mr1773375ljg.97.1523978034802; Tue, 17 Apr 2018 08:13:54 -0700 (PDT) Received: from rsbsd.rsb.ber ([68.202.91.152]) by smtp.gmail.com with ESMTPSA id z18-v6sm2139781lfj.8.2018.04.17.08.13.53 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 08:13:53 -0700 (PDT) Sender: "Raif S. Berent" Date: Tue, 17 Apr 2018 11:13:51 -0400 From: Beeblebrox Cc: freebsd-current@freebsd.org Subject: Re: snapshot of april 12th wont boot at all Message-ID: <20180417111342.287459ed@rsbsd.rsb.ber> In-Reply-To: <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 15:13:57 -0000 Hey Shawn, > What happens when you set vm.pmap.pti=0 at the loader prompt? Yep, that fixed it. Booted into MYKERN without problem. Assuming Page Table Isolation still a bit buggy? FreeBSD 12.0-CURRENT #3 5b8586c22aa(hardened/current/master): Tue Apr 17 08:11:53 EDT 2018 Regards. -- HardenedBSD_amd64_12-Current_RadeonKMS Please CC my email when responding, mail from list is not delivered. From owner-freebsd-current@freebsd.org Tue Apr 17 15:17:13 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 82772F82AFA for ; Tue, 17 Apr 2018 15:17:13 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-wr0-x235.google.com (mail-wr0-x235.google.com [IPv6:2a00:1450:400c:c0c::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D37418369C for ; Tue, 17 Apr 2018 15:17:12 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-wr0-x235.google.com with SMTP id v60so32713136wrc.7 for ; Tue, 17 Apr 2018 08:17:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=NkzYnt77lAFlhq9K8As+1whX5PG3BjftxiIN+d/wmmE=; b=Frk3g7sMKZ1/y+NEif8re15rSi+sW549Rq3i3pT5W8K7q1hNmp7E2qZ1doWEl34z8r dFIXN0MHkowmX69ym2A7jB1JoXmop2XSFeIJC63no5p/8cQcPgVElTtVX2WUKaw+mmDv zVn61wAZy/wu32MR+Ki8CKL7WtxqeUHc1VLEHb/wmYq3JY+iMzeduxPIc9dxhIk7yKKX rAGRGg/VcOaw9bHlPVzOPmJi3yIHnuQLMJUKA2gWtu3HAiETnxOwm2mxeZXX2+Bs6E4V mHHMnAMNydxv9qgPUUq6JtfQr2nRafsPjDWEgHupCdJ6HIFb/wLV+4I8EE211Fcfht8W uu6w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=NkzYnt77lAFlhq9K8As+1whX5PG3BjftxiIN+d/wmmE=; b=qsg+PnbPcjvowJYKmXgWUzClUBdWiTYgWvCn+gfqhjfrbi8uyC3psDCoK1VWAOPG0O tC9mDbd8pWcYak9V0NFJTymicyt9cA0PGjXolUd637DKotIyRoDAyhokwFNxBeVQB8hY XbKD/YRdVDzlBjglpTYJfhWtAyU33duiDuYHlc0enLLF6FDW+zYPJhy9EMr8w/ZfnH+k BgXa/9e7KrutdfhCBNV6WE9RSQRssuwMVNE7xKC/NmyEQDh/o1d7rXPfGhtbobaT3BmA 3XMwaiY9TeQeOxDE2YaRBx5io91zK2wxkRNFDbXZVjD8shF1pnyMV9+SNpwh8v0L0QYv 9Veg== X-Gm-Message-State: ALQs6tDoF7Y9cpNmz9tqWf6BEcjP8nSux1iQzXe1XG2rJLUQTxftYth5 9dDoV7wd/WrFdJOgoFAv5t/kGtiqVFQ= X-Google-Smtp-Source: AIpwx4/inYat9mDsbPVtQzVDA+TDmAzhGgbU0od0s1XbvLGwcVOWbJ2r8ERXZS3YDlvuRxsTZVrfQg== X-Received: by 10.223.145.35 with SMTP id j32mr2080870wrj.106.1523978231595; Tue, 17 Apr 2018 08:17:11 -0700 (PDT) Received: from mutt-hbsd (i.am.a.tor.exit.relay.itbible.co.uk. [54.37.74.56]) by smtp.gmail.com with ESMTPSA id g105sm381445wrd.45.2018.04.17.08.17.09 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 08:17:10 -0700 (PDT) Date: Tue, 17 Apr 2018 11:17:01 -0400 From: Shawn Webb To: Beeblebrox Cc: freebsd-current@freebsd.org Subject: Re: snapshot of april 12th wont boot at all Message-ID: <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> <20180417111342.287459ed@rsbsd.rsb.ber> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="d3dz2w744qjavxwr" Content-Disposition: inline In-Reply-To: <20180417111342.287459ed@rsbsd.rsb.ber> X-Operating-System: FreeBSD mutt-hbsd 12.0-CURRENT FreeBSD 12.0-CURRENT X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0x6A84658F52456EEE User-Agent: NeoMutt/20171215 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 15:17:13 -0000 --d3dz2w744qjavxwr Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Apr 17, 2018 at 11:13:51AM -0400, Beeblebrox wrote: > Hey Shawn, >=20 > > What happens when you set vm.pmap.pti=3D0 at the loader prompt? > Yep, that fixed it. Booted into MYKERN without problem. > Assuming Page Table Isolation still a bit buggy? >=20 > FreeBSD 12.0-CURRENT #3 5b8586c22aa(hardened/current/master): > Tue Apr 17 08:11:53 EDT 2018 HardenedBSD enables PTI regardless of underlying CPU by default. We've found that some older AMD CPUs have issues with PTI as currently implemented. Thanks, --=20 Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE --d3dz2w744qjavxwr Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKrq2ve9q9Ia+iT2eaoRlj1JFbu4FAlrWD+kACgkQaoRlj1JF bu6ywQ//Tzyo8cLBOn+lCkRHeQuAQ/yxjYFqVximbZp3ShzdKLcI+mz9UPN04Fyv 9ZKdHa7hZxAQnl1KUJqsMR+uSuA8pVhQgCqIMcYH0N3zkbBDTUdgGczKPaKNnaJZ sKFx+BJ7dlpS388JMb5HGsmYQeQC98qHsP2RoSi/aq2TQdNIupApSr8rFbTSh8TY uCGu3DnfZ8qU+asD9vHpay+fQw9DWHBXdYdXMqZcpIWIBpoZFZN/K5S73gsJBaTd kyNKLMBWkcJi9DhvwDO2uhBHQ3wkjVSdkQGGatveTcp+aNT/1gVAY0gs+VMvR4C6 0TpFWgmD2Dc9u0Arhd497kMSie74XNg8jwYwXOmgizHfi2xVnUzvRIdv1nhzIC4V P1cCf6kXofDScp4WhmV+VfBPD//raQi5tPcQbSbc8py8fY+IE6bcOywoOTgVytZW HwclsiNW6hE9SQpcqiTZOpd6kL6Y6KK+Pdv2Dfmpq4qk9cLbVA/4sj8g7c0il0KM faOJwBYwDocBzlwnXdlypOI/hz1ZvPAjN2dpjS4Ej+PEAA5dXgD1tXhR6fCRl9Qq 6UQQxKqCXUnvkqWbtemxL5aFOQs6SWB9LL0jXxnTfMhSJDO/7jh/3snohBZmTb65 kA/MmIRE6DS3VAiIn/uoNs4PLONuh4tpb8yyDyt14Omy5uHlYW8= =ITQj -----END PGP SIGNATURE----- --d3dz2w744qjavxwr-- From owner-freebsd-current@freebsd.org Tue Apr 17 16:31:46 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9E501F883FC; Tue, 17 Apr 2018 16:31:46 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mail.baldwin.cx (bigwig.baldwin.cx [96.47.65.170]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5008E77318; Tue, 17 Apr 2018 16:31:46 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from ralph.baldwin.cx (ralph.baldwin.cx [66.234.199.215]) by mail.baldwin.cx (Postfix) with ESMTPSA id 2743C10AFCD; Tue, 17 Apr 2018 12:31:45 -0400 (EDT) From: John Baldwin To: freebsd-current@freebsd.org, satan@ukr.net Cc: Stephen Hurd , cem@freebsd.org, "freebsd-hackers@freebsd.org" , Stephen Hurd , Sean Bruno , Matthew Macy Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Date: Tue, 17 Apr 2018 09:25:46 -0700 Message-ID: <3723755.0KMZDfyMWu@ralph.baldwin.cx> User-Agent: KMail/4.14.10 (FreeBSD/11.1-STABLE; KDE/4.14.30; amd64; ; ) In-Reply-To: <20180416191213.GA53406@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <20180416191213.GA53406@hell.ukr.net> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mail.baldwin.cx); Tue, 17 Apr 2018 12:31:45 -0400 (EDT) X-Virus-Scanned: clamav-milter 0.99.2 at mail.baldwin.cx X-Virus-Status: Clean X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 16:31:46 -0000 On Monday, April 16, 2018 10:12:13 PM Vitalij Satanivskij wrote: > > igb0@pci0:1:0:0: class=0x020000 card=0x152115d9 chip=0x15218086 rev=0x01 hdr=0x00 > vendor = 'Intel Corporation' > device = 'I350 Gigabit Network Connection' > class = network > subclass = ethernet > cap 01[40] = powerspec 3 supports D0 D3 current D0 > cap 05[50] = MSI supports 1 message, 64 bit, vector masks > cap 11[70] = MSI-X supports 10 messages > Table in map 0x1c[0x0], PBA in map 0x1c[0x2000] > cap 10[a0] = PCI-Express 2 endpoint max data 512(512) FLR RO NS > link x4(x4) speed 5.0(5.0) ASPM L1(L0s/L1) > ecap 0001[100] = AER 2 0 fatal 0 non-fatal 1 corrected > ecap 0003[140] = Serial 1 ac1f6bffff620e0c > ecap 000e[150] = ARI 1 > ecap 0010[160] = SR-IOV 1 IOV disabled, Memory Space disabled, ARI disabled > 0 VFs configured out of 8 supported > First VF RID Offset 0x0180, VF RID Stride 0x0004 > VF Device ID 0x1520 > Page Sizes: 4096 (enabled), 8192, 65536, 262144, 1048576, 4194304 > ecap 0017[1a0] = TPH Requester 1 > ecap 0018[1c0] = LTR 1 > ecap 000d[1d0] = ACS 1 > > It's info from system booted with HPET disabled and > hw.pci.enable_msix: 0 > hw.pci.enable_msi: 0 > > If one of this parameters not set as described system not boot ^( Please try the patch from here https://reviews.freebsd.org/P165 -- John Baldwin From owner-freebsd-current@freebsd.org Tue Apr 17 17:04:02 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 746F9F8A8F0 for ; Tue, 17 Apr 2018 17:04:02 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 0C4567F78D for ; Tue, 17 Apr 2018 17:04:02 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id BB673F8A8EF; Tue, 17 Apr 2018 17:04:01 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7F638F8A8EE for ; Tue, 17 Apr 2018 17:04:01 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mail.baldwin.cx (bigwig.baldwin.cx [96.47.65.170]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 202197F787; Tue, 17 Apr 2018 17:04:00 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from ralph.baldwin.cx (ralph.baldwin.cx [66.234.199.215]) by mail.baldwin.cx (Postfix) with ESMTPSA id 1941810A87D; Tue, 17 Apr 2018 13:04:00 -0400 (EDT) From: John Baldwin To: current@freebsd.org Cc: alc@freebsd.org, kib@freebsd.org, markj@freebsd.org Subject: Re: panic: VM object not locked in vm_page_ps_test() Date: Tue, 17 Apr 2018 10:03:55 -0700 Message-ID: <2532283.a7IeCc7LOW@ralph.baldwin.cx> User-Agent: KMail/4.14.10 (FreeBSD/11.1-STABLE; KDE/4.14.30; amd64; ; ) In-Reply-To: <3824784.INBv7mSNC3@ralph.baldwin.cx> References: <3824784.INBv7mSNC3@ralph.baldwin.cx> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mail.baldwin.cx); Tue, 17 Apr 2018 13:04:00 -0400 (EDT) X-Virus-Scanned: clamav-milter 0.99.2 at mail.baldwin.cx X-Virus-Status: Clean X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 17:04:02 -0000 On Tuesday, April 17, 2018 10:01:41 AM John Baldwin wrote: > My laptop running recent head panicked this morning, apparently from hitting > a key to stop the screensaver (at which point xscreensaver prompts for a > password to unlock). (Sorry, buggy mail client sent this early) panic: Lock vm object not locked @ /usr/src/sys/vm/vm_page.c:4135 #4 0xffffffff805e4893 in panic (fmt=) at /usr/src/sys/kern/kern_shutdown.c:764 #5 0xffffffff805dff22 in __rw_assert (c=, what=, file=, line=) at /usr/src/sys/kern/kern_rwlock.c:1397 #6 0xffffffff80882723 in vm_page_ps_test (m=0xfffff80431c2e980, flags=7, skip_m=0xfffff80431c34890) at /usr/src/sys/vm/vm_page.c:4135 #7 0xffffffff80867d84 in vm_fault_soft_fast (vaddr=, prot=, fault_type=, fault_flags=, wired=0, fs=, m_hold=) at /usr/src/sys/vm/vm_fault.c:307 #8 vm_fault_hold (map=0xfffff8000832a000, vaddr=, fault_type=, fault_flags=, m_hold=0x0) at /usr/src/sys/vm/vm_fault.c:610 #9 0xffffffff80866cf5 in vm_fault (map=0xfffff8000832a000, vaddr=, fault_type=2 '\002', fault_flags=0) at /usr/src/sys/vm/vm_fault.c:514 #10 0xffffffff808bc64c in trap_pfault (frame=0xfffffe008b1dbac0, usermode=1) at /usr/src/sys/amd64/amd64/trap.c:728 #11 0xffffffff808bbe1e in trap (frame=0xfffffe008b1dbac0) #12 #13 0x0000000805b51556 in ?? () (kgdb) frame 6 #6 0xffffffff80882723 in vm_page_ps_test (m=0xfffff80431c2e980, flags=7, skip_m=0xfffff80431c34890) at /usr/src/sys/vm/vm_page.c:4135 (kgdb) l 4130 { 4131 vm_object_t object; 4132 int i, npages; 4133 4134 object = m->object; 4135 VM_OBJECT_ASSERT_LOCKED(object); 4136 npages = atop(pagesizes[m->psind]); 4137 4138 /* 4139 * The physically contiguous pages that make up a superpage, i.e., a (kgdb) p m->object $1 = (vm_object_t) 0xfffff80190785900 (kgdb) p pagesizes[m->psind] $3 = 2097152 (kgdb) up #7 0xffffffff80867d84 in vm_fault_soft_fast (vaddr=, prot=, fault_type=, fault_flags=, wired=0, fs=, m_hold=) at /usr/src/sys/vm/vm_fault.c:307 307 if (vm_page_ps_test(m_super, flags, m)) { (kgdb) p m->object $4 = (vm_object_t) 0xfffff80190116a00 (kgdb) p/x m->flags $5 = 0x0 So 'm' (original page fault page) and 'm_super' are from different VM objects. Why are they part of the same reservation? (kgdb) p m->phys_addr >> (9 + 12) $7 = 4514 (kgdb) p vm_reserv_array[$7] $8 = {lock = {lock_object = {lo_name = 0xffffffff8099112c "vm reserv", lo_flags = 16973824, lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}, partpopq = {tqe_next = 0x0, tqe_prev = 0xfffff80423656680}, objq = { le_next = 0xfffff8042365b0c0, le_prev = 0xfffff80190116ab8}, object = 0xfffff80190116a00, pindex = 1760, pages = 0xfffff80431c2e980, domain = 0, popcnt = 512, inpartpopq = 0 '\000', popmap = { 18446744073709551615, 18446744073709551615, 18446744073709551615, 18446744073709551615, 18446744073709551615, 18446744073709551615, 18446744073709551615, 18446744073709551615}} (kgdb) set $rv = vm_reserv_array[$7] (kgdb) p $rv.object $9 = (vm_object_t) 0xfffff80190116a00 So rv->object matches m->object ($4) but not m_super->object ($1). Double-checking: (kgdb) p m_super->object $10 = (vm_object_t) 0xfffff80190785900 Other conditions in vm_reserv_to_superpage() are true: (kgdb) p $rv.pages $11 = (vm_page_t) 0xfffff80431c2e980 (kgdb) p m_super $12 = (vm_page_t) 0xfffff80431c2e980 (kgdb) p $rv.popcnt $13 = 512 Both objects are OBJT_DEFAULT objects: (kgdb) p *m->object $14 = {lock = {lock_object = {lo_name = 0xffffffff8095e7ce "vm object", lo_flags = 627245056, lo_data = 0, lo_witness = 0x0}, rw_lock = 41}, object_list = {tqe_next = 0xfffff80190116b00, tqe_prev = 0xfffff80190116920}, shadow_head = {lh_first = 0x0}, shadow_list = {le_next = 0x0, le_prev = 0xfffff80190785930}, memq = { tqh_first = 0xfffff80431ddf878, tqh_last = 0xfffff80431e2a900}, rtree = { rt_root = 18446735284333515328}, size = 2829, domain = {dr_policy = 0x0, dr_iterator = 0}, generation = 1, ref_count = 3, shadow_count = 0, memattr = 6 '\006', type = 0 '\000', flags = 12352, pg_color = 1824, paging_in_progress = 1, resident_page_count = 1024, backing_object = 0xfffff80190785900, backing_object_offset = 0, pager_object_list = {tqe_next = 0x0, tqe_prev = 0x0}, rvq = { lh_first = 0xfffff80423659540}, handle = 0x0, un_pager = {vnp = { vnp_size = 0, writemappings = 0}, devp = {devp_pglist = { tqh_first = 0x0, tqh_last = 0x0}, ops = 0x0, dev = 0x0}, sgp = { sgp_pglist = {tqh_first = 0x0, tqh_last = 0x0}}, swp = {swp_tmpfs = 0x0, swp_blks = {pt_root = 0}}}, cred = 0xfffff80008d99500, charge = 11587584, umtx_data = 0x0} (kgdb) p *m_super->object $15 = {lock = {lock_object = {lo_name = 0xffffffff8095e7ce "vm object", lo_flags = 627245056, lo_data = 0, lo_witness = 0x0}, rw_lock = 1}, object_list = {tqe_next = 0xfffff80190785a00, tqe_prev = 0xfffff80190785820}, shadow_head = { lh_first = 0xfffff80190116a00}, shadow_list = { le_next = 0xfffff801902b2100, le_prev = 0xfffff80008d61d30}, memq = { tqh_first = 0xfffff80431bd0720, tqh_last = 0xfffff80431c49b70}, rtree = { rt_root = 18446735284336303488}, size = 2829, domain = {dr_policy = 0x0, dr_iterator = 0}, generation = 1, ref_count = 1, shadow_count = 1, memattr = 6 '\006', type = 0 '\000', flags = 4096, pg_color = 42784, paging_in_progress = 0, resident_page_count = 2820, backing_object = 0x0, backing_object_offset = 0, pager_object_list = {tqe_next = 0x0, tqe_prev = 0x0}, rvq = {lh_first = 0xfffff80423659680}, handle = 0x0, un_pager = {vnp = {vnp_size = 0, writemappings = 0}, devp = {devp_pglist = { tqh_first = 0x0, tqh_last = 0x0}, ops = 0x0, dev = 0x0}, sgp = { sgp_pglist = {tqh_first = 0x0, tqh_last = 0x0}}, swp = {swp_tmpfs = 0x0, swp_blks = {pt_root = 0}}}, cred = 0xfffff80008d99500, charge = 11587584, umtx_data = 0x0} Huh, m_super's object is the backing object of the object for 'm' and 'rv': (kgdb) p m->object->backing_object $18 = (struct vm_object *) 0xfffff80190785900 (kgdb) p m_super->object $19 = (vm_object_t) 0xfffff80190785900 The program that was running was some X screen saver process (esper): (kgdb) p td->td_tid $24 = 100260 (kgdb) ps pid ppid pgrp uid state wmesg wchan cmd 1768 1767 1618 1001 D+ objde1 0xfffff80190116a00 esper 1767 1639 1618 1001 R+ (threaded) esper 100217 145 S uwait 0xfffff800026e7880 esper 100259 143 Run CPU 2 esper 100260 142 Run CPU 3 esper 100261 143 Run CPU 1 esper 100262 143 RunQ esper The other 'esper' process (1768) is waiting in "objdel" on m->object. (!) It is trying to teardown a forked address space during a call to exec: (kgdb) proc 1768 (kgdb) where #0 sched_switch (td=0xfffff800086ff000, newtd=0xfffff801904e8560, flags=) at /usr/src/sys/kern/sched_ule.c:2115 #1 0xffffffff805ef02c in mi_switch (flags=260, newtd=0x0) at /usr/src/sys/kern/kern_synch.c:437 #2 0xffffffff80637ded in sleepq_switch (wchan=0xfffff80190116a00, pri=84) at /usr/src/sys/kern/subr_sleepqueue.c:613 #3 0xffffffff80637c93 in sleepq_wait (wchan=0xfffff80190116a00, pri=84) at /usr/src/sys/kern/subr_sleepqueue.c:692 #4 0xffffffff805ee973 in _sleep (ident=0xfffff80190116a00, lock=, priority=84, wmesg=0xffffffff809558da "objde1", sbt=0, pr=0, flags=256) at /usr/src/sys/kern/kern_synch.c:216 #5 0xffffffff808779bb in vm_object_pip_wait (object=, waitid=) at /usr/src/sys/vm/vm_object.c:417 #6 vm_object_deallocate (object=0xfffff80190116a00) at /usr/src/sys/vm/vm_object.c:630 #7 0xffffffff8086cd99 in vm_map_entry_deallocate ( system_map=, entry=) at /usr/src/sys/vm/vm_map.c:2997 #8 vm_map_process_deferred () at /usr/src/sys/vm/vm_map.c:541 #9 0xffffffff80871e76 in _vm_map_unlock (map=, file=, line=3189) at /usr/src/sys/vm/vm_map.c:554 #10 vm_map_remove (map=, start=4096, end=140737488355328) at /usr/src/sys/vm/vm_map.c:3189 #11 0xffffffff8059efe5 in exec_new_vmspace (imgp=0xfffffe008b1ea770, sv=) at /usr/src/sys/kern/kern_exec.c:1099 At this point I'm not sure what to look at next but have the core if you all have suggestions. -- John Baldwin From owner-freebsd-current@freebsd.org Tue Apr 17 17:35:37 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 70093F8C9B4 for ; Tue, 17 Apr 2018 17:35:37 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from sonic317-27.consmr.mail.bf2.yahoo.com (sonic317-27.consmr.mail.bf2.yahoo.com [74.6.129.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C7EAC68341 for ; Tue, 17 Apr 2018 17:35:36 +0000 (UTC) (envelope-from filippomore@yahoo.com) X-YMail-OSG: KQAzxSwVM1mSukH8IMnTmhubOJcIwFtdk8zcmFCA2RmrHvnXYF.7xmSPAsIBC9I SDPYpx03sQS_017xS2ipbkbBir72z0zByQx6JSXA8wEDXeIivJH2FMpEiptFjq62O5LEBo5pPr.F nf2rc3j2_AQzc.2mwkHDSPIsHO4nTvgjDZRxEcNhgFlz8ajkKVA3RRVIOLptHKf3fWMlrcT2g6YW WOrVeQ_ZX7R2ASD_NZOPt2GQvTr1_efwB026u7uGhwdXrP4QqxTo7LIezMBX_iob0kPsWmfySl3u 6e_7wUjxhTXPFBw7m8S1Fdl_tY9x0Q0Hf059iFIpeJ2LZ2n64tDoI_OkEJ5HO4hqRkTzTlDmTsFe ucJGEFbd8yG1UPV3pfeQXw5nl7UGWn71hEyD..GXSoa_7Hydq2HoLHJnBIHiT86RiJIjzalL_7e4 WHBCH8XYd92KJeI.CmreJNjdUh8j2k9kX5Dgvho8bvKc2XPEN15vZwfNvbTXo Received: from sonic.gate.mail.ne1.yahoo.com by sonic317.consmr.mail.bf2.yahoo.com with HTTP; Tue, 17 Apr 2018 17:35:30 +0000 Date: Tue, 17 Apr 2018 17:25:12 +0000 (UTC) From: Filippo Moretti To: FreeBSD Current Message-ID: <1595676143.1357482.1523985912680@mail.yahoo.com> Subject: Problem compiling rust MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_1357481_816768852.1523985912680" References: <1595676143.1357482.1523985912680.ref@mail.yahoo.com> X-Mailer: WebService/1.1.11782 YMailNorrin Mozilla/5.0 (X11; FreeBSD i386; rv:59.0) Gecko/20100101 Firefox/59.0 X-Content-Filtered-By: Mailman/MimeDel 2.1.25 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 17:35:37 -0000 ------=_Part_1357481_816768852.1523985912680 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit I have the folloing error while compiling rust on i386 current of April the 9th ------=_Part_1357481_816768852.1523985912680 Content-Type: application/octet-stream Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="=?UTF-8?b?cnVzdF9lcnJvcg==?=" Content-ID: PT09PiAgTGljZW5zZSBBUEFDSEUyMCAgTUlUIGFjY2VwdGVkIGJ5IHRoZSB1c2VyCj09PT4gICBy dXN0LTEuMjUuMCBkZXBlbmRzIG9uIGZpbGU6IC91c3IvbG9jYWwvc2Jpbi9wa2cgLSBmb3VuZAo9 PT0+IEZldGNoaW5nIGFsbCBkaXN0ZmlsZXMgcmVxdWlyZWQgYnkgcnVzdC0xLjI1LjAgZm9yIGJ1 aWxkaW5nCj09PT4gIEV4dHJhY3RpbmcgZm9yIHJ1c3QtMS4yNS4wCj0+IFNIQTI1NiBDaGVja3N1 bSBPSyBmb3IgcnVzdC9ydXN0Yy0xLjI1LjAtc3JjLnRhci54ei4KPT4gU0hBMjU2IENoZWNrc3Vt IE9LIGZvciBydXN0LzIwMTgtMDItMTUvcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNk LnRhci5nei4KPT4gU0hBMjU2IENoZWNrc3VtIE9LIGZvciBydXN0LzIwMTgtMDItMTUvcnVzdC1z dGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkLnRhci5nei4KPT4gU0hBMjU2IENoZWNrc3Vt IE9LIGZvciBydXN0LzIwMTgtMDItMTUvY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNk LnRhci5nei4KL2Jpbi9sbiAtc2YgL3Vzci9wb3J0cy9kaXN0ZmlsZXMvcnVzdC8yMDE4LTAyLTE1 L3J1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC50YXIuZ3ogIC91c3IvcG9ydHMvbGFu Zy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy9idWlsZC9jYWNoZS8yMDE4LTAyLTE1Ci9iaW4v bG4gLXNmIC91c3IvcG9ydHMvZGlzdGZpbGVzL3J1c3QvMjAxOC0wMi0xNS9jYXJnby0wLjI1LjAt aTY4Ni11bmtub3duLWZyZWVic2QudGFyLmd6ICAvdXNyL3BvcnRzL2xhbmcvcnVzdC93b3JrL3J1 c3RjLTEuMjUuMC1zcmMvYnVpbGQvY2FjaGUvMjAxOC0wMi0xNQovdXNyL2Jpbi90YXIgLXggLUMg L3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjIC1mIC91c3IvcG9ydHMv ZGlzdGZpbGVzL3J1c3QvMjAxOC0wMi0xNS9ydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QudGFyLmd6CmNjIC1PMiAtcGlwZSAgLWZzdGFjay1wcm90ZWN0b3IgLWlzeXN0ZW0gL3Vz ci9sb2NhbC9pbmNsdWRlIC1mbm8tc3RyaWN0LWFsaWFzaW5nIC1mUElDIC1jIC1vIC91c3IvcG9y dHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy9vbGRfZnN0YXQubyAvdXNyL3BvcnRz L2xhbmcvcnVzdC9maWxlcy9vbGRfZnN0YXQuYwooc2V0IC1leDsgY2QgL3Vzci9wb3J0cy9sYW5n L3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjOyAgbGlic3RkPSIkKGVjaG8gInJ1c3Qtc3RkLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9s aWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvImxpYnN0ZC0qLnJsaWIpIjsgIGhh c2g9IiQoYmFzZW5hbWUgIiRsaWJzdGQiIC5ybGliIHwgL3Vzci9iaW4vc2VkICdzL15saWJzdGQt Ly8nKSI7ICBzdGRfbz0iJChhciB0ICIkbGlic3RkIiB8IC91c3IvYmluL2dyZXAgLUUgIl5zdGQt JGhhc2guKlwubyQiIHwgL3Vzci9iaW4vaGVhZCAtbiAxKSI7ICBhciB4ICIkbGlic3RkIiAiJHN0 ZF9vIjsgIGxkIC1yIC1vIHN0ZC54eC5vICIkc3RkX28iIG9sZF9mc3RhdC5vOyAgL2Jpbi9tdiBz dGQueHgubyAiJHN0ZF9vIjsgIGFyIHIgIiRsaWJzdGQiICIkc3RkX28iKQovdXNyL2Jpbi90YXIg LWMgLS1mb3JtYXQ9dXN0YXIgLUMgL3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1 LjAtc3JjIC1mIC91c3IvcG9ydHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy9ydXN0 LXN0ZC50YXIuZ3ogcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkCi9iaW4vbXYg L3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjL3J1c3Qtc3RkLnRhci5n eiAvdXNyL3BvcnRzL2xhbmcvcnVzdC93b3JrL3J1c3RjLTEuMjUuMC1zcmMvYnVpbGQvY2FjaGUv MjAxOC0wMi0xNS9ydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QudGFyLmd6Cj09 PT4gIFBhdGNoaW5nIGZvciBydXN0LTEuMjUuMAo9PT0+ICBBcHBseWluZyBGcmVlQlNEIHBhdGNo ZXMgZm9yIHJ1c3QtMS4yNS4wCj09PT4gICBydXN0LTEuMjUuMCBkZXBlbmRzIG9uIGV4ZWN1dGFi bGU6IGNtYWtlIC0gZm91bmQKPT09PiAgIHJ1c3QtMS4yNS4wIGRlcGVuZHMgb24gZXhlY3V0YWJs ZTogZ21ha2UgLSBmb3VuZAo9PT0+ICAgcnVzdC0xLjI1LjAgZGVwZW5kcyBvbiBwYWNrYWdlOiBw a2djb25mPj0xLjMuMF8xIC0gZm91bmQKPT09PiAgIHJ1c3QtMS4yNS4wIGRlcGVuZHMgb24gZmls ZTogL3Vzci9sb2NhbC9iaW4vcHl0aG9uMi43IC0gZm91bmQKPT09PiAgIHJ1c3QtMS4yNS4wIGRl cGVuZHMgb24gZmlsZTogL3Vzci9sb2NhbC9iaW4vY2NhY2hlIC0gZm91bmQKPT09PiAgIHJ1c3Qt MS4yNS4wIGRlcGVuZHMgb24gc2hhcmVkIGxpYnJhcnk6IGxpYmN1cmwuc28gLSBmb3VuZCAoL3Vz ci9sb2NhbC9saWIvbGliY3VybC5zbykKPT09PiAgIHJ1c3QtMS4yNS4wIGRlcGVuZHMgb24gc2hh cmVkIGxpYnJhcnk6IGxpYnNzaDIuc28gLSBmb3VuZCAoL3Vzci9sb2NhbC9saWIvbGlic3NoMi5z bykKPT09PiAgIHJ1c3QtMS4yNS4wIGRlcGVuZHMgb24gc2hhcmVkIGxpYnJhcnk6IGxpYmVkaXQu c28uMCAtIGZvdW5kICgvdXNyL2xvY2FsL2xpYi9saWJlZGl0LnNvLjApCj09PT4gIENvbmZpZ3Vy aW5nIGZvciBydXN0LTEuMjUuMAo9PT0+ICAgRnJlZUJTRCAxMCBhdXRvdG9vbHMgZml4IGFwcGxp ZWQgdG8gL3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjL3NyYy92ZW5k b3IvbGlic3NoMi1zeXMvbGlic3NoMi9jb25maWcucnBhdGgKPT09PiAgIEZyZWVCU0QgMTAgYXV0 b3Rvb2xzIGZpeCBhcHBsaWVkIHRvIC91c3IvcG9ydHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4y NS4wLXNyYy9zcmMvdmVuZG9yL2x6bWEtc3lzL3h6LTUuMi4zL2J1aWxkLWF1eC9jb25maWcucnBh dGgKL3Vzci9iaW4vc2VkIC1FICAtZSAncywlUFJFRklYJSwvdXNyL2xvY2FsLCcgIC1lICdzLCVT WVNDT05GRElSJSwvdXNyL2xvY2FsL2V0YywnICAtZSAncywlTUFORElSJSwvdXNyL2xvY2FsL21h biwnICAtZSAncywlUFlUSE9OX0NNRCUsL3Vzci9sb2NhbC9iaW4vcHl0aG9uMi43LCcgIC1lICdz LCVDSEFOTkVMJSxzdGFibGUsJyAgLWUgJ3MsJVRBUkdFVCUsaTY4Ni11bmtub3duLWZyZWVic2Qs JyAgLWUgJ3MsJUNDQUNIRSUsIi91c3IvbG9jYWwvYmluL2NjYWNoZSIsJyAgPCAvdXNyL3BvcnRz L2xhbmcvcnVzdC9maWxlcy9jb25maWcudG9tbCAgPiAvdXNyL3BvcnRzL2xhbmcvcnVzdC93b3Jr L3J1c3RjLTEuMjUuMC1zcmMvY29uZmlnLnRvbWwKL3Vzci9iaW4vc2VkIC1pLmJhayAtZSAncywl RE9DUyUsdHJ1ZSwnIC91c3IvcG9ydHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy9j b25maWcudG9tbAo9PT0+ICBCdWlsZGluZyBmb3IgcnVzdC0xLjI1LjAKY2QgL3Vzci9wb3J0cy9s YW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjICYmICAvdXNyL2Jpbi9lbnYgSE9NRT0iL3Vz ci9wb3J0cy9sYW5nL3J1c3Qvd29yayIgIE9QRU5TU0xfRElSPSIvdXNyIiAgL3Vzci9sb2NhbC9i aW4vcHl0aG9uMi43IC91c3IvcG9ydHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy94 LnB5IGJ1aWxkICAtLXZlcmJvc2UgIC0tY29uZmlnIC4vY29uZmlnLnRvbWwgIC0tam9icyAyCmV4 dHJhY3RpbmcgL3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjL2J1aWxk L2NhY2hlLzIwMTgtMDItMTUvcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkLnRh ci5negogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1 c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAt aTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliCiAg ZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQt aTY4Ni11bmtub3duLWZyZWVic2QvbWFuaWZlc3QuaW4KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9s aWIvcnVzdGxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVl YnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93 bi1mcmVlYnNkCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVi c2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3du LWZyZWVic2QvbGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtu b3duLWZyZWVic2QvbGliL2xpYm1pbml6X3N5cy1jZDUzODgwNDE2OGVhMDQwLnJsaWIKICBleHRy YWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2 LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGli ZmxhdGUyLTY1ODVmYTA5ZDQwMzEyZDEucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9y dXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJwYXJraW5nX2xvdF9jb3JlLTY0Y2Rk YWIxYWI2MTMxMDIucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93 bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYt dW5rbm93bi1mcmVlYnNkL2xpYi9saWJhbGxvY19qZW1hbGxvYy0yNmY3ZTRjYmU5M2Y3NjcyLnJs aWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0 LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJz ZC9saWIvbGlibG9nLTMyNmEyMDhiNTg3OWFkODIucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNk L2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJiYWNrdHJhY2Vfc3lzLTc3 MDc3MTY2ZjVmNjBmYTIucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2 ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJhci05NjEyZTIxODBkZmNlMWQyLnJsaWIKICBleHRy YWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2 LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGli dGVybS04ZDQzMmQ1NDUwZmVjMDgzLnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1p Njg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVz dGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlic3RkX3VuaWNvZGUtYzYzN2ZlMWIxZTM5 ZGFhMy5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVi c2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3du LWZyZWVic2QvbGliL2xpYnVuaWNvZGVfd2lkdGgtZjk4OTlkZjIxMWY4ZDEwNC5ybGliCiAgZXh0 cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4 Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xp YnNlcmlhbGl6ZS1hYWYzYjI0NTUxNTEzZTc0LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9s aWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlicmxzX2RhdGEtY2JlYTMzMTFl Y2JiZjI3NS5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtu b3duLWZyZWVic2QvbGliL2xpYm93bmluZ19yZWYtYzFhMTgwNmJiZWU0ODg5NS5ybGliCiAgZXh0 cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4 Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xp YmVudl9sb2dnZXItNGU0ZjcxZjY5MmJlYjQ1Ni5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0x LjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2Qv bGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYmNmZ19pZi0zZWJkNjQxNzY0 MGJhNTU2LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJl ZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25v d24tZnJlZWJzZC9saWIvbGlibGliYy04ZTA1NTVmMTQ0Zjg4MGE2LnJsaWIKICBleHRyYWN0aW5n IHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25v d24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlidGVzdC0y YmIyYmVmNzc5YzQzZGQ2LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVu a25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9p Njg2LXVua25vd24tZnJlZWJzZC9saWIvbGlicnVzdGNfYXBmbG9hdC0xNTRiMjUwZTI0N2NlMWY2 LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9y dXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJl ZWJzZC9saWIvbGlicGFuaWNfdW53aW5kLTI0MmVhY2VkNTcwNTE5MTcucmxpYgogIGV4dHJhY3Rp bmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5r bm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJiYWNr dHJhY2UtNWM2ZWE1ODIxNDUxNmY2Ny5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAt aTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1 c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYm51bV9jcHVzLTE5N2MxY2EzMWQ5YmE2 MzgucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNk L3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1m cmVlYnNkL2xpYi9saWJsb2ctZTg2YjI2ZDMwOWZmMzNjOC5ybGliCiAgZXh0cmFjdGluZyBydXN0 LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZy ZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnRlcm0tOGQ0MzJk NTQ1MGZlYzA4My5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5r bm93bi1mcmVlYnNkL2xpYi9saWJwYW5pY19hYm9ydC0yODY2M2EyNzU1NjNmNWM4LnJsaWIKICBl eHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1p Njg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIv bGlidW53aW5kLTYzMzE4NDJmZWE2NzY1MTkucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4y NC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xp Yi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJybHNfc3Bhbi1lNGU4ZjhiMDMz ZWUwZDg5LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJl ZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25v d24tZnJlZWJzZC9saWIvbGliYml0ZmxhZ3MtNzI2YTgyZmFlYzFjYjBhOS5ybGliCiAgZXh0cmFj dGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11 bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1 c3RjX2JpbmFyeWVuLTAyMzc4MjEzZTY4YjEyYzkucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNk L2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJsaWJjLWY0YjliMzA0Yzlj ZGQxZjkucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVl YnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93 bi1mcmVlYnNkL2xpYi9saWJnZXRvcHRzLWEzMjkzYWM2N2UyNzgxMGEucmxpYgogIGV4dHJhY3Rp bmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5r bm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJsYXp5 X3N0YXRpYy1lZDI5NzI3NzRjNGJmNDlhLnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQu MC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIv cnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlicGFya2luZ19sb3QtZDZiN2I1ZGNi MjY5ODY2Yi5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtu b3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX3NlcmlhbGl6ZS03Yzc5NWUzNzkxNDEzNjFjLnJsaWIK ICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0 ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9s aWIvbGliYWxsb2MtODY5ODBjY2Q3ZDQyNGQzYy5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0x LjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2Qv bGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnNtYWxsdmVjLTA3ZDRiMGJh YjJjYTA4OGMucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5r bm93bi1mcmVlYnNkL2xpYi9saWJjb21waWxlcl9idWlsdGlucy0zYjBmZmNjNWRmZGY0NmVjLnJs aWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0 LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJz ZC9saWIvbGlic3RkLWIwZGExOWYyZDY5MjUwMWQucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNk L2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJieXRlb3JkZXItYzc3YjVh NjE3NDIwYTUyZC5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3du LWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11 bmtub3duLWZyZWVic2QvbGliL2xpYnN0YWJsZV9kZXJlZl90cmFpdC1hM2QyNzBjMWNiMzFhNjZk LnJsaWIKICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9y dXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJl ZWJzZC9saWIvbGlidGVtcGRpci0wYjU1MjI2NDgwM2QyNzlkLnJsaWIKICBleHRyYWN0aW5nIHJ1 c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24t ZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGliam9ic2VydmVy LTM5NTAzYzA3NTY3OTc1YmQucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYt dW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGli L2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJhbGxvY19zeXN0ZW0tMTMzY2UwYmJjOWJkNjNl ZC5ybGliCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2Qv cnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZy ZWVic2QvbGliL2xpYnJ1c3RjX2RlbWFuZ2xlLTE0Zjk5MjRjMDAyY2RhMWUucmxpYgogIGV4dHJh Y3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYt dW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJj b3JlLTVjMzljNDMwMzIzNThmNWUucmxpYgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2 ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0 bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJyYW5kLWFiZWZmMjM5M2ZjOGU1MmYucmxp YgogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qt c3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNk L2xpYi9saWJsb2dfc2V0dGluZ3MtMmQ3NzY3NmY1MWFjNzRlZi5ybGliCiAgZXh0cmFjdGluZyBy dXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3du LWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2xp bnQtZTgwMWZiZDQ3MDgzNzBiMC5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYt dW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGli L2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19jb25zdF9ldmFsLWY0YjY0MjkyNzMw ZmIxYzAuc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJz ZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24t ZnJlZWJzZC9saWIvbGliYXJlbmEtYjQxOTAzNTEwODdlNDFmMC5zbwogIGV4dHJhY3RpbmcgcnVz dC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1m cmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19taXIt MDlmYjYyOWI3MWVjM2U1MS5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2 ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19kcml2ZXItMDNmOGZmZDgxODRiMGIxMi5z bwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qt c3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNk L2xpYi9saWJydXN0Yy03ZDcxOTVlN2I0YjRmOWMyLnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0x LjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2Qv bGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX21ldGFkYXRhLTE3 MWFjNWVhNDVmZGYyMjQuc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25v d24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2 LXVua25vd24tZnJlZWJzZC9saWIvbGlic2VyaWFsaXplLWFhZjNiMjQ1NTE1MTNlNzQuc28KICBl eHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1p Njg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIv bGlicnVzdGNfbGx2bS0yZWE1OTlkNjY2OGFiNmI0LnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0x LjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2Qv bGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnN5bnRheC00ZDhhNmI1NDdk NmQ4N2U0LnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVi c2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3du LWZyZWVic2QvbGliL2xpYnJ1c3RjX3ByaXZhY3ktZDRlZGM5MGJiODA2ODY0NS5zbwogIGV4dHJh Y3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYt dW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJy dXN0Y190eXBlY2stZDZhNGM2NDUzOWE1NmJiNS5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4y NC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xp Yi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19yZXNvbHZlLWJlNTg4 YWFlOTkxMzk4ODYuc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24t ZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVu a25vd24tZnJlZWJzZC9saWIvbGlidGVzdC0yYmIyYmVmNzc5YzQzZGQ2LnNvCiAgZXh0cmFjdGlu ZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtu b3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3Rj X3RyYW5zLWZjZjQ1ZmM2MzE1ZTBjZjYuc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1p Njg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVz dGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlicnVzdGNfZGF0YV9zdHJ1Y3R1cmVzLWQ5 N2M3ODkzNmEzZTdhMjguc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25v d24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2 LXVua25vd24tZnJlZWJzZC9saWIvbGlicHJvY19tYWNyby02YjJmZGZkZDVlNWE3MWU4LnNvCiAg ZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQt aTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGli L2xpYnJ1c3RjX3BsdWdpbi01N2FkMTIyZjVlYjgxNGU4LnNvCiAgZXh0cmFjdGluZyBydXN0LXN0 ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVi c2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2Vycm9ycy00 NGYyOWRkNTVjNGIxY2I5LnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtu b3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4 Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX3BsYXRmb3JtX2ludHJpbnNpY3MtOTQyYjVj OWUxYTQyYWZkOS5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5r bm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19wYXNzZXMtNmExZWM0ZjdlYTkxYTEzYS5zbwogIGV4 dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2 ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9s aWJydXN0Y190cmFuc191dGlscy03OWFmMDliMDNlOWUwMjVhLnNvCiAgZXh0cmFjdGluZyBydXN0 LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZy ZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2NyYXRl c2lvX3NoaW0tMjFmOGMyMGUxMTU0MjM3YS5zbwogIGV4dHJhY3RpbmcgcnVzdC1zdGQtMS4yNC4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9y dXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJncmFwaHZpei0zMWRjMjkwMGI4NGMz MTBiLnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2Qv cnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZy ZWVic2QvbGliL2xpYmZtdF9tYWNyb3MtMGJlZjA0YjU4YzkxYjA5Yi5zbwogIGV4dHJhY3Rpbmcg cnVzdC1zdGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93 bi1mcmVlYnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19z YXZlX2FuYWx5c2lzLWU0Nzc4ODMwMmU4YjNhOWIuc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9s aWIvcnVzdGxpYi9pNjg2LXVua25vd24tZnJlZWJzZC9saWIvbGlic3ludGF4X3Bvcy03ZmZkMjli ZGYzN2EyMmFjLnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtu b3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2FsbG9jYXRvci0yYTM4ZGRjN2VhMmFmMTBkLnNvCiAg ZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQt aTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGli L2xpYnN0ZC1iMGRhMTlmMmQ2OTI1MDFkLnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAt aTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1 c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2luY3JlbWVudGFsLWZjMzRi MTJkMDQ2ZTJjM2Quc28KICBleHRyYWN0aW5nIHJ1c3Qtc3RkLTEuMjQuMC1pNjg2LXVua25vd24t ZnJlZWJzZC9ydXN0LXN0ZC1pNjg2LXVua25vd24tZnJlZWJzZC9saWIvcnVzdGxpYi9pNjg2LXVu a25vd24tZnJlZWJzZC9saWIvbGlic3ludGF4X2V4dC0zNzE3OWVjYmY3MGNkODZkLnNvCiAgZXh0 cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4 Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIvaTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xp YnJ1c3RjX2NvbnN0X21hdGgtODI3YjNhYThlZTI4OTA0ZS5zbwogIGV4dHJhY3RpbmcgcnVzdC1z dGQtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3Qtc3RkLWk2ODYtdW5rbm93bi1mcmVl YnNkL2xpYi9ydXN0bGliL2k2ODYtdW5rbm93bi1mcmVlYnNkL2xpYi9saWJydXN0Y19ib3Jyb3dj ay0yNWQ3MDA3NjBkOTlmZTVlLnNvCiAgZXh0cmFjdGluZyBydXN0LXN0ZC0xLjI0LjAtaTY4Ni11 bmtub3duLWZyZWVic2QvcnVzdC1zdGQtaTY4Ni11bmtub3duLWZyZWVic2QvbGliL3J1c3RsaWIv aTY4Ni11bmtub3duLWZyZWVic2QvbGliL2xpYnJ1c3RjX2JhY2stZTgwMTYzODdkNGVjNTJhZi5z bwpleHRyYWN0aW5nIC91c3IvcG9ydHMvbGFuZy9ydXN0L3dvcmsvcnVzdGMtMS4yNS4wLXNyYy9i dWlsZC9jYWNoZS8yMDE4LTAyLTE1L3J1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC50 YXIuZ3oKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0 YwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL3No YXJlCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMv c2hhcmUvbWFuCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2Qv cnVzdGMvc2hhcmUvbWFuL21hbjEKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25v d24tZnJlZWJzZC9ydXN0Yy9zaGFyZS9kb2MKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2 LXVua25vd24tZnJlZWJzZC9ydXN0Yy9zaGFyZS9kb2MvcnVzdAogIGV4dHJhY3RpbmcgcnVzdGMt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2JpbgogIGV4dHJhY3RpbmcgcnVzdGMt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYgogIGV4dHJhY3RpbmcgcnVzdGMt MS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9ydXN0bGliCiAgZXh0cmFjdGlu ZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL3J1c3RsaWIvZXRj CiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvc2hh cmUvbWFuL21hbjEvcnVzdGRvYy4xCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtu b3duLWZyZWVic2QvcnVzdGMvc2hhcmUvbWFuL21hbjEvcnVzdGMuMQogIGV4dHJhY3RpbmcgcnVz dGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL3NoYXJlL2RvYy9ydXN0L0xJQ0VO U0UtQVBBQ0hFCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2Qv cnVzdGMvc2hhcmUvZG9jL3J1c3QvQ09QWVJJR0hUCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAt aTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvc2hhcmUvZG9jL3J1c3QvTElDRU5TRS1NSVQKICBl eHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9iaW4vcnVz dC1nZGIKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0 Yy9iaW4vcnVzdC1sbGRiCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZy ZWVic2QvcnVzdGMvYmluL3J1c3Rkb2MKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVu a25vd24tZnJlZWJzZC9ydXN0Yy9iaW4vcnVzdGMKICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1p Njg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9zaGFyZS9kb2MvcnVzdC9SRUFETUUubWQKICBleHRy YWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9tYW5pZmVzdC5p bgogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xp Yi9saWJydXN0Y19saW50LWU4MDFmYmQ0NzA4MzcwYjAuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfY29uc3RfZXZhbC1m NGI2NDI5MjczMGZiMWMwLnNvCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3du LWZyZWVic2QvcnVzdGMvbGliL2xpYmFyZW5hLWI0MTkwMzUxMDg3ZTQxZjAuc28KICBleHRyYWN0 aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNf bWlyLTA5ZmI2MjliNzFlYzNlNTEuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVu a25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfZHJpdmVyLTAzZjhmZmQ4MTg0YjBiMTIu c28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9s aWIvbGlicnVzdGMtN2Q3MTk1ZTdiNGI0ZjljMi5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9saWJ0ZXJtLThkNDMyZDU0NTBmZWMwODMu c28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9s aWIvbGlicnVzdGNfbWV0YWRhdGEtMTcxYWM1ZWE0NWZkZjIyNC5zbwogIGV4dHJhY3RpbmcgcnVz dGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9saWJzZXJpYWxpemUtYWFm M2IyNDU1MTUxM2U3NC5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL3J1c3RjL2xpYi9saWJydXN0Y19sbHZtLTJlYTU5OWQ2NjY4YWI2YjQuc28KICBleHRy YWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlic3lu dGF4LTRkOGE2YjU0N2Q2ZDg3ZTQuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVu a25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfcHJpdmFjeS1kNGVkYzkwYmI4MDY4NjQ1 LnNvCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMv bGliL2xpYnJ1c3RjX3R5cGVjay1kNmE0YzY0NTM5YTU2YmI1LnNvCiAgZXh0cmFjdGluZyBydXN0 Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL2xpYnJ1c3RjX3Jlc29sdmUt YmU1ODhhYWU5OTEzOTg4Ni5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93 bi1mcmVlYnNkL3J1c3RjL2xpYi9saWJ0ZXN0LTJiYjJiZWY3NzljNDNkZDYuc28KICBleHRyYWN0 aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNf dHJhbnMtZmNmNDVmYzYzMTVlMGNmNi5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYt dW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9saWJydXN0Y19kYXRhX3N0cnVjdHVyZXMtZDk3Yzc4 OTM2YTNlN2EyOC5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVl YnNkL3J1c3RjL2xpYi9saWJwcm9jX21hY3JvLTZiMmZkZmRkNWU1YTcxZTguc28KICBleHRyYWN0 aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNf cGx1Z2luLTU3YWQxMjJmNWViODE0ZTguc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2 LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfZXJyb3JzLTQ0ZjI5ZGQ1NWM0YjFj Yjkuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0 Yy9saWIvbGlicnVzdGNfcGxhdGZvcm1faW50cmluc2ljcy05NDJiNWM5ZTFhNDJhZmQ5LnNvCiAg ZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL2xp YnJ1c3RjX3Bhc3Nlcy02YTFlYzRmN2VhOTFhMTNhLnNvCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0 LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL2xpYnJ1c3RjX3RyYW5zX3V0aWxzLTc5 YWYwOWIwM2U5ZTAyNWEuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24t ZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfY3JhdGVzaW9fc2hpbS0yMWY4YzIwZTExNTQyMzdh LnNvCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMv bGliL2xpYmdyYXBodml6LTMxZGMyOTAwYjg0YzMxMGIuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEu MjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGliZm10X21hY3Jvcy0wYmVmMDRi NThjOTFiMDliLnNvCiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVi c2QvcnVzdGMvbGliL2xpYnJ1c3RjX3NhdmVfYW5hbHlzaXMtZTQ3Nzg4MzAyZThiM2E5Yi5zbwog IGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9s aWJzeW50YXhfcG9zLTdmZmQyOWJkZjM3YTIyYWMuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQu MC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfYWxsb2NhdG9yLTJhMzhk ZGM3ZWEyYWYxMGQuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJl ZWJzZC9ydXN0Yy9saWIvbGlic3RkLWIwZGExOWYyZDY5MjUwMWQuc28KICBleHRyYWN0aW5nIHJ1 c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfaW5jcmVt ZW50YWwtZmMzNGIxMmQwNDZlMmMzZC5zbwogIGV4dHJhY3RpbmcgcnVzdGMtMS4yNC4wLWk2ODYt dW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9saWJzeW50YXhfZXh0LTM3MTc5ZWNiZjcwY2Q4NmQu c28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVua25vd24tZnJlZWJzZC9ydXN0Yy9s aWIvbGlicnVzdGNfY29uc3RfbWF0aC04MjdiM2FhOGVlMjg5MDRlLnNvCiAgZXh0cmFjdGluZyBy dXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL2xpYnJ1c3RjX2JvcnJv d2NrLTI1ZDcwMDc2MGQ5OWZlNWUuc28KICBleHRyYWN0aW5nIHJ1c3RjLTEuMjQuMC1pNjg2LXVu a25vd24tZnJlZWJzZC9ydXN0Yy9saWIvbGlicnVzdGNfYmFjay1lODAxNjM4N2Q0ZWM1MmFmLnNv CiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGli L3J1c3RsaWIvZXRjL2dkYl9ydXN0X3ByZXR0eV9wcmludGluZy5weQogIGV4dHJhY3RpbmcgcnVz dGMtMS4yNC4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL3J1c3RjL2xpYi9ydXN0bGliL2V0Yy9kZWJ1 Z2dlcl9wcmV0dHlfcHJpbnRlcnNfY29tbW9uLnB5CiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAt aTY4Ni11bmtub3duLWZyZWVic2QvcnVzdGMvbGliL3J1c3RsaWIvZXRjL2dkYl9sb2FkX3J1c3Rf cHJldHR5X3ByaW50ZXJzLnB5CiAgZXh0cmFjdGluZyBydXN0Yy0xLjI0LjAtaTY4Ni11bmtub3du LWZyZWVic2QvcnVzdGMvbGliL3J1c3RsaWIvZXRjL2xsZGJfcnVzdF9mb3JtYXR0ZXJzLnB5CmV4 dHJhY3RpbmcgL3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjL2J1aWxk L2NhY2hlLzIwMTgtMDItMTUvY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkLnRhci5n egogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvCiAg ZXh0cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUK ICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFy ZS9tYW4KICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJn by9zaGFyZS9tYW4vbWFuMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL2NhcmdvL3NoYXJlL2RvYwogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL2RvYy9jYXJnbwogIGV4dHJhY3RpbmcgY2FyZ28tMC4y NS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL3pzaAogIGV4dHJhY3RpbmcgY2Fy Z28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL3pzaC9zaXRlLWZ1bmN0 aW9ucwogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2Nhcmdv L2V0YwogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2Nhcmdv L2V0Yy9iYXNoX2NvbXBsZXRpb24uZAogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL2NhcmdvL2JpbgogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLW1ldGFkYXRhLjEKICBleHRy YWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFyZS9tYW4v bWFuMS9jYXJnby1kb2MuMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1m cmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLXJ1c3Rkb2MuMQogIGV4dHJhY3Rpbmcg Y2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2Nh cmdvLXJ1c3RjLjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJz ZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby1wa2dpZC4xCiAgZXh0cmFjdGluZyBjYXJnby0w LjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvbWFuL21hbjEvY2FyZ28tYnVp bGQuMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2Nhcmdv L3NoYXJlL21hbi9tYW4xL2NhcmdvLXBhY2thZ2UuMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLWdlbmVyYXRl LWxvY2tmaWxlLjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJz ZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby11cGRhdGUuMQogIGV4dHJhY3RpbmcgY2FyZ28t MC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLWJl bmNoLjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJn by9zaGFyZS9tYW4vbWFuMS9jYXJnby1zZWFyY2guMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLWZldGNoLjEK ICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFy ZS9tYW4vbWFuMS9jYXJnby1wdWJsaXNoLjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2 LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby1jaGVjay4xCiAgZXh0 cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvbWFu L21hbjEvY2FyZ28teWFuay4xCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3du LWZyZWVic2QvY2FyZ28vc2hhcmUvbWFuL21hbjEvY2FyZ28taW5zdGFsbC4xCiAgZXh0cmFjdGlu ZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvbWFuL21hbjEv Y2FyZ28tdW5pbnN0YWxsLjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24t ZnJlZWJzZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby1jbGVhbi4xCiAgZXh0cmFjdGluZyBj YXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvbWFuL21hbjEvY2Fy Z28tbG9naW4uMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNk L2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLXZlcnNpb24uMQogIGV4dHJhY3RpbmcgY2FyZ28t MC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLXJ1 bi4xCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28v c2hhcmUvbWFuL21hbjEvY2FyZ28uMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5r bm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL21hbi9tYW4xL2NhcmdvLW93bmVyLjEKICBleHRyYWN0 aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFyZS9tYW4vbWFu MS9jYXJnby1pbml0LjEKICBleHRyYWN0aW5nIGNhcmdvLTAuMjUuMC1pNjg2LXVua25vd24tZnJl ZWJzZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby10ZXN0LjEKICBleHRyYWN0aW5nIGNhcmdv LTAuMjUuMC1pNjg2LXVua25vd24tZnJlZWJzZC9jYXJnby9zaGFyZS9tYW4vbWFuMS9jYXJnby1u ZXcuMQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2Nhcmdv L3NoYXJlL2RvYy9jYXJnby9MSUNFTlNFLUFQQUNIRQogIGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4w LWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJlL2RvYy9jYXJnby9MSUNFTlNFLU1JVAog IGV4dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL3NoYXJl L2RvYy9jYXJnby9MSUNFTlNFLVRISVJELVBBUlRZCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1LjAt aTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvZG9jL2NhcmdvL1JFQURNRS5tZAogIGV4 dHJhY3RpbmcgY2FyZ28tMC4yNS4wLWk2ODYtdW5rbm93bi1mcmVlYnNkL2NhcmdvL21hbmlmZXN0 LmluCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28v ZXRjL2Jhc2hfY29tcGxldGlvbi5kL2NhcmdvCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1LjAtaTY4 Ni11bmtub3duLWZyZWVic2QvY2FyZ28vYmluL2NhcmdvCiAgZXh0cmFjdGluZyBjYXJnby0wLjI1 LjAtaTY4Ni11bmtub3duLWZyZWVic2QvY2FyZ28vc2hhcmUvenNoL3NpdGUtZnVuY3Rpb25zL19j YXJnbwpydW5uaW5nOiAvdXNyL3BvcnRzL2xhbmcvcnVzdC93b3JrL3J1c3RjLTEuMjUuMC1zcmMv YnVpbGQvaTY4Ni11bmtub3duLWZyZWVic2Qvc3RhZ2UwL2Jpbi9jYXJnbyBidWlsZCAtLW1hbmlm ZXN0LXBhdGggL3Vzci9wb3J0cy9sYW5nL3J1c3Qvd29yay9ydXN0Yy0xLjI1LjAtc3JjL3NyYy9i b290c3RyYXAvQ2FyZ28udG9tbCAtLXZlcmJvc2UgLS1mcm96ZW4KKioqIEVycm9yIGNvZGUgMQoK U3RvcC4KbWFrZVsxXTogc3RvcHBlZCBpbiAvdXNyL3BvcnRzL2xhbmcvcnVzdAoqKiogRXJyb3Ig Y29kZSAxCgpTdG9wLgptYWtlOiBzdG9wcGVkIGluIC91c3IvcG9ydHMvbGFuZy9ydXN0Cg== ------=_Part_1357481_816768852.1523985912680-- From owner-freebsd-current@freebsd.org Tue Apr 17 17:38:16 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E8086F8CC08 for ; Tue, 17 Apr 2018 17:38:15 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 671B16846F for ; Tue, 17 Apr 2018 17:38:15 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 1EB48F8CC07; Tue, 17 Apr 2018 17:38:15 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EBCA7F8CC03 for ; Tue, 17 Apr 2018 17:38:14 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-io0-x232.google.com (mail-io0-x232.google.com [IPv6:2607:f8b0:4001:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 79ED36846A; Tue, 17 Apr 2018 17:38:14 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-io0-x232.google.com with SMTP id v13so23350533iob.6; Tue, 17 Apr 2018 10:38:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=yJwNyLXTl0g+BFDh0t3u/VV2q1Zy6fpo2jfmq6RHv1E=; b=brcASXnFGYODeYOX+Z5O+4r3zG/lQK6AwBCf0F+HuKw8VI6Hkv1icXkxiXFwBF4ldf 27Sdquj+Pl37QgICiOs4xgGs690FsBlQ4eX6y5oQtVmqf4SOefJ6Yo3idI6vcFCQq7gm DQFRUGhqHJgNciwGXo34hSRqU5/MZCzNjWUPdgW0wrkf4wJBNRp70XpAf5jFm73jqpm4 Jxn3tA6fz4qwoM8JO71921/1kxPmtB7EpkA+654yiddLCVHD+NXhOymNNQJBh9D+z5t0 lSKlo6U+gHhqZ+hnjtDzXsnMy2/0G6gxRuu8hBhHr8Abjg5XWq/emowjJ7TvIfCDDYKk hdUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=yJwNyLXTl0g+BFDh0t3u/VV2q1Zy6fpo2jfmq6RHv1E=; b=EDzNDQ/DqATwF7NZtURMwhtHEXHVokXsLCQa9aziAwHqOIuX6Z3aoDrhwBlsyToN0s meD/EBYcKFUuZRmxI/6rZzMw0xPcs2/Oli27bUCiYa0Edr6Cc/YLL6/jgHI3EmYUXfoQ FqGmE3RiWYAjiU7OW3aDVUD83HC2FJnUu71258nfF1DSEveULgh3wb2EcBE1ZTofpxW4 xqHHNubELkedGnT5sKauhFV1eMZcyGITGn1iD8O619bxopnZreAtvEsGdlLQUMVnrwOH b5dul2+qlyvBzq6RrtXitEwRyXrVXy51v5ae1SVx+ged4nhyTHDIhNKQ8K6mo5GqeyaX 7l7A== X-Gm-Message-State: ALQs6tD+rV8IzQSoCaH0P6tqmgsLO/6+fH/133FpzI6xIiqT9SZvgiyJ 5cjL7FnMNTzGzwr4oxRsECZ5RQ== X-Google-Smtp-Source: AIpwx48TVL9EM9KIrQ9tb6+MqOZm8JWEbRYF0cLu3m5Qu43quMj0CeMe/O2b6/ZsYMZOTwNdyiZpUA== X-Received: by 10.107.101.21 with SMTP id z21mr2900148iob.3.1523986693534; Tue, 17 Apr 2018 10:38:13 -0700 (PDT) Received: from raichu (toroon0560w-lp130-04-184-145-252-74.dsl.bell.ca. [184.145.252.74]) by smtp.gmail.com with ESMTPSA id h65sm3755140ioi.37.2018.04.17.10.38.12 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Apr 2018 10:38:12 -0700 (PDT) Sender: Mark Johnston Date: Tue, 17 Apr 2018 13:38:05 -0400 From: Mark Johnston To: John Baldwin Cc: current@freebsd.org, alc@freebsd.org, kib@freebsd.org Subject: Re: panic: VM object not locked in vm_page_ps_test() Message-ID: <20180417173805.GA59878@raichu> References: <3824784.INBv7mSNC3@ralph.baldwin.cx> <2532283.a7IeCc7LOW@ralph.baldwin.cx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2532283.a7IeCc7LOW@ralph.baldwin.cx> User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 17:38:16 -0000 On Tue, Apr 17, 2018 at 10:03:55AM -0700, John Baldwin wrote: > On Tuesday, April 17, 2018 10:01:41 AM John Baldwin wrote: > > My laptop running recent head panicked this morning, apparently from hitting > > a key to stop the screensaver (at which point xscreensaver prompts for a > > password to unlock). > > (Sorry, buggy mail client sent this early) > > panic: Lock vm object not locked @ /usr/src/sys/vm/vm_page.c:4135 > > #4 0xffffffff805e4893 in panic (fmt=) > at /usr/src/sys/kern/kern_shutdown.c:764 > #5 0xffffffff805dff22 in __rw_assert (c=, > what=, file=, line=) > at /usr/src/sys/kern/kern_rwlock.c:1397 > #6 0xffffffff80882723 in vm_page_ps_test (m=0xfffff80431c2e980, flags=7, > skip_m=0xfffff80431c34890) at /usr/src/sys/vm/vm_page.c:4135 > #7 0xffffffff80867d84 in vm_fault_soft_fast (vaddr=, > prot=, fault_type=, > fault_flags=, wired=0, fs=, > m_hold=) at /usr/src/sys/vm/vm_fault.c:307 > #8 vm_fault_hold (map=0xfffff8000832a000, vaddr=, > fault_type=, fault_flags=, m_hold=0x0) > at /usr/src/sys/vm/vm_fault.c:610 > #9 0xffffffff80866cf5 in vm_fault (map=0xfffff8000832a000, > vaddr=, fault_type=2 '\002', fault_flags=0) > at /usr/src/sys/vm/vm_fault.c:514 > #10 0xffffffff808bc64c in trap_pfault (frame=0xfffffe008b1dbac0, usermode=1) > at /usr/src/sys/amd64/amd64/trap.c:728 > #11 0xffffffff808bbe1e in trap (frame=0xfffffe008b1dbac0) > #12 > #13 0x0000000805b51556 in ?? () > > (kgdb) frame 6 > #6 0xffffffff80882723 in vm_page_ps_test (m=0xfffff80431c2e980, flags=7, > skip_m=0xfffff80431c34890) at /usr/src/sys/vm/vm_page.c:4135 > (kgdb) l > 4130 { > 4131 vm_object_t object; > 4132 int i, npages; > 4133 > 4134 object = m->object; > 4135 VM_OBJECT_ASSERT_LOCKED(object); > 4136 npages = atop(pagesizes[m->psind]); > 4137 > 4138 /* > 4139 * The physically contiguous pages that make up a superpage, i.e., a > (kgdb) p m->object > $1 = (vm_object_t) 0xfffff80190785900 > (kgdb) p pagesizes[m->psind] > $3 = 2097152 > (kgdb) up > #7 0xffffffff80867d84 in vm_fault_soft_fast (vaddr=, > prot=, fault_type=, > fault_flags=, wired=0, fs=, > m_hold=) at /usr/src/sys/vm/vm_fault.c:307 > 307 if (vm_page_ps_test(m_super, flags, m)) { > (kgdb) p m->object > $4 = (vm_object_t) 0xfffff80190116a00 > (kgdb) p/x m->flags > $5 = 0x0 > > So 'm' (original page fault page) and 'm_super' are from different VM > objects. Why are they part of the same reservation? > > (kgdb) p m->phys_addr >> (9 + 12) > $7 = 4514 > (kgdb) p vm_reserv_array[$7] > $8 = {lock = {lock_object = {lo_name = 0xffffffff8099112c "vm reserv", > lo_flags = 16973824, lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}, > partpopq = {tqe_next = 0x0, tqe_prev = 0xfffff80423656680}, objq = { > le_next = 0xfffff8042365b0c0, le_prev = 0xfffff80190116ab8}, > object = 0xfffff80190116a00, pindex = 1760, pages = 0xfffff80431c2e980, > domain = 0, popcnt = 512, inpartpopq = 0 '\000', popmap = { > 18446744073709551615, 18446744073709551615, 18446744073709551615, > 18446744073709551615, 18446744073709551615, 18446744073709551615, > 18446744073709551615, 18446744073709551615}} > (kgdb) set $rv = vm_reserv_array[$7] > (kgdb) p $rv.object > $9 = (vm_object_t) 0xfffff80190116a00 > > So rv->object matches m->object ($4) but not m_super->object ($1). > Double-checking: > > (kgdb) p m_super->object > $10 = (vm_object_t) 0xfffff80190785900 > > Other conditions in vm_reserv_to_superpage() are true: > > (kgdb) p $rv.pages > $11 = (vm_page_t) 0xfffff80431c2e980 > (kgdb) p m_super > $12 = (vm_page_t) 0xfffff80431c2e980 > (kgdb) p $rv.popcnt > $13 = 512 > > Both objects are OBJT_DEFAULT objects: > > (kgdb) p *m->object > $14 = {lock = {lock_object = {lo_name = 0xffffffff8095e7ce "vm object", > lo_flags = 627245056, lo_data = 0, lo_witness = 0x0}, rw_lock = 41}, > object_list = {tqe_next = 0xfffff80190116b00, > tqe_prev = 0xfffff80190116920}, shadow_head = {lh_first = 0x0}, > shadow_list = {le_next = 0x0, le_prev = 0xfffff80190785930}, memq = { > tqh_first = 0xfffff80431ddf878, tqh_last = 0xfffff80431e2a900}, rtree = { > rt_root = 18446735284333515328}, size = 2829, domain = {dr_policy = 0x0, > dr_iterator = 0}, generation = 1, ref_count = 3, shadow_count = 0, > memattr = 6 '\006', type = 0 '\000', flags = 12352, pg_color = 1824, > paging_in_progress = 1, resident_page_count = 1024, > backing_object = 0xfffff80190785900, backing_object_offset = 0, > pager_object_list = {tqe_next = 0x0, tqe_prev = 0x0}, rvq = { > lh_first = 0xfffff80423659540}, handle = 0x0, un_pager = {vnp = { > vnp_size = 0, writemappings = 0}, devp = {devp_pglist = { > tqh_first = 0x0, tqh_last = 0x0}, ops = 0x0, dev = 0x0}, sgp = { > sgp_pglist = {tqh_first = 0x0, tqh_last = 0x0}}, swp = {swp_tmpfs = 0x0, > swp_blks = {pt_root = 0}}}, cred = 0xfffff80008d99500, > charge = 11587584, umtx_data = 0x0} > (kgdb) p *m_super->object > $15 = {lock = {lock_object = {lo_name = 0xffffffff8095e7ce "vm object", > lo_flags = 627245056, lo_data = 0, lo_witness = 0x0}, rw_lock = 1}, > object_list = {tqe_next = 0xfffff80190785a00, > tqe_prev = 0xfffff80190785820}, shadow_head = { > lh_first = 0xfffff80190116a00}, shadow_list = { > le_next = 0xfffff801902b2100, le_prev = 0xfffff80008d61d30}, memq = { > tqh_first = 0xfffff80431bd0720, tqh_last = 0xfffff80431c49b70}, rtree = { > rt_root = 18446735284336303488}, size = 2829, domain = {dr_policy = 0x0, > dr_iterator = 0}, generation = 1, ref_count = 1, shadow_count = 1, > memattr = 6 '\006', type = 0 '\000', flags = 4096, pg_color = 42784, > paging_in_progress = 0, resident_page_count = 2820, backing_object = 0x0, > backing_object_offset = 0, pager_object_list = {tqe_next = 0x0, > tqe_prev = 0x0}, rvq = {lh_first = 0xfffff80423659680}, handle = 0x0, > un_pager = {vnp = {vnp_size = 0, writemappings = 0}, devp = {devp_pglist = { > tqh_first = 0x0, tqh_last = 0x0}, ops = 0x0, dev = 0x0}, sgp = { > sgp_pglist = {tqh_first = 0x0, tqh_last = 0x0}}, swp = {swp_tmpfs = 0x0, > swp_blks = {pt_root = 0}}}, cred = 0xfffff80008d99500, > charge = 11587584, umtx_data = 0x0} > > Huh, m_super's object is the backing object of the object for 'm' and > 'rv': My suspicion is that there's a thread collapsing m->object with its backing object. As it moves pages into the backing object, vm_reserv_rename() can cause a situation where pages allocated from a reservation do not belong to the same object as that reservation. I think that the fast path should simply verify that m_super->object == m->object. If that's not true then we have to fall back to the slow path anyway because the "object consistency test" in vm_page_ps_test() will fail. diff --git a/sys/vm/vm_fault.c b/sys/vm/vm_fault.c index 2a951759325b..b546be7ea4d8 100644 --- a/sys/vm/vm_fault.c +++ b/sys/vm/vm_fault.c @@ -287,6 +287,7 @@ vm_fault_soft_fast(struct faultstate *fs, vm_offset_t vaddr, vm_prot_t prot, #if defined(__amd64__) && VM_NRESERVLEVEL > 0 if ((m->flags & PG_FICTITIOUS) == 0 && (m_super = vm_reserv_to_superpage(m)) != NULL && + m_super->object == m->object && rounddown2(vaddr, pagesizes[m_super->psind]) >= fs->entry->start && roundup2(vaddr + 1, pagesizes[m_super->psind]) <= fs->entry->end && (vaddr & (pagesizes[m_super->psind] - 1)) == (VM_PAGE_TO_PHYS(m) & From owner-freebsd-current@freebsd.org Tue Apr 17 17:01:45 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 42F08F8A75D for ; Tue, 17 Apr 2018 17:01:45 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D1AF77F68D for ; Tue, 17 Apr 2018 17:01:44 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 8DD8BF8A75A; Tue, 17 Apr 2018 17:01:44 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7B29CF8A759 for ; Tue, 17 Apr 2018 17:01:44 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mail.baldwin.cx (bigwig.baldwin.cx [IPv6:2001:470:1f11:75::1]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 20D3A7F682; Tue, 17 Apr 2018 17:01:44 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from ralph.baldwin.cx (ralph.baldwin.cx [66.234.199.215]) by mail.baldwin.cx (Postfix) with ESMTPSA id C0EBA10A87D; Tue, 17 Apr 2018 13:01:42 -0400 (EDT) From: John Baldwin To: current@freebsd.org Cc: alc@freebsd.org, kib@freebsd.org, markj@freebsd.org Subject: panic: VM object not locked in vm_page_ps_test() Date: Tue, 17 Apr 2018 10:01:41 -0700 Message-ID: <3824784.INBv7mSNC3@ralph.baldwin.cx> User-Agent: KMail/4.14.10 (FreeBSD/11.1-STABLE; KDE/4.14.30; amd64; ; ) MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mail.baldwin.cx); Tue, 17 Apr 2018 13:01:42 -0400 (EDT) X-Virus-Scanned: clamav-milter 0.99.2 at mail.baldwin.cx X-Virus-Status: Clean X-Mailman-Approved-At: Tue, 17 Apr 2018 17:38:17 +0000 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 17:01:45 -0000 My laptop running recent head panicked this morning, apparently from hitting a key to stop the screensaver (at which point xscreensaver prompts for a password to unlock). -- John Baldwin From owner-freebsd-current@freebsd.org Tue Apr 17 19:08:36 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CD315F92AAC for ; Tue, 17 Apr 2018 19:08:36 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-it0-x233.google.com (mail-it0-x233.google.com [IPv6:2607:f8b0:4001:c0b::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5A7D67E840 for ; Tue, 17 Apr 2018 19:08:36 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: by mail-it0-x233.google.com with SMTP id q85-v6so17638616itc.0 for ; Tue, 17 Apr 2018 12:08:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=Vx0Br4pnQ3b18Lfa20x90a908qfifrhV4u4UMlXKfDU=; b=o+15cifRcPqK7oKvpo/DMg/Z2ZWfZADK3e234Tc83ZxKT2SIN12gEYSdVjRj1sVJmc /bKPNn7G7nyKN5MiZw0rB0qEGZHjW32xPKC5xxTiKKOP8YF6QiOPhdT9zqcC9Xi9aHTc Ho76quQTSg/OzC0wDmJrqfERrKI9mrS4uQ3wOD3Xz/fB/R5RTrmO/dpurEZ2Z1iOBOo4 zoQYZDFNYb4QR/3atalOT7xkfDeVzjfhrXZbFm3YYzJH2VLM6ZEHahaPB2dzdpRNS8L0 tPBRCd+vMqR0u/hwaQmMjC8qWySiVBUfNVUtJBfxsciCv8MguBvpBvj5KGFYjX5PeWNb 6m8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=Vx0Br4pnQ3b18Lfa20x90a908qfifrhV4u4UMlXKfDU=; b=cuX1O/gNQLM401eZ9qJYdclc6Iq8QpKBmUaOx8IDsfGFOVv9HAsGOsYf+MKwzAHf6r Pe3N2jA5Gfn7H7WXBviowCiQb9Wql59tU0bT1OILz7GwgA6wyBkQNdj6wI44iDxqd0rN OIPH2ptKpG72RMTMeOKcLrYB5v5FfunqWWSZMf+4tplE+C4zUuAXhEmbTHY+4sT+TSD1 Rzdsg+Hm7Gim2hA//ug7D+V5UeEZP47tHER1LJ/dvknAOBHGrry0qEcaRZT84Gc4V/bo c5sCOKYLEdYK96B7p3aEsaDRtGgM08/U32HPUboi1eB060oExwC73tG176J7MZPzo2xy i7GA== X-Gm-Message-State: ALQs6tA1F+12bnSVeBvCuZnhmySxpaltX2Z5Izi1XUte2CKvfRAOjPeo UYwZW14jQMbcJZV1jp0SvlAOeIOE+HfbI7CSVppO+Q== X-Google-Smtp-Source: AIpwx49xNfOsMDiysrG/pF3kKyfG88zGj3Y5sWj3+GIUWxbbugnYd7qFT7qUbKMaN9jvrWh3SfamTwIxATsesegFF60= X-Received: by 2002:a24:dfc3:: with SMTP id r186-v6mr2508108itg.114.1523992115712; Tue, 17 Apr 2018 12:08:35 -0700 (PDT) MIME-Version: 1.0 Sender: carpeddiem@gmail.com Received: by 10.107.130.197 with HTTP; Tue, 17 Apr 2018 12:08:15 -0700 (PDT) In-Reply-To: <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> <20180417111342.287459ed@rsbsd.rsb.ber> <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> From: Ed Maste Date: Tue, 17 Apr 2018 15:08:15 -0400 X-Google-Sender-Auth: WqSDGeUs38J1sOfZQzUa5rv6pzU Message-ID: Subject: Re: snapshot of april 12th wont boot at all To: Shawn Webb Cc: Beeblebrox , FreeBSD Current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 19:08:37 -0000 On 17 April 2018 at 11:17, Shawn Webb wrote: > > HardenedBSD enables PTI regardless of underlying CPU by default. We've > found that some older AMD CPUs have issues with PTI as currently > implemented. The oldest AMD CPU I have is a FX-6100, and FreeBSD-CURRENT works fine there with PTI enabled. If this is reproducible on stock FreeBSD can you submit a PR with CPU details? From owner-freebsd-current@freebsd.org Tue Apr 17 19:16:07 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E89F4F934B6; Tue, 17 Apr 2018 19:16:06 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D0CC27F883; Tue, 17 Apr 2018 19:16:03 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f8W53-000PE3-UV ; Tue, 17 Apr 2018 22:15:53 +0300 Date: Tue, 17 Apr 2018 22:15:53 +0300 From: Vitalij Satanivskij To: John Baldwin Cc: freebsd-current@freebsd.org, satan@ukr.net, cem@freebsd.org, Stephen Hurd , Matthew Macy , "freebsd-hackers@freebsd.org" , Stephen Hurd Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180417191553.GA95803@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <20180416191213.GA53406@hell.ukr.net> <3723755.0KMZDfyMWu@ralph.baldwin.cx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3723755.0KMZDfyMWu@ralph.baldwin.cx> User-Agent: Mutt/1.9.5 (2018-04-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 19:16:07 -0000 Dear John I'm try patch with no success http://hell.ukr.net/panic/recorder_patch165.webm Also I'm enable verbose boot and record boot process (hpet was disabled so crash in another driver atach) http://hell.ukr.net/panic/recorder_patch_verbose.webm root@test:/usr/src # svnlite diff Index: sys/x86/x86/msi.c =================================================================== --- sys/x86/x86/msi.c (revision 332650) +++ sys/x86/x86/msi.c (working copy) @@ -404,7 +404,7 @@ /* Do we need to create some new sources? */ if (cnt < count) { /* If we would exceed the max, give up. */ - if (i + (count - cnt) > FIRST_MSI_INT + NUM_MSI_INTS) { + if (i + (count - cnt) >= FIRST_MSI_INT + NUM_MSI_INTS) { mtx_unlock(&msi_lock); free(mirqs, M_MSI); return (ENXIO); @@ -645,7 +645,7 @@ /* Do we need to create a new source? */ if (msi == NULL) { /* If we would exceed the max, give up. */ - if (i + 1 > FIRST_MSI_INT + NUM_MSI_INTS) { + if (i + 1 >= FIRST_MSI_INT + NUM_MSI_INTS) { mtx_unlock(&msi_lock); return (ENXIO); } root@test:/usr/src If you need any aditional information please tell me about. JB> > If one of this parameters not set as described system not boot ^( JB> JB> Please try the patch from here https://reviews.freebsd.org/P165 JB> JB> -- JB> John Baldwin JB> _______________________________________________ JB> freebsd-hackers@freebsd.org mailing list JB> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers JB> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Tue Apr 17 20:30:01 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E15DAF986E1 for ; Tue, 17 Apr 2018 20:30:00 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: from mail-yb0-x22d.google.com (mail-yb0-x22d.google.com [IPv6:2607:f8b0:4002:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 796AA711D7 for ; Tue, 17 Apr 2018 20:30:00 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: by mail-yb0-x22d.google.com with SMTP id z1-v6so4673630ybn.11 for ; Tue, 17 Apr 2018 13:30:00 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:references:mime-version :content-transfer-encoding:subject:cc:from:message-id; bh=rbN2qifwxEp/NLs/PjbIxftcJISvxqvVhkM2H+GIy/4=; b=tFoayAxYUCew8jPsU1c1ad+3HgxVamIOy1e3ZLtvTOikfSzb8R6QKBHyG+yAZvsFf1 IDguzDnFL7PdOsYIPjugHh+3ljtXUdE9jtsoN/1S2jY5rLk+CfEIkoxAvuxXAfKR6iCK SQ+txkxS8D0EZKfSkxIDhLosK3xgQbamF5Njbzr7YJY0J66hMNLBh6a5KxQRpUSr4aDx luMObr2/ERhpqNcodMGUh3p/A/5E5J7QZHSRZwNTPctC/zceyY5xszKPzBG0ju3No6Bv 4fAKj9tWY1v2t1LLVpdIJZtP9XlDZQdxe8ROYpkIDZwSw58eftCQ6E0KthjVLIGoGZP+ texQ== X-Gm-Message-State: ALQs6tA52lPQ5i4Hp5s54YSULBWyyklQaveQnCVAWNMXzN6B3Xj5aHzw OEseoLOyCOZjvHb3mQMmNo2+9+L5 X-Google-Smtp-Source: AIpwx4/eoP+rw8P2IPG/7IDJBB1d/PU4fPMEDtiXDCu6jM7nsklqn9yreEA3LtE/je9xr6u/Hzvx3A== X-Received: by 2002:a25:ae68:: with SMTP id g40-v6mr2670353ybe.140.1523996999640; Tue, 17 Apr 2018 13:29:59 -0700 (PDT) Received: from [192.168.1.145] ([68.202.91.152]) by smtp.gmail.com with ESMTPSA id h1sm6860621ywm.59.2018.04.17.13.29.58 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 13:29:58 -0700 (PDT) Sender: "Raif S. Berent" Date: Tue, 17 Apr 2018 20:29:59 +0000 In-Reply-To: References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> <20180417111342.287459ed@rsbsd.rsb.ber> <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: snapshot of april 12th wont boot at all CC: FreeBSD Current From: Beeblebrox Message-ID: <9E629D23-A8FF-430C-8168-570FBADADAE3@berentweb.com> X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 20:30:01 -0000 Hello Ed=2E > If this is reproducible on stock FreeBSD can you submit a PR with CPU de= tails? I don't have a cloned repo of FreeBSD, but AFAIK it's the "options PAX_*" = related knobs in the kernel that, if eliminated, would revert the system to= a FreeBSD one for all intents and purposes? I can just build MINIMAL or GE= NERIC and try if that's the case=2E Separate finding I have for this CPU is that with an unlocked 4th core (ge= ts detected as Phenom II X4 B60 instead of Athlon II X3) observable odditie= s are: * Some ports have runaway builds under poudriere, end up filling swap and = fail=2E www/webkit-gtk2 is an example=2E This could also be due to separate= src=2Econf settings used to build the poudriere jail world=2E * Xorg desktop becomes jittery, mouse control is difficult=2E Mentioning these to ask whether you prefer them to be included in PR? Regards=2E From owner-freebsd-current@freebsd.org Tue Apr 17 21:21:10 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7312DF9C2D4; Tue, 17 Apr 2018 21:21:10 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mail.baldwin.cx (bigwig.baldwin.cx [96.47.65.170]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2690F7F6AE; Tue, 17 Apr 2018 21:21:09 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from ralph.baldwin.cx (ralph.baldwin.cx [66.234.199.215]) by mail.baldwin.cx (Postfix) with ESMTPSA id 4BD8D10AFAD; Tue, 17 Apr 2018 17:21:02 -0400 (EDT) From: John Baldwin To: Vitalij Satanivskij Cc: freebsd-current@freebsd.org, cem@freebsd.org, Stephen Hurd , Matthew Macy , "freebsd-hackers@freebsd.org" , Stephen Hurd Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Date: Tue, 17 Apr 2018 13:42:19 -0700 Message-ID: <3628282.XVdngBdGlp@ralph.baldwin.cx> User-Agent: KMail/4.14.10 (FreeBSD/11.1-STABLE; KDE/4.14.30; amd64; ; ) In-Reply-To: <20180417191553.GA95803@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <3723755.0KMZDfyMWu@ralph.baldwin.cx> <20180417191553.GA95803@hell.ukr.net> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mail.baldwin.cx); Tue, 17 Apr 2018 17:21:02 -0400 (EDT) X-Virus-Scanned: clamav-milter 0.99.2 at mail.baldwin.cx X-Virus-Status: Clean X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 21:21:10 -0000 On Tuesday, April 17, 2018 10:15:53 PM Vitalij Satanivskij wrote: > Dear John > > I'm try patch with no success > > http://hell.ukr.net/panic/recorder_patch165.webm > > Also I'm enable verbose boot and record boot process (hpet was disabled so crash in another driver atach) > http://hell.ukr.net/panic/recorder_patch_verbose.webm > > root@test:/usr/src # svnlite diff > Index: sys/x86/x86/msi.c > =================================================================== > --- sys/x86/x86/msi.c (revision 332650) > +++ sys/x86/x86/msi.c (working copy) > @@ -404,7 +404,7 @@ > /* Do we need to create some new sources? */ > if (cnt < count) { > /* If we would exceed the max, give up. */ > - if (i + (count - cnt) > FIRST_MSI_INT + NUM_MSI_INTS) { > + if (i + (count - cnt) >= FIRST_MSI_INT + NUM_MSI_INTS) { > mtx_unlock(&msi_lock); > free(mirqs, M_MSI); > return (ENXIO); > @@ -645,7 +645,7 @@ > /* Do we need to create a new source? */ > if (msi == NULL) { > /* If we would exceed the max, give up. */ > - if (i + 1 > FIRST_MSI_INT + NUM_MSI_INTS) { > + if (i + 1 >= FIRST_MSI_INT + NUM_MSI_INTS) { > mtx_unlock(&msi_lock); > return (ENXIO); > } > root@test:/usr/src > > If you need any aditional information please tell me about. Can you perhaps turn off the stack trace on boot to not lose the panic messages (remove KDB_TRACE from kernel config) and maybe modify the panic message to include the IRQ number passed to nexus_add_irq? -- John Baldwin From owner-freebsd-current@freebsd.org Tue Apr 17 21:27:16 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2FA6CF9CA4E for ; Tue, 17 Apr 2018 21:27:16 +0000 (UTC) (envelope-from waw@bsdmail.com) Received: from mout.gmx.com (mout.gmx.com [74.208.4.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mail.gmx.com", Issuer "thawte SSL CA - G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B076C7FCB8 for ; Tue, 17 Apr 2018 21:27:15 +0000 (UTC) (envelope-from waw@bsdmail.com) Received: from [71.255.183.99] ([71.255.183.99]) by 3c-app-mailcom-lxa06.server.lan (via HTTP); Tue, 17 Apr 2018 23:27:12 +0200 MIME-Version: 1.0 Message-ID: From: "wes wroten" To: freebsd-current@freebsd.org Subject: Re: snapshot of april 12th wont boot at all Content-Type: text/plain; charset=UTF-8 Date: Tue, 17 Apr 2018 23:27:12 +0200 Importance: normal Sensitivity: Normal X-Priority: 3 X-Provags-ID: V03:K1:H5NBBPJ9Ox0RS3YCaiSCH8TTH9i0nOj5Ig9gv0d3GSP 22N3SxvQU1IR5fOc87F9kySz8a47qTGvJ6ZGjjR/7lcCgSa86H IL0XxPww67LVov69FSuKkXdFkB7NJoxfLUNgh5IvBTmlAHGK8Z jpLkyIfaSJw2OtSagMj268Pr2hEE3YixJ1u0CpBbmUufGhA9Yo bNIJvcS4JOuv1EMGBwFT0yCoCnf89d7tNv9TLrf3chj8Mq0oKJ C8nAMsPDk1TW6tgzwhXtasnnWC0R1aYZsFLfXNM40q83KZnuVQ tR7O/c= X-UI-Out-Filterresults: notjunk:1;V01:K0:q2lqyKdZ2I4=:S3q8hrtHXcKInVIXTLIxDm PlGX1T33qd/2xBylNEbPb0XwnH8bua/mITNDuy0PiHZM/OMtTvibo441MgQyFG2Z13JJm+zlf xJgN6rfJFJnkPw9PJirW4vmEwcAcrgqIq2EqRBWyanswDW/EzIEcajA797XELAbtFzddmxZuQ hevi6G1Zdm6MAFNjObJyliJKzENT4Li0K4ubDWSyNam+xU/gT3EXpVzlvEpQdINDJ2uofPriW PasUCLxDDXj7cjBf8KW6WpIyWzrDu7zkMAr0YDQ39dxTSKTUJz/FkVCvTjQdsyaUh0P7/zTZn EpDBuDpEg5aseHDB85linBW874BGS3AE3EJKoIPaGAc6k7UhtduAQNDdm86n41Trc7gWanYpL qY4uvn7khRJMW4J/lQN0oqaqzKOss+HoMyWs0bXgsbruI5XspI87whnFeimRdAm8zAvf6AEnL YN4jT9Lkha2zTAr3jr0Al1glHBKSSAyyQW9jbPkb3BuVWuvfQEz8m5WhzMR4PyO6SrNE4Lvjr nV0cTfO1fo9HBDdMuEgKZ/mVtzxjF8ucYKcQ6WC/pRs X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 21:27:16 -0000 I am sorry i sent a blank email, I didn't know better so i changed it to text only. the problem i have is during the boot from the cd-rom is I just get a big black screen with a cursor and that's all, not even an attempt to install, nothing my machine is running freebsd 11.1-STABLE currently but i want to switch to 12-CURRENT to help out with the project in ANY way I can. i have an amd64 4gb ram (but 12g swap) any other machine questions? ill happily answer if i know how ~wes From owner-freebsd-current@freebsd.org Tue Apr 17 22:52:41 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 31A24FA2B0B for ; Tue, 17 Apr 2018 22:52:41 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: from mail-yw0-x231.google.com (mail-yw0-x231.google.com [IPv6:2607:f8b0:4002:c05::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BC5FE75BF0 for ; Tue, 17 Apr 2018 22:52:40 +0000 (UTC) (envelope-from zaphod@berentweb.com) Received: by mail-yw0-x231.google.com with SMTP id 199so1224794ywd.9 for ; Tue, 17 Apr 2018 15:52:40 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:references:mime-version :content-transfer-encoding:subject:cc:from:message-id; bh=OmCMpdknOOwczYdRvWO/6kAkbFa9mqEs8BSlBitu/Yk=; b=jFKmemWKSrQby1RR5Z1cjfZQma5/pI68cKRmKMlQMnph7i0FhQulCcawv4jvVeNMIz OgKKcUStHKwwjeOWnKOsF13ll11oqVCzKPZkCm7uYwXVZKkCpX7PoaECSmLJgzIIWN0t UxjuCnqJxesUGdvjS1TdEC7hxycDJHjzdJcXWVNIjz/yKxIuKkxwzakwN1ZsTbbYpztQ 10wk4J0Mmz8UQHEivitlfJ4ecRS1+v0ZfhGiX4wUp+5a8pOqBw5uW7iiA9KF/0qayzbH rMp1lgxXlS9P2pw3gb6+PV7eCdTjlbcLcUuZTQyWcVIt5VnDFqAG6xOvvrYNXAH6Zgqf uNEQ== X-Gm-Message-State: ALQs6tDnc1LpYxwQMoegF02g1Pw+cawscSIqG//d8gAoAS7eDW8JXSXx N5bYFg9joiUFF/73WeY1VNCFoavP X-Google-Smtp-Source: AIpwx48eVvZtSMk1y3909ZEnZr+v51HrYgJNQGGH+/KrkYaVmFFulA/QajO8K54B7SD6X4+tMb90/Q== X-Received: by 10.129.87.88 with SMTP id l85mr2879002ywb.200.1524005559925; Tue, 17 Apr 2018 15:52:39 -0700 (PDT) Received: from [192.168.1.145] ([68.202.91.152]) by smtp.gmail.com with ESMTPSA id j138sm4361658ywg.101.2018.04.17.15.52.38 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 15:52:38 -0700 (PDT) Sender: "Raif S. Berent" Date: Tue, 17 Apr 2018 22:52:40 +0000 In-Reply-To: References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> <20180417111342.287459ed@rsbsd.rsb.ber> <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: snapshot of april 12th wont boot at all CC: FreeBSD Current From: Beeblebrox Message-ID: X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 22:52:41 -0000 My proposed plan did not work anyway, as both MINIMAL and GENERIC fail to b= uild=2E I'll have to clone the FreeBSD repo unless Shawn has something to comment = on this=2E From owner-freebsd-current@freebsd.org Tue Apr 17 23:43:27 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 328BFFA5A87 for ; Tue, 17 Apr 2018 23:43:27 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-wr0-x233.google.com (mail-wr0-x233.google.com [IPv6:2a00:1450:400c:c0c::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A46AE810B0 for ; Tue, 17 Apr 2018 23:43:26 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-wr0-x233.google.com with SMTP id v24so22869223wra.8 for ; Tue, 17 Apr 2018 16:43:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=oCA0MPy4yzbhTIhU5OXiSfPFcXRpVCszrT9VXaJQL9w=; b=ndjSLwajvGOw7w4ZOjY/+EhLlXB8ynBRke7xkWQvou+hbQoEPMCB4D5Tuw0Nbg+rkd AO0C1glmxhaApvDCkGgUDlnB1YQLLZA1FMzvcyoBGk5gvYxVNlsoG7zY/VHw/ucGDw0V fn5RFTjQQyIbn7Bv14Tm6uEdsl9TbwoaZRNA+/5VaawNfrOVbYi5IIewQRtkNJG+KHLX zLzH+b3xFCxHeCrZBlAYs+KiRPFm/sio+FEGcJw5PzDsw6oXZiEAMW2YVP3KTJOEeOYW t0bgiY5Uzt94aEIqRJxRjtRQdg2dHPZmbN+TxS2zMr5SsihJIjJ8pZKTeefMLscJaHTK 8NsA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=oCA0MPy4yzbhTIhU5OXiSfPFcXRpVCszrT9VXaJQL9w=; b=rBQyw/DlE6UkvDSNnOc2sobX1hE+UeUzVvIfWzD7bU9HlAMMcNT8vtASQjrYcDUVeI +bsx2iQ8lx0lGiuQZGxsmsTeMv84CbE96Q0huQi1AIkAyxvz8dtXUoHmEjP1ibZ0dmsj uim0zAwobJlu/7rA19ZVB2hBuVUplpuv53WbE/BLBH7FLlDIwCyHzohgWa76MncdKOh1 LiLRrl4JcDQUsSpQyw8wNiyRNTs9IFWqO5RldQPM5W2+vHhlbfweQ9+NM0g2vOu+2QlE xSbwtt2rtAXMvbBTOy1iu2LanY7mMy6PQECJk7WYVHTLp3fkquA1hhVf823Xmsr+Q/vG /neA== X-Gm-Message-State: ALQs6tBM01FWhODsnZOqK3T5Cyi1C8BwPZqLIbJ6AwfUdgqoejCNZAhc N3rZAPNSdaKM8k58vwCwfzfBc7268gg= X-Google-Smtp-Source: AIpwx4+Qiv/mL1TQqA8l8P9mHUadzSXUY8nHH4nxtxQ0S+VmnnIwDW6s/0HapV9gQ/Z+aOw2+LBz3A== X-Received: by 10.28.24.76 with SMTP id 73mr139056wmy.24.1524008604880; Tue, 17 Apr 2018 16:43:24 -0700 (PDT) Received: from mutt-hbsd ([192.36.27.7]) by smtp.gmail.com with ESMTPSA id 64sm406079wmb.2.2018.04.17.16.43.22 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Apr 2018 16:43:23 -0700 (PDT) Date: Tue, 17 Apr 2018 19:43:16 -0400 From: Shawn Webb To: Beeblebrox Cc: FreeBSD Current Subject: Re: snapshot of april 12th wont boot at all Message-ID: <20180417234316.gaoyz6kix26m4rez@mutt-hbsd> References: <20180417104700.4d6110b9@rsbsd.rsb.ber> <20180417145040.w4cqluxeozg2nubw@mutt-hbsd> <20180417111342.287459ed@rsbsd.rsb.ber> <20180417151701.gxwj4b2oh3eisd73@mutt-hbsd> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="zu4bu3hgw34zvrtm" Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD mutt-hbsd 12.0-CURRENT FreeBSD 12.0-CURRENT X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0x6A84658F52456EEE User-Agent: NeoMutt/20171215 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Apr 2018 23:43:27 -0000 --zu4bu3hgw34zvrtm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Apr 17, 2018 at 10:52:40PM +0000, Beeblebrox wrote: > My proposed plan did not work anyway, as both MINIMAL and GENERIC fail to= build. > I'll have to clone the FreeBSD repo unless Shawn has something to comment= on this. Due to our changing of certain kernel structures, GENERIC likely won't build anymore. FreeBSD's kernel source code contains compile-time assertions that detect when offsets of values within certain key structures are different than expected (example commit f9f820f2e418f9b68f9d94631171135bfb79989f in hardened/current/master). I'm unsure why PTI causes issues in these cases. I would love to attempt to make an effort to debug it myself, but I would need some way to replicate the issue on my end. Thanks, --=20 Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE --zu4bu3hgw34zvrtm Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKrq2ve9q9Ia+iT2eaoRlj1JFbu4FAlrWhpAACgkQaoRlj1JF bu6z9w/+K6dL78fcZXW9GMwTCkBL29U/nNXDi9/ASlzSFSm5TOrI0eF1bjYEZAep TE35PrrfYMWdovACMDZUC1PiC3JKr4oa97c5l7KLgIckshoGYbpFTTJ5upPImjXe 3McVuxL+j3/+x2HkR5pYr8uwXsTB+4G0oj1o6p37+BKP8ZmvE7qE4EecU0hdfoc1 MvEOiHacDUH6b+2hwI6udDZQEf8EjJW2d2j9X0yrT/OyJTBwkLUlPV+YeFw6SQTx mmqeHDxExLtRj0GsRnSWOPprXBRgyvfxiJfLHkp08yLfhm0/aGRlt5CTcOtY3h/J PkosJ2MHy4gst5AXoW9mnW8MldVf4HDOlGSdY1pTZjhyXcgDHRRfY0mw2gengHA5 1Xc9x98UoZC//HIlVX7IfAakHROx0mVBTbRexLvnw0AuZNN084IR535K/jsXjAi4 /C9S7Em86i3wWdA7zF/B5lwjs/ObTBVMXDw0Hh+xEyAy4LXeKc3ZpAM4Uy/jQp+m decMH7rQnpCizpBljX3Es9vwj94m3e0KkXF4ZHPv/YN8shfKnQ9G4tNI22zO5n+H tnmZoPizwZ42XuDKZBo4JutJG5nMs1szNBLr4Y0+4XtJs8yxZY71YvEuC5suQFuP Iun4yH/VUxyS5EvItTCOovNWY753CTyci+Twgrbydoz+pe7H5q0= =d7ZF -----END PGP SIGNATURE----- --zu4bu3hgw34zvrtm-- From owner-freebsd-current@freebsd.org Wed Apr 18 10:56:54 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 09FB6FA807F; Wed, 18 Apr 2018 10:56:54 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 986B36DD01; Wed, 18 Apr 2018 10:56:53 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f8kld-0002jm-NO ; Wed, 18 Apr 2018 13:56:49 +0300 Date: Wed, 18 Apr 2018 13:56:49 +0300 From: Vitalij Satanivskij To: John Baldwin Cc: Vitalij Satanivskij , freebsd-current@freebsd.org, cem@freebsd.org, Stephen Hurd , Matthew Macy , "freebsd-hackers@freebsd.org" , Stephen Hurd Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180418105649.GA9989@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <3723755.0KMZDfyMWu@ralph.baldwin.cx> <20180417191553.GA95803@hell.ukr.net> <3628282.XVdngBdGlp@ralph.baldwin.cx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3628282.XVdngBdGlp@ralph.baldwin.cx> User-Agent: Mutt/1.9.5 (2018-04-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Apr 2018 10:56:54 -0000 JB> > If you need any aditional information please tell me about. JB> JB> Can you perhaps turn off the stack trace on boot to not lose the panic messages JB> (remove KDB_TRACE from kernel config) and maybe modify the panic message to JB> include the IRQ number passed to nexus_add_irq? Hm looks like it's always irq with number 256 eg hpet - 256 igb - 256 Chenged made for it was Index: sys/x86/x86/nexus.c =================================================================== --- sys/x86/x86/nexus.c (revision 332663) +++ sys/x86/x86/nexus.c (working copy) @@ -698,7 +698,7 @@ { if (rman_manage_region(&irq_rman, irq, irq) != 0) - panic("%s: failed", __func__); + panic("%s: failed irq is: %lu", __func__, irq); } From owner-freebsd-current@freebsd.org Wed Apr 18 18:42:51 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 93608FA1936; Wed, 18 Apr 2018 18:42:51 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from mail.baldwin.cx (bigwig.baldwin.cx [IPv6:2001:470:1f11:75::1]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 36FE97989A; Wed, 18 Apr 2018 18:42:51 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from ralph.baldwin.cx (ralph.baldwin.cx [66.234.199.215]) by mail.baldwin.cx (Postfix) with ESMTPSA id 342B310AFAD; Wed, 18 Apr 2018 14:42:50 -0400 (EDT) From: John Baldwin To: Vitalij Satanivskij Cc: freebsd-current@freebsd.org, cem@freebsd.org, Stephen Hurd , Matthew Macy , "freebsd-hackers@freebsd.org" , Stephen Hurd Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Date: Wed, 18 Apr 2018 11:42:41 -0700 Message-ID: <1616582.sIejGazfcv@ralph.baldwin.cx> User-Agent: KMail/4.14.10 (FreeBSD/11.1-STABLE; KDE/4.14.30; amd64; ; ) In-Reply-To: <20180418105649.GA9989@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <3628282.XVdngBdGlp@ralph.baldwin.cx> <20180418105649.GA9989@hell.ukr.net> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mail.baldwin.cx); Wed, 18 Apr 2018 14:42:50 -0400 (EDT) X-Virus-Scanned: clamav-milter 0.99.2 at mail.baldwin.cx X-Virus-Status: Clean X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Apr 2018 18:42:51 -0000 On Wednesday, April 18, 2018 01:56:49 PM Vitalij Satanivskij wrote: > JB> > If you need any aditional information please tell me about. > JB> > JB> Can you perhaps turn off the stack trace on boot to not lose the panic messages > JB> (remove KDB_TRACE from kernel config) and maybe modify the panic message to > JB> include the IRQ number passed to nexus_add_irq? > > > Hm looks like it's always irq with number 256 > eg hpet - 256 > igb - 256 > > Chenged made for it was > > Index: sys/x86/x86/nexus.c > =================================================================== > --- sys/x86/x86/nexus.c (revision 332663) > +++ sys/x86/x86/nexus.c (working copy) > @@ -698,7 +698,7 @@ > { > > if (rman_manage_region(&irq_rman, irq, irq) != 0) > - panic("%s: failed", __func__); > + panic("%s: failed irq is: %lu", __func__, irq); > } Ohhhh, this is a different issue. Sorry. As a hack, try changing 'FIRST_MSI_INT' to 512 in sys/amd64/include/intr_machdep.h. The issue is that some systems now include more than 256 interrupt pins on I/O APICs, so IRQ 256 is already reserved for use by one of those interrupt pins. The real fix is that I need to make FIRST_MSI_INT dynamic instead of a constant and just define it as the first free IRQ after the I/O APICs have probed. -- John Baldwin From owner-freebsd-current@freebsd.org Wed Apr 18 19:13:15 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 65CCBFA3915; Wed, 18 Apr 2018 19:13:15 +0000 (UTC) (envelope-from satan@ukr.net) Received: from hell.ukr.net (hell.ukr.net [212.42.67.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id F208D814E1; Wed, 18 Apr 2018 19:13:14 +0000 (UTC) (envelope-from satan@ukr.net) Received: from satan by hell.ukr.net with local ID 1f8sVz-000Arj-Pe ; Wed, 18 Apr 2018 22:13:11 +0300 Date: Wed, 18 Apr 2018 22:13:11 +0300 From: Vitalij Satanivskij To: John Baldwin Cc: Vitalij Satanivskij , freebsd-current@freebsd.org, cem@freebsd.org, Stephen Hurd , Matthew Macy , "freebsd-hackers@freebsd.org" , Stephen Hurd Subject: Re: Current panic on boot on H11DSI motherboard with epyc cpu (nexus_add_irq: failed) Message-ID: <20180418191311.GA74540@hell.ukr.net> References: <20180416102710.GA90028@hell.ukr.net> <3628282.XVdngBdGlp@ralph.baldwin.cx> <20180418105649.GA9989@hell.ukr.net> <1616582.sIejGazfcv@ralph.baldwin.cx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1616582.sIejGazfcv@ralph.baldwin.cx> User-Agent: Mutt/1.9.5 (2018-04-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Apr 2018 19:13:15 -0000 JB> Ohhhh, this is a different issue. Sorry. As a hack, try changing JB> 'FIRST_MSI_INT' to 512 in sys/amd64/include/intr_machdep.h. The issue JB> is that some systems now include more than 256 interrupt pins on I/O JB> APICs, so IRQ 256 is already reserved for use by one of those JB> interrupt pins. The real fix is that I need to make FIRST_MSI_INT JB> dynamic instead of a constant and just define it as the first free IRQ JB> after the I/O APICs have probed. JB> Yep. That it. But just one note irq585: ccp14:721 @cpu0(domain0): 0 irq586: ccp14:723 @cpu0(domain0): 0 irq587: ccp15:725 @cpu0(domain0): 0 If I understand correctly number of irq's even more then 512, so better to change to real number in system ? Or this is another case ? Any way thank you for help. Now I can use system with msix and msi enabled. From owner-freebsd-current@freebsd.org Thu Apr 19 04:56:05 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C5AE1FA9276 for ; Thu, 19 Apr 2018 04:56:05 +0000 (UTC) (envelope-from kiri@kx.openedu.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 5FFCF857FF for ; Thu, 19 Apr 2018 04:56:05 +0000 (UTC) (envelope-from kiri@kx.openedu.org) Received: by mailman.ysv.freebsd.org (Postfix) id 1ADA5FA926A; Thu, 19 Apr 2018 04:56:05 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EB569FA9269 for ; Thu, 19 Apr 2018 04:56:04 +0000 (UTC) (envelope-from kiri@kx.openedu.org) Received: from kx.openedu.org (flets-sg1027.kamome.or.jp [202.216.24.27]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BADB857D4 for ; Thu, 19 Apr 2018 04:56:03 +0000 (UTC) (envelope-from kiri@kx.openedu.org) Received: from kx.openedu.org (kx.openedu.org [202.216.24.27]) by kx.openedu.org (8.14.5/8.14.5) with ESMTP id w3J4mGnd021731; Thu, 19 Apr 2018 13:48:16 +0900 (JST) (envelope-from kiri@kx.openedu.org) Message-Id: <201804190448.w3J4mGnd021731@kx.openedu.org> Date: Thu, 19 Apr 2018 13:48:16 +0900 From: KIRIYAMA Kazuhiko To: current@freebsd.org Cc: kiri@kx.openedu.org Subject: /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:1: error: expected unqualified-id User-Agent: Wanderlust/2.14.0 (Africa) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL/10.6 MULE XEmacs/21.4 (patch 22) (Instant Classic) (amd64--freebsd) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Apr 2018 04:56:06 -0000 Hi, r332743 make builworld failed: c++ -O2 -pipe -I/usr/obj/usr/src/amd64.amd64/tmp/obj-tools/lib/clang/libclang -I/usr/obj/usr/src/amd64.amd64/tmp/obj-tools/lib/clang/libllvm -I/usr/src/contrib/llvm/tools/clang/lib/Basic -I/usr/src/contrib/llvm/tools/clang/lib/Driver -I/usr/src/contrib/llvm/tools/clang/include -I/usr/src/lib/clang/include -I/usr/src/contrib/llvm/include -DLLVM_BUILD_GLOBAL_ISEL -D__STDC_LIMIT_MACROS -D__STDC_CONSTANT_MACROS -DLLVM_DEFAULT_TARGET_TRIPLE=\"x86_64-unknown-freebsd12.0\" -DLLVM_HOST_TRIPLE=\"x86_64-unknown-freebsd12.0\" -DDEFAULT_SYSROOT=\"/usr/obj/usr/src/amd64.amd64/tmp\" -ffunction-sections -fdata-sections -gline-tables-only -MD -MF.depend.Frontend_SerializedDiagnosticReader.o -MTFrontend/SerializedDiagnosticReader.o -Qunused-arguments -I/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/include -std=c++11 -fno-exceptions -fno-rtti -gline-tables-only -stdlib=libc++ -Wno-c++11-extensions -c /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp -o Frontend/Se! rializedDiagnosticReader.o /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:1: error: expected unqualified-id /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:13: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:21: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:29: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:37: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:60: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:61: error: source file is not valid UTF-8 /7 This fi!is dW0<8B>ibut[d<8C>nder ,<9C> University of IllinEV<90>Open Source ^ /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:10:10: fatal error: 'qlang/Frontend/SerializeNagnosticReader(h' file not found #include "qlang/Frontend/SerializeN<87>oagnosticReader(h" ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 8 errors generated. *** Error code 1 Stop. make[5]: stopped in /usr/src/lib/clang/libclang *** Error code 1 Stop. make[4]: stopped in /usr/src/lib/clang *** Error code 1 Stop. make[3]: stopped in /usr/src *** Error code 1 Stop. make[2]: stopped in /usr/src *** Error code 1 Stop. make[1]: stopped in /usr/src --- KIRIYAMA Kazuhiko From owner-freebsd-current@freebsd.org Thu Apr 19 08:54:59 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EC406F8F751 for ; Thu, 19 Apr 2018 08:54:58 +0000 (UTC) (envelope-from agapon@gmail.com) Received: from mail-lf0-f46.google.com (mail-lf0-f46.google.com [209.85.215.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 674667B256 for ; Thu, 19 Apr 2018 08:54:58 +0000 (UTC) (envelope-from agapon@gmail.com) Received: by mail-lf0-f46.google.com with SMTP id r125-v6so6629654lfe.2 for ; Thu, 19 Apr 2018 01:54:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:subject:openpgp:autocrypt:message-id :date:user-agent:mime-version:content-language :content-transfer-encoding; bh=/3gaSp4i8f5iJL4Zz5niPpiQyFNj9ru2WFvr9lwqaEg=; b=kD2ap24rc/WCn3wXXEa9RhUe3SuMfuh+zzcXXn8OhJ5da8JIf1D581cPIk3SHEAJHT QJFFDX0zoBiiIR97vx7Q1n91a1r42xZev1Iiz4a7WD5Ik3DWumuzQddPMMGv/QcdeFZW EYPty4QzygvkBl+Eh5QP05g/KrdF0KbpFiiT36T/XwmKr4gCV3mVte46CYt00t9QVSCJ Gw6YV4ycwT0uMQ8TsvZAlZJvs/iQAk9q4QK2UwXn8i/jgyfmqeeHOC4fApLrl2FD51Cj E+UEqZAt2NDLOA3pTXROxppLwoUO/MmZAm+JhKc8+0z7JY5lcFB5l49myfwh2z4pxADK bbCg== X-Gm-Message-State: ALQs6tBfgm9FNukHquzKDtBh1f7YEibtfckls8jXOPqiNJKABvrNQhBa ziDzJw/dsTHZeXY9Yj91UiOPPYV0 X-Google-Smtp-Source: AIpwx48n6n09uAtwakxRz5U5um9OlighY7fKEn43VaObDBrIK7yprxeEDlS//vbHjjkrAFIqIeGLyA== X-Received: by 10.46.91.21 with SMTP id p21mr3787408ljb.38.1524128090815; Thu, 19 Apr 2018 01:54:50 -0700 (PDT) Received: from [192.168.0.88] (east.meadow.volia.net. [93.72.151.96]) by smtp.googlemail.com with ESMTPSA id t25sm505404ljc.44.2018.04.19.01.54.49 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 19 Apr 2018 01:54:49 -0700 (PDT) To: FreeBSD Current From: Andriy Gapon Subject: suspend/resume does not work in qemu (qemu-devel) Openpgp: preference=signencrypt Autocrypt: addr=avg@FreeBSD.org; prefer-encrypt=mutual; keydata= xsFNBFm4LIgBEADNB/3lT7f15UKeQ52xCFQx/GqHkSxEdVyLFZTmY3KyNPQGBtyvVyBfprJ7 mAeXZWfhat6cKNRAGZcL5EmewdQuUfQfBdYmKjbw3a9GFDsDNuhDA2QwFt8BmkiVMRYyvI7l N0eVzszWCUgdc3qqM6qqcgBaqsVmJluwpvwp4ZBXmch5BgDDDb1MPO8AZ2QZfIQmplkj8Y6Z AiNMknkmgaekIINSJX8IzRzKD5WwMsin70psE8dpL/iBsA2cpJGzWMObVTtCxeDKlBCNqM1i gTXta1ukdUT7JgLEFZk9ceYQQMJJtUwzWu1UHfZn0Fs29HTqawfWPSZVbulbrnu5q55R4PlQ /xURkWQUTyDpqUvb4JK371zhepXiXDwrrpnyyZABm3SFLkk2bHlheeKU6Yql4pcmSVym1AS4 dV8y0oHAfdlSCF6tpOPf2+K9nW1CFA8b/tw4oJBTtfZ1kxXOMdyZU5fiG7xb1qDgpQKgHUX8 7Rd2T1UVLVeuhYlXNw2F+a2ucY+cMoqz3LtpksUiBppJhw099gEXehcN2JbUZ2TueJdt1FdS ztnZmsHUXLxrRBtGwqnFL7GSd6snpGIKuuL305iaOGODbb9c7ne1JqBbkw1wh8ci6vvwGlzx rexzimRaBzJxlkjNfMx8WpCvYebGMydNoeEtkWldtjTNVsUAtQARAQABzR5BbmRyaXkgR2Fw b24gPGF2Z0BGcmVlQlNELm9yZz7CwZQEEwEIAD4WIQS+LEO7ngQnXA4Bjr538m7TUc1yjwUC WbgsiAIbIwUJBaOagAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRB38m7TUc1yj+JAEACV l9AK/nOWAt/9cufV2fRj0hdOqB1aCshtSrwHk/exXsDa4/FkmegxXQGY+3GWX3deIyesbVRL rYdtdK0dqJyT1SBqXK1h3/at9rxr9GQA6KWOxTjUFURsU7ok/6SIlm8uLRPNKO+yq0GDjgaO LzN+xykuBA0FlhQAXJnpZLcVfPJdWv7sSHGedL5ln8P8rxR+XnmsA5TUaaPcbhTB+mG+iKFj GghASDSfGqLWFPBlX/fpXikBDZ1gvOr8nyMY9nXhgfXpq3B6QCRYKPy58ChrZ5weeJZ29b7/ QdEO8NFNWHjSD9meiLdWQaqo9Y7uUxN3wySc/YUZxtS0bhAd8zJdNPsJYG8sXgKjeBQMVGuT eCAJFEYJqbwWvIXMfVWop4+O4xB+z2YE3jAbG/9tB/GSnQdVSj3G8MS80iLS58frnt+RSEw/ psahrfh0dh6SFHttE049xYiC+cM8J27Aaf0i9RflyITq57NuJm+AHJoU9SQUkIF0nc6lfA+o JRiyRlHZHKoRQkIg4aiKaZSWjQYRl5Txl0IZUP1dSWMX4s3XTMurC/pnja45dge/4ESOtJ9R 8XuIWg45Oq6MeIWdjKddGhRj3OohsltKgkEU3eLKYtB6qRTQypHHUawCXz88uYt5e3w4V16H lCpSTZV/EVHnNe45FVBlvK7k7HFfDDkryM7BTQRZuCyIARAAlq0slcsVboY/+IUJdcbEiJRW be9HKVz4SUchq0z9MZPX/0dcnvz/gkyYA+OuM78dNS7Mbby5dTvOqfpLJfCuhaNYOhlE0wY+ 1T6Tf1f4c/uA3U/YiadukQ3+6TJuYGAdRZD5EqYFIkreARTVWg87N9g0fT9BEqLw9lJtEGDY EWUE7L++B8o4uu3LQFEYxcrb4K/WKmgtmFcm77s0IKDrfcX4doV92QTIpLiRxcOmCC/OCYuO jB1oaaqXQzZrCutXRK0L5XN1Y1PYjIrEzHMIXmCDlLYnpFkK+itlXwlE2ZQxkfMruCWdQXye syl2fynAe8hvp7Mms9qU2r2K9EcJiR5N1t1C2/kTKNUhcRv7Yd/vwusK7BqJbhlng5ZgRx0m WxdntU/JLEntz3QBsBsWM9Y9wf2V4tLv6/DuDBta781RsCB/UrU2zNuOEkSixlUiHxw1dccI 6CVlaWkkJBxmHX22GdDFrcjvwMNIbbyfQLuBq6IOh8nvu9vuItup7qemDG3Ms6TVwA7BD3j+ 3fGprtyW8Fd/RR2bW2+LWkMrqHffAr6Y6V3h5kd2G9Q8ZWpEJk+LG6Mk3fhZhmCnHhDu6CwN MeUvxXDVO+fqc3JjFm5OxhmfVeJKrbCEUJyM8ESWLoNHLqjywdZga4Q7P12g8DUQ1mRxYg/L HgZY3zfKOqcAEQEAAcLBfAQYAQgAJhYhBL4sQ7ueBCdcDgGOvnfybtNRzXKPBQJZuCyIAhsM BQkFo5qAAAoJEHfybtNRzXKPBVwQAKfFy9P7N3OsLDMB56A4Kf+ZT+d5cIx0Yiaf4n6w7m3i ImHHHk9FIetI4Xe54a2IXh4Bq5UkAGY0667eIs+Z1Ea6I2i27Sdo7DxGwq09Qnm/Y65ADvXs 3aBvokCcm7FsM1wky395m8xUos1681oV5oxgqeRI8/76qy0hD9WR65UW+HQgZRIcIjSel9vR XDaD2HLGPTTGr7u4v00UeTMs6qvPsa2PJagogrKY8RXdFtXvweQFz78NbXhluwix2Tb9ETPk LIpDrtzV73CaE2aqBG/KrboXT2C67BgFtnk7T7Y7iKq4/XvEdDWscz2wws91BOXuMMd4c/c4 OmGW9m3RBLufFrOag1q5yUS9QbFfyqL6dftJP3Zq/xe+mr7sbWbhPVCQFrH3r26mpmy841ym dwQnNcsbIGiBASBSKksOvIDYKa2Wy8htPmWFTEOPRpFXdGQ27awcjjnB42nngyCK5ukZDHi6 w0qK5DNQQCkiweevCIC6wc3p67jl1EMFY5+z+zdTPb3h7LeVnGqW0qBQl99vVFgzLxchKcl0 R/paSFgwqXCZhAKMuUHncJuynDOP7z5LirUeFI8qsBAJi1rXpQoLJTVcW72swZ42IdPiboqx NbTMiNOiE36GqMcTPfKylCbF45JNX4nF9ElM0E+Y8gi4cizJYBRr2FBJgay0b9Cp Message-ID: <09a48756-2dda-e830-5943-c7f1b9fa053a@FreeBSD.org> Date: Thu, 19 Apr 2018 11:54:48 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Apr 2018 08:54:59 -0000 Not sure if this really matters and on what end the problem might be, but resuming from S3 in qemu is stuck forever here: #3 x86emu_exec_one_byte (emu=0xffffffff81eac618 ) at /usr/devel/git/cpu-pause/sys/contrib/x86emu/x86emu.c:4655 #4 0xffffffff8106c398 in x86emu_exec (emu=0xffffffff81eac618 ) at /usr/devel/git/cpu-pause/sys/contrib/x86emu/x86emu.c:246 #5 0xffffffff8106b8d4 in x86bios_intr (regs=0xfffffe002e1933f0, intno=16) at /usr/devel/git/cpu-pause/sys/compat/x86bios/x86bios.c:634 #6 0xffffffff80fb7cd2 in vesa_bios_save_restore (code=2, p=0xfffff8000365e004) at /usr/devel/git/cpu-pause/sys/dev/fb/vesa.c:551 #7 vesa_load_state (adp=, p=) at /usr/devel/git/cpu-pause/sys/dev/fb/vesa.c:1535 #8 0xffffffff810632e0 in vga_resume (dev=0xfffff800039eb100) at /usr/devel/git/cpu-pause/sys/isa/vga_isa.c:112 #9 0xffffffff8106311e in isavga_resume (dev=0xfffff800039eb100) at /usr/devel/git/cpu-pause/sys/isa/vga_isa.c:243 #10 0xffffffff80ac2de4 in DEVICE_RESUME (dev=) at ./device_if.h:305 ... Using -vga none works around the problem, of course. Maybe it's buggy video BIOS in the emulation. -- Andriy Gapon From owner-freebsd-current@freebsd.org Thu Apr 19 10:14:15 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 21C64F95410 for ; Thu, 19 Apr 2018 10:14:15 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id B4E346D454 for ; Thu, 19 Apr 2018 10:14:14 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 78EE2F9540F; Thu, 19 Apr 2018 10:14:14 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 51969F9540E for ; Thu, 19 Apr 2018 10:14:14 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D622F6D450 for ; Thu, 19 Apr 2018 10:14:13 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from coleburn.home.andric.com (coleburn.home.andric.com [192.168.0.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 6391358FD8; Thu, 19 Apr 2018 12:14:11 +0200 (CEST) From: Dimitry Andric Message-Id: <03B2E393-9625-43DF-A0C8-DBA6F3211D34@FreeBSD.org> Content-Type: multipart/signed; boundary="Apple-Mail=_4CA8B3AA-3CB6-4116-8706-06A2EFF3D552"; protocol="application/pgp-signature"; micalg=pgp-sha1 Mime-Version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\)) Subject: Re: /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.cpp:5:1: error: expected unqualified-id Date: Thu, 19 Apr 2018 12:14:07 +0200 In-Reply-To: <201804190448.w3J4mGnd021731@kx.openedu.org> Cc: current@freebsd.org To: KIRIYAMA Kazuhiko References: <201804190448.w3J4mGnd021731@kx.openedu.org> X-Mailer: Apple Mail (2.3445.6.18) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Apr 2018 10:14:15 -0000 --Apple-Mail=_4CA8B3AA-3CB6-4116-8706-06A2EFF3D552 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 19 Apr 2018, at 06:48, KIRIYAMA Kazuhiko wrote: >=20 > r332743 make builworld failed: >=20 > c++ -O2 -pipe = -I/usr/obj/usr/src/amd64.amd64/tmp/obj-tools/lib/clang/libclang = -I/usr/obj/usr/src/amd64.amd64/tmp/obj-tools/lib/clang/libllvm = -I/usr/src/contrib/llvm/tools/clang/lib/Basic = -I/usr/src/contrib/llvm/tools/clang/lib/Driver = -I/usr/src/contrib/llvm/tools/clang/include -I/usr/src/lib/clang/include = -I/usr/src/contrib/llvm/include -DLLVM_BUILD_GLOBAL_ISEL = -D__STDC_LIMIT_MACROS -D__STDC_CONSTANT_MACROS = -DLLVM_DEFAULT_TARGET_TRIPLE=3D\"x86_64-unknown-freebsd12.0\" = -DLLVM_HOST_TRIPLE=3D\"x86_64-unknown-freebsd12.0\" = -DDEFAULT_SYSROOT=3D\"/usr/obj/usr/src/amd64.amd64/tmp\" = -ffunction-sections -fdata-sections -gline-tables-only -MD = -MF.depend.Frontend_SerializedDiagnosticReader.o = -MTFrontend/SerializedDiagnosticReader.o -Qunused-arguments = -I/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/include -std=3Dc++11 = -fno-exceptions -fno-rtti -gline-tables-only -stdlib=3Dlibc++ = -Wno-c++11-extensions -c = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp -o Frontend/Se! > rializedDiagnosticReader.o > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:1: error: expected unqualified-id > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:13: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:21: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:29: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:37: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > = ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:60: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > = ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:5:61: error: source file is not valid UTF-8 > /7 This fi!is dW0<8B>ibut[d<8C>nder = ,<9C> University of IllinEV<90>Open Source > = ^ > = /usr/src/contrib/llvm/tools/clang/lib/Frontend/SerializedDiagnosticReader.= cpp:10:10: fatal error: 'qlang/Frontend/SerializeNagnosticReader(h' file = not found > #include "qlang/Frontend/SerializeN<87>oagnosticReader(h" > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ It definitely looks like your source files are corrupted, as this is certainly not the normal contents. Please check your RAM and storage for errors. If there are no errors, try deleting the source tree, and obtaining a fresh checkout. -Dimitry --Apple-Mail=_4CA8B3AA-3CB6-4116-8706-06A2EFF3D552 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.2 iF0EARECAB0WIQR6tGLSzjX8bUI5T82wXqMKLiCWowUCWthr7wAKCRCwXqMKLiCW o4EAAJ0TGUSEC2WGAKm+ix4VRl3e2GhKKACeIpO/nzXjvKIuczs6bjdpc74YAqg= =ZkTX -----END PGP SIGNATURE----- --Apple-Mail=_4CA8B3AA-3CB6-4116-8706-06A2EFF3D552-- From owner-freebsd-current@freebsd.org Thu Apr 19 23:03:55 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 24CEAFAA3AF for ; Thu, 19 Apr 2018 23:03:55 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id AEF167261F; Thu, 19 Apr 2018 23:03:54 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mail.xzibition.com (unknown [127.0.1.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id 8C968E7FB; Thu, 19 Apr 2018 23:03:54 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mail.xzibition.com (localhost [172.31.3.2]) by mail.xzibition.com (Postfix) with ESMTP id 67EB1589A; Thu, 19 Apr 2018 23:03:53 +0000 (UTC) X-Virus-Scanned: amavisd-new at mail.xzibition.com Received: from mail.xzibition.com ([172.31.3.2]) by mail.xzibition.com (mail.xzibition.com [172.31.3.2]) (amavisd-new, port 10026) with LMTP id uJLQjtRA4d2A; Thu, 19 Apr 2018 23:03:51 +0000 (UTC) Subject: Re: Problem compiling rust DKIM-Filter: OpenDKIM Filter v2.10.3 mail.xzibition.com 0D08B5895 To: Filippo Moretti , FreeBSD Current References: <1595676143.1357482.1523985912680.ref@mail.yahoo.com> <1595676143.1357482.1523985912680@mail.yahoo.com> From: Bryan Drewery Openpgp: preference=signencrypt Autocrypt: addr=bdrewery@FreeBSD.org; prefer-encrypt=mutual; keydata= xsBNBFJphmsBCADiFgmS4bIzwZijrS31SjEMzg+n5zNellgM+HkShwehpqCiyhXdWrvH6dTZ a6u50pbUIX7doTR7W7PQHCjCTqtpwvcj0eulZva+iHFp+XrbgSFHn+VVXgkYP2MFySyZRFab D2qqzJBEJofhpv4HvY6uQI5K99pMqKr1Z/lHqsijYYu4RH2OfwB5PinId7xeldzWEonVoCr+ rfxzO/UrgA6v/3layGZcKNHFjmc3NqoN1DXtdaEHqtjIozzbndVkH6lkFvIpIrI6i5ox8pwp VxsxLCr/4Musd5CWgHiet5kSw2SzNeA8FbxdLYCpXNVu+uBACEbCUP+CSNy3NVfEUxsBABEB AAHNJEJyeWFuIERyZXdlcnkgPGJkcmV3ZXJ5QEZyZWVCU0Qub3JnPsLAgAQTAQoAKgIbAwUJ CWYBgAULCQgHAwUVCgkICwUWAwIBAAIeAQIXgAUCUmmLqAIZAQAKCRA113G7bkaXz1woB/9j vZ2l1BMa8KR5zv3dk95RzVa4y94ZVHv59/smemCuZdBdb1Z/Lit3NNzhEzEfTv++5gZNh07z 9/G95rpDh9gCUAY3I4m4Joz4khitoCWz608bZ/tHHbS7dmzZ3iE3kl8gRTb9khFAwe8kwlDd jcdlqm1FDoxidRrK+tuFjuIkrOU6nSLk/BWNrEQNYRxoqrqRHrCb9ddwIh8Th6CeBjYMYgbK umFQhxN7cd3mfNuHueiZ7o7m9rnfllVxaPukHjNtcBbc51tmL4bTDsakoBx40LQAhcQ6++1T yE7u9JLgDuztu/EktwvrbSkV10KBPC4lIGm+pxsbfwM9CXXdz66kzsBNBFJphmsBCACiVFPf kNfaFtUSuY0395ueo/rMyHPGPQ2iwvERFCpeFGSQSgagpenNHLpFQKTg/dl6FOoST5tqyxMq fyHGHDzzU51bvA/IfaGoNi/BIhTe/toZNMRvpcI3PLjiGcnJnuwCCbAVOAGdb+t5cZtpNdOI cKYmrYG3u9RiBpe6dTF+qLrD/8Bs1wjhduQ8fcNNgnkXu8xDH4ZxY0lIc3QgvYWp9vimlQe6 iKjUd2/DX28ETZcD5h6pYV331KMPTrEI0p0yvFijUZce8c1XHFyL1j9sBAha5qpszJl6Uq5i LolhKRcGfcdmtD72vHQjUYglUyudSJUVyo2gMYjdbiFKzJulABEBAAHCwGUEGAEKAA8FAlJp hmsCGwwFCQlmAYAACgkQNddxu25Gl89UPggA2mGQp28yCUKsJ6KHFVy/lpHfoQrKF+s7HfKT U2ObVeVNX4I8ZdW1UO48mRqxEOwY8r5YSH6X06OmiqCX2aSMXg3N06/l+ztlB0+UGGlkXBjv l9/nii+bC6b8XWuu0X7Qpb9oYBK9YtoaoyuVplAmjdj/cPou65meKIaS1yDTjHh450DrW8Qg he6l0bFX4BHKTSm99U90ML7EY19B6iI2BZSqWutVsyD71oAREY6NGgDpCOIO6FS41+WeYCDR j8vsa/BiaoX2d2SBDsCwsEwe9fg5PYMi2uVIhvL6OrxnwOdB+TkgvOy5zZSNO29UG/JilZKo Ndz2wpEaUzChGGqLvQ== Organization: FreeBSD Message-ID: Date: Thu, 19 Apr 2018 16:03:07 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <1595676143.1357482.1523985912680@mail.yahoo.com> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="NUdylMOWYDVBkmnbUXKhzaioGUUNKK7Yv" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Apr 2018 23:03:55 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --NUdylMOWYDVBkmnbUXKhzaioGUUNKK7Yv Content-Type: multipart/mixed; boundary="gPfvdU92qEZE2NXiMXbkvxEbArEWrqFfo"; protected-headers="v1" From: Bryan Drewery To: Filippo Moretti , FreeBSD Current Message-ID: Subject: Re: Problem compiling rust References: <1595676143.1357482.1523985912680.ref@mail.yahoo.com> <1595676143.1357482.1523985912680@mail.yahoo.com> In-Reply-To: <1595676143.1357482.1523985912680@mail.yahoo.com> --gPfvdU92qEZE2NXiMXbkvxEbArEWrqFfo Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 4/17/18 10:25 AM, Filippo Moretti wrote: > I have the folloing error while compiling rust on i386 current of April= the 9th It looks like the normal bootstrap bug with the ino64 changes but is fine on my amd64 system. Perhaps I missed something for i386 support. Are you able to build lang/rust-nightly? --=20 Regards, Bryan Drewery --gPfvdU92qEZE2NXiMXbkvxEbArEWrqFfo-- --NUdylMOWYDVBkmnbUXKhzaioGUUNKK7Yv Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEE+Rc8ssOq6npcih8JNddxu25Gl88FAlrZICsACgkQNddxu25G l88Dhwf/epNZFUyHrqdHWlXEgJV0mLhUokfRt+ShiWdyUPNGM+cUGH9RNVHwXzMq aSjktbXehEEGTdHl4EbRcE8YUSQ14/ftIFfLWaYXBqiNHQ7UqUq9wJtITvLEeVg7 SqgvWX0yLai0nUQbaTMOYN5zIDNt6nVLEWKr5jjI2FCPM1V/Te2iinxX57PI+iSA yjTcuXuEduK3p2g9hWVChDkJhO2XtXkTJX6jqfGkWRF3jeyAoMx+do27q7jb+bSd P1aK7Ad6GRDDmB1Epx0dlLIXWVO8qWbNUbDNfwAfdUjH3h6DhjiLWOWQslVYck+a D/xqk+PvTnlPJU/jg8a4TzvJpPx/Sg== =gSZs -----END PGP SIGNATURE----- --NUdylMOWYDVBkmnbUXKhzaioGUUNKK7Yv-- From owner-freebsd-current@freebsd.org Fri Apr 20 13:42:31 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EE141FA4B30 for ; Fri, 20 Apr 2018 13:42:30 +0000 (UTC) (envelope-from emaste@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A06A574B0F for ; Fri, 20 Apr 2018 13:42:30 +0000 (UTC) (envelope-from emaste@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1079) id 97D11B7AC; Fri, 20 Apr 2018 13:42:30 +0000 (UTC) Date: Fri, 20 Apr 2018 13:42:30 +0000 From: Ed Maste To: freebsd-current@freebsd.org Subject: HEADS-UP: Deprecation of legacy (v3) password database support Message-ID: <20180420134230.GB62725@freebsd.org> Mail-Followup-To: Ed Maste , freebsd-current@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.2 (2017-12-15) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Apr 2018 13:42:31 -0000 FreeBSD password databases (/etc/pwd.db, /etc/spwd.db) can contain records in one or both of two versions: * v3, a legacy architecture-dependent format * v4, the current architecture- and endian-independent format When v4 support was added in 2003 (r113596) pwd_mkdb emitted both v3 and v4 records in the output database. In 2015 r283981 added a -l option to control the emission of legacy v3 records; by default only v4 records are emitted. r283981's commit message states: The -l, -B and -L options are considered deprecated and will be removed in FreeBSD 12.0 release. I'd expect little impact if the -l, -B and -L options are removed, as r113596 is included in FreeBSD 5.1 and later. If legacy support is removed then software built on FreeBSD 5.0 or earlier will no longer be able to make use of password file data (via getpwent, getpwnam, etc.). Such software would still function inside of a jail that has a v3 password database, of course. Is anyone using pwd_mkdb's -l option and relying on legacy password database files in a non-jailed context? From owner-freebsd-current@freebsd.org Fri Apr 20 15:07:50 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DD3C5FAAF76 for ; Fri, 20 Apr 2018 15:07:50 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 484256B648; Fri, 20 Apr 2018 15:07:46 +0000 (UTC) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: from pdx.rh.CN85.dnsmgr.net (localhost [127.0.0.1]) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3) with ESMTP id w3KF7cwC071123; Fri, 20 Apr 2018 08:07:38 -0700 (PDT) (envelope-from freebsd-rwg@pdx.rh.CN85.dnsmgr.net) Received: (from freebsd-rwg@localhost) by pdx.rh.CN85.dnsmgr.net (8.13.3/8.13.3/Submit) id w3KF7cpV071122; Fri, 20 Apr 2018 08:07:38 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201804201507.w3KF7cpV071122@pdx.rh.CN85.dnsmgr.net> Subject: Re: HEADS-UP: Deprecation of legacy (v3) password database support In-Reply-To: <20180420134230.GB62725@freebsd.org> To: Ed Maste Date: Fri, 20 Apr 2018 08:07:38 -0700 (PDT) CC: freebsd-current@freebsd.org X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Apr 2018 15:07:51 -0000 > FreeBSD password databases (/etc/pwd.db, /etc/spwd.db) can contain > records in one or both of two versions: > * v3, a legacy architecture-dependent format > * v4, the current architecture- and endian-independent format > > When v4 support was added in 2003 (r113596) pwd_mkdb emitted both v3 and > v4 records in the output database. In 2015 r283981 added a -l option to > control the emission of legacy v3 records; by default only v4 records > are emitted. > > r283981's commit message states: > > The -l, -B and -L options are considered deprecated and will be > removed in FreeBSD 12.0 release. > > I'd expect little impact if the -l, -B and -L options are removed, as > r113596 is included in FreeBSD 5.1 and later. If legacy support is > removed then software built on FreeBSD 5.0 or earlier will no longer be > able to make use of password file data (via getpwent, getpwnam, etc.). > Such software would still function inside of a jail that has a v3 > password database, of course. > > Is anyone using pwd_mkdb's -l option and relying on legacy password > database files in a non-jailed context? You would reach a more likely audience on freebsd-stable than on freebsd-current. -- Rod Grimes rgrimes@freebsd.org From owner-freebsd-current@freebsd.org Sat Apr 21 19:22:00 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 86C13F8B36F for ; Sat, 21 Apr 2018 19:22:00 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670067.outbound.protection.outlook.com [40.107.67.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0F9D37E932 for ; Sat, 21 Apr 2018 19:21:59 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB0945.CANPRD01.PROD.OUTLOOK.COM (52.132.66.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.696.12; Sat, 21 Apr 2018 19:21:58 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0696.015; Sat, 21 Apr 2018 19:21:58 +0000 From: Rick Macklem To: "freebsd-current@freebsd.org" CC: George Mitchell , Peter Subject: SCHED_ULE makes 256Mbyte i386 unusable Thread-Topic: SCHED_ULE makes 256Mbyte i386 unusable Thread-Index: AQHT2aRaIslt1yc1ckCslUza9Eao6A== Date: Sat, 21 Apr 2018 19:21:58 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB0945; 7:DP/1uJjD2f6ure9Ou20XP48a0hFUHRI/ZfzAA+n1jPZguD6bhKrk8IsGqvUndDGqsvSRv2zLTK36FY+xzRY3/bz+hwjOs2w02IHGdCGFBscRw1+cZfuY9NYQSuBbIwS+xp2wE5tTwZEqNK9vUYbfnZ/65NhQ5lZDShTdr8f2E3WYOTpRMOkU87+zpiwSNrBPU/zj8cqN0VFVzSmnPi6ZNEKCZwUmKVVrH1RspOEcQLDppuDxPNAuad5rNsvax9Ag x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(5600026)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB0945; x-ms-traffictypediagnostic: YQBPR0101MB0945: authentication-results: outbound.protection.outlook.com; spf=skipped (originating message); dkim=none (message not signed) header.d=none; dmarc=none action=none header.from=uoguelph.ca; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231232)(944501409)(52105095)(93006095)(93001095)(10201501046)(3002001)(6041310)(20161123564045)(20161123558120)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(6072148)(201708071742011); SRVR:YQBPR0101MB0945; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB0945; x-forefront-prvs: 064903DDDC x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(396003)(366004)(346002)(39380400002)(39860400002)(786003)(5640700003)(476003)(2351001)(8676002)(74482002)(2906002)(5250100002)(8936002)(2501003)(86362001)(316002)(26005)(81166006)(6916009)(4326008)(25786009)(33656002)(6506007)(102836004)(2900100001)(74316002)(186003)(305945005)(3660700001)(55016002)(9686003)(54906003)(3280700002)(53936002)(6436002)(5660300001)(7696005)(478600001); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB0945; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; MLV:sfv; x-microsoft-antispam-message-info: ukD2wjylXQx+iKOkCs1NrKytFj4ON/IyUi9zcdyYMQ0mGpZsySgImL+gtde94NJcRxmV3YPdtNVD6jmnQ/+vEhkXHdYU4Govp7ncodTsd5uWDVDIZzVH3ZsLKo56aFgjDfMiRuE4hJcfSDta6VMoOdHGsOU2ZGsNCSGh+ClVTx+RrRqSkuGR3SVIgaxs3Cy4 spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 7709c262-e907-4eec-b7a2-08d5a7bd26b5 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 7709c262-e907-4eec-b7a2-08d5a7bd26b5 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2018 19:21:58.1956 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB0945 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 19:22:00 -0000 I decided to start a new thread on current related to SCHED_ULE, since I se= e more than just performance degradation and on a recent current kernel. (I cc'd a couple of the people discussing performance problems in freebsd-s= table recently under a subject line of "Re: kern.sched.quantum: Creepy, sadistic= scheduler". When testing a pNFS server on a single core i386 with 256Mbytes using a Dec= . 2017 current/head kernel, I would see about a 30% performance degradation (elaps= ed run time for a kernel build over NFSv4.1) when the server kernel was built = with options SCHED_ULE instead of options SCHED_4BSD Now, with a kernel from a couple of days ago, the options SCHED_ULE kernel becomes unusable shortly after starting testing. I have seen two variants of this: - Became essentially hung. All I could do was ping the machine from the net= work. - Reported "vm_thread_new: kstack allocation failed and then any attempt to do anything gets "No more processes". with the only difference being a kernel built with options SCHED_4BSD everything works and performs the same as the Dec 2017 kernel. I can try rolling back through the revisions, but it would be nice if someo= ne could suggest where to start, because it takes a couple of hours to build a kernel on this system. So, something has made things worse for a head/current kernel this winter, = rick From owner-freebsd-current@freebsd.org Sat Apr 21 20:11:59 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 94223F96416 for ; Sat, 21 Apr 2018 20:11:59 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1ECA1684EA for ; Sat, 21 Apr 2018 20:11:59 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id w3LKBSQJ066870 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sat, 21 Apr 2018 23:11:31 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua w3LKBSQJ066870 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id w3LKBSML066869; Sat, 21 Apr 2018 23:11:28 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sat, 21 Apr 2018 23:11:28 +0300 From: Konstantin Belousov To: Rick Macklem Cc: "freebsd-current@freebsd.org" , George Mitchell , Peter Subject: Re: SCHED_ULE makes 256Mbyte i386 unusable Message-ID: <20180421201128.GO6887@kib.kiev.ua> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.5 (2018-04-13) X-Spam-Status: No, score=-2.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tom.home X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 20:11:59 -0000 On Sat, Apr 21, 2018 at 07:21:58PM +0000, Rick Macklem wrote: > I decided to start a new thread on current related to SCHED_ULE, since I see > more than just performance degradation and on a recent current kernel. > (I cc'd a couple of the people discussing performance problems in freebsd-stable > recently under a subject line of "Re: kern.sched.quantum: Creepy, sadistic scheduler". > > When testing a pNFS server on a single core i386 with 256Mbytes using a Dec. 2017 > current/head kernel, I would see about a 30% performance degradation (elapsed > run time for a kernel build over NFSv4.1) when the server kernel was built with > options SCHED_ULE > instead of > options SCHED_4BSD > > Now, with a kernel from a couple of days ago, the > options SCHED_ULE > kernel becomes unusable shortly after starting testing. > I have seen two variants of this: > - Became essentially hung. All I could do was ping the machine from the network. > - Reported "vm_thread_new: kstack allocation failed > and then any attempt to do anything gets "No more processes". This is strange. It usually means that you get KVA either exhausted or severly fragmented. Enter ddb, it should be operational since pings are replied. Try to see where the threads are stuck. > with the only difference being a kernel built with > options SCHED_4BSD > everything works and performs the same as the Dec 2017 kernel. > > I can try rolling back through the revisions, but it would be nice if someone > could suggest where to start, because it takes a couple of hours to build a > kernel on this system. > > So, something has made things worse for a head/current kernel this winter, rick There are at least two potentially relevant changes. First is r326758 Dec 11 which bumped KSTACK_PAGES on i386 to 4. Second is r332489 Apr 13, which introduced 4/4G KVA/UVA split. Consequences of the first one are obvious, it is much harder to find the place to map the stack. Second change, on the other hand, provides almost full 4G for KVA and should have mostly compensate for the negative effects of the first. And, I cannot see how changing the scheduler would fix or even affect that behaviour. From owner-freebsd-current@freebsd.org Sat Apr 21 21:09:11 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 87A2EFA4111 for ; Sat, 21 Apr 2018 21:09:11 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660062.outbound.protection.outlook.com [40.107.66.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 18BBC74B60 for ; Sat, 21 Apr 2018 21:09:10 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB1636.CANPRD01.PROD.OUTLOOK.COM (52.132.70.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.696.13; Sat, 21 Apr 2018 21:09:09 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0696.015; Sat, 21 Apr 2018 21:09:09 +0000 From: Rick Macklem To: "freebsd-current@freebsd.org" Subject: i386 hangs during halt "vnodes remaining... 0 time out" Thread-Topic: i386 hangs during halt "vnodes remaining... 0 time out" Thread-Index: AQHT2bR4fPVXlRRgnkynIGzjEjWSmw== Date: Sat, 21 Apr 2018 21:09:09 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: freebsd.org; dkim=none (message not signed) header.d=none;freebsd.org; dmarc=none action=none header.from=uoguelph.ca; x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB1636; 7:h3vphjpURZFXe1YtikUFV1JGSfNsik5NAwBXpEJRjWMG5cCsfB2zeCuPxyW0LAD78klDuMBXy8Zcj48iDn/XCuqdCqIiGzCS57xvn3VApZLhecnhs3KMG083/oG7JnZxQcjSar0yjAxUH/Lu2v1a1ER+1gY5vkmW4ceplWvK2ebClmf+tBQoLnHLyyC6Z/OS3qxUiBdVnDOjURPjzQwym5Y2AF51757In/3Na102+rwwyjphTs84J8nUhnh9gN95 x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB1636; x-ms-traffictypediagnostic: YQBPR0101MB1636: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231232)(944501410)(52105095)(6041310)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123564045)(20161123562045)(6072148)(201708071742011); SRVR:YQBPR0101MB1636; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB1636; x-forefront-prvs: 064903DDDC x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(396003)(39860400002)(39380400002)(366004)(5250100002)(3660700001)(3280700002)(5660300001)(26005)(2501003)(305945005)(74316002)(74482002)(6916009)(7696005)(86362001)(25786009)(102836004)(2351001)(6506007)(476003)(478600001)(6436002)(33656002)(5640700003)(53936002)(2900100001)(316002)(8676002)(786003)(2906002)(9686003)(8936002)(81166006)(55016002)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB1636; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; MLV:sfv; x-microsoft-antispam-message-info: pKQUAnYIgnnPUU46+dbYRw25FOD82iGz90aA3yCSJ5CjJ6hUYpsUDMiIC7SMr2TS6Q82EEwzhRhC9I5HHYOVsD+rqP1LWpBh4O+dXYD4WN8RCfA3kyF80Mtto1jXDSFjMkEQH6NlvUZ900rTe8GX9Bkewrr7FA1115pnM3/L6kd+5lZnhtKV8ygupL93ZHA/ spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: f799f7bd-d64d-47e2-37ee-08d5a7cc2028 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: f799f7bd-d64d-47e2-37ee-08d5a7cc2028 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2018 21:09:09.6685 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB1636 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 21:09:11 -0000 With a recent head/current kernel (doesn't happen when running a Dec. 2017 = one), when I do a halt, it gets as far as: vnodes remaining... 0 time out and that's it (the time out appears several seconds after the first "0"). With a Dec. 2017 kernel there would be several "0"s printed. It appears that it is stuck in the first iteration of the sched_sync() loop= after it is no longer in SYNCER_RUNNING state. Any ideas? rick From owner-freebsd-current@freebsd.org Sat Apr 21 21:49:44 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5D9C9FA6D74 for ; Sat, 21 Apr 2018 21:49:44 +0000 (UTC) (envelope-from tijl@freebsd.org) Received: from mailrelay104.isp.belgacom.be (mailrelay104.isp.belgacom.be [195.238.20.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "relay.skynet.be", Issuer "GlobalSign Organization Validation CA - SHA256 - G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CDEC77E6DA for ; Sat, 21 Apr 2018 21:49:43 +0000 (UTC) (envelope-from tijl@freebsd.org) X-Belgacom-Dynamic: yes IronPort-PHdr: =?us-ascii?q?9a23=3ADI3JyBS03S+CazHtZ6f3rmE/t9psv+yvbD5Q0YIu?= =?us-ascii?q?jvd0So/mwa6yZhCN2/xhgRfzUJnB7Loc0qyK6/umATRIyK3CmUhKSIZLWR4BhJ?= =?us-ascii?q?detC0bK+nBN3fGKuX3ZTcxBsVIWQwt1Xi6NU9IBJS2PAWK8TW94jEIBxrwKxd+?= =?us-ascii?q?KPjrFY7OlcS30P2594HObwlSizexfb1/IA+qoQnNq8IbnZZsJqEtxxXTv3BGYf?= =?us-ascii?q?5WxWRmJVKSmxbz+MK994N9/ipTpvws6ddOXb31cKokQ7NYCi8mM30u683wqRbD?= =?us-ascii?q?VwqP6WACXWgQjxFFHhLK7BD+Xpf2ryv6qu9w0zSUMMHqUbw5Xymp4rx1QxH0li?= =?us-ascii?q?gIKz858HnWisNuiqJbvAmhrAF7z4LNfY2ZKOZycqbbcNgHR2ROQ9xRWjRPDI28?= =?us-ascii?q?cYUBEukPMuRWr4byu1QDth6+CRWwCO711jNEmmH60Ksn2OohCwHG2wkgEsoQvn?= =?us-ascii?q?TVrtX1MLoZXP6yzKnP1jXMcfZW1i376IjTbxsspu2MXbNyccrV0kQhFxnFgUuO?= =?us-ascii?q?poH4Ij2b2P4Bs2+B7+pvTO+ijXMspQ92ojiq3Mgsi4/Ji5obylDe6yp23p06Jc?= =?us-ascii?q?alR0JhZt6kCpRQuieHPIV1WsMvW2JltDsgxrEYtpO3YTIGxIo7yxLBcfCLboiF?= =?us-ascii?q?7xzlWe2MOzl3nmhld6i6hxuq9EigzfDzWdes3VZRqypFjsHMtncQ1xzP8sSHSu?= =?us-ascii?q?Vy/kOm2TuX1ADc8OVEIUExlaXFMZ4hxaQ8loYSsUTBGi/6gln5jKiRdkU/5Oeo?= =?us-ascii?q?7v7oYrP9ppOGMI90kA7+Prwvmsy5H+s4LhADUmuG9eimyrHu8lD1TK9UgvEqjK?= =?us-ascii?q?XVqo3WKMQVq6KhBg9ayIcj6xKxDze819QYmGEKLE5EeBKFi4jkIF/OIOrmAvih?= =?us-ascii?q?mFusiypky+rBPr37DZXBNmLDn6v5fbZh905czxI+zd5F551KFL4OO+nzVVLouN?= =?us-ascii?q?PEEx85KRa0zPjhCNVhzY4eV3iPDbGHP6zJql+H+/gjI+6WZI8a637BLK0f5vXt?= =?us-ascii?q?xVowklwZcKzhiYESYXu7GvljC1iebmfhhs8BV2wD6FkQVuvv3WGDUzobTHG1RK?= =?us-ascii?q?857zcgQNa6DIXHbq63jbGr5wv9GYdZMDMVQmuQGGvlIt3XE8wHbzifd4o4ymQJ?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A2AZBQBTsdta/5nK8VFVB4N0Uw56KIxKj?= =?us-ascii?q?BcBAYFzMQFdkwAUgWQuhEgCgkQiNBgBAgEBAQEBAQIBaxwMgjUkAYJJAQVWIxA?= =?us-ascii?q?LDgoJJQ8qHgYThRMLqGyIPIIfCgWKH4QagxEEGIEvBIVnApdzCIM8giCIWWiLc?= =?us-ascii?q?Yk2iBwcOIFSTTAIgn6CIBeIWYVAPTABjWEpgh0BAQ?= X-IPAS-Result: =?us-ascii?q?A2AZBQBTsdta/5nK8VFVB4N0Uw56KIxKjBcBAYFzMQFdkwA?= =?us-ascii?q?UgWQuhEgCgkQiNBgBAgEBAQEBAQIBaxwMgjUkAYJJAQVWIxALDgoJJQ8qHgYTh?= =?us-ascii?q?RMLqGyIPIIfCgWKH4QagxEEGIEvBIVnApdzCIM8giCIWWiLcYk2iBwcOIFSTTA?= =?us-ascii?q?Ign6CIBeIWYVAPTABjWEpgh0BAQ?= Received: from 153.202-241-81.adsl-dyn.isp.belgacom.be (HELO kalimero.tijl.coosemans.org) ([81.241.202.153]) by relay.skynet.be with ESMTP; 21 Apr 2018 23:49:36 +0200 Received: from kalimero.tijl.coosemans.org (kalimero.tijl.coosemans.org [127.0.0.1]) by kalimero.tijl.coosemans.org (8.15.2/8.15.2) with ESMTP id w3LLnZxW004782; Sat, 21 Apr 2018 23:49:35 +0200 (CEST) (envelope-from tijl@FreeBSD.org) Date: Sat, 21 Apr 2018 23:49:34 +0200 From: Tijl Coosemans To: Rick Macklem Cc: "freebsd-current@freebsd.org" Subject: Re: i386 hangs during halt "vnodes remaining... 0 time out" Message-ID: <20180421234934.10d7dfab@kalimero.tijl.coosemans.org> In-Reply-To: References: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="MP_/TDsO+CDIra7UXGs=vVO3NTB" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 21:49:44 -0000 --MP_/TDsO+CDIra7UXGs=vVO3NTB Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Content-Disposition: inline On Sat, 21 Apr 2018 21:09:09 +0000 Rick Macklem wrote: > With a recent head/current kernel (doesn't happen when running a Dec. > 2017 one), when I do a halt, it gets as far as: > > vnodes remaining... 0 time out > > and that's it (the time out appears several seconds after the first "0"). > With a Dec. 2017 kernel there would be several "0"s printed. > It appears that it is stuck in the first iteration of the sched_sync() > loop after it is no longer in SYNCER_RUNNING state. > > Any ideas? rick See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227404 I have a patch (attached) but haven't been able to test it yet. --MP_/TDsO+CDIra7UXGs=vVO3NTB Content-Type: text/x-patch Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=bufdaemon.patch Index: sys/kern/vfs_bio.c =================================================================== --- sys/kern/vfs_bio.c (revision 332165) +++ sys/kern/vfs_bio.c (working copy) @@ -791,9 +791,12 @@ bufspace_daemon(void *arg) { struct bufdomain *bd; + EVENTHANDLER_REGISTER(shutdown_pre_sync, kthread_shutdown, curthread, + SHUTDOWN_PRI_LAST); + bd = arg; for (;;) { - kproc_suspend_check(curproc); + kthread_suspend_check(); /* * Free buffers from the clean queue until we meet our @@ -3357,7 +3360,7 @@ buf_daemon() /* * This process needs to be suspended prior to shutdown sync. */ - EVENTHANDLER_REGISTER(shutdown_pre_sync, kproc_shutdown, bufdaemonproc, + EVENTHANDLER_REGISTER(shutdown_pre_sync, kthread_shutdown, curthread, SHUTDOWN_PRI_LAST); /* @@ -3381,7 +3384,7 @@ buf_daemon() bd_request = 0; mtx_unlock(&bdlock); - kproc_suspend_check(bufdaemonproc); + kthread_suspend_check(); /* * Save speedupreq for this pass and reset to capture new --MP_/TDsO+CDIra7UXGs=vVO3NTB-- From owner-freebsd-current@freebsd.org Sat Apr 21 22:09:57 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 00E77FA822B for ; Sat, 21 Apr 2018 22:09:57 +0000 (UTC) (envelope-from clbuisson@orange.fr) Received: from smtp.smtpout.orange.fr (smtp13.smtpout.orange.fr [80.12.242.135]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client CN "Bizanga Labs SMTP Client Certificate", Issuer "Bizanga Labs CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 62FE182C19 for ; Sat, 21 Apr 2018 22:09:55 +0000 (UTC) (envelope-from clbuisson@orange.fr) Received: from localhost ([90.5.43.84]) by mwinf5d75 with ME id dA9m1x00Q1oxXYi03A9nHo; Sun, 22 Apr 2018 00:09:48 +0200 X-ME-Helo: localhost X-ME-Auth: Y2xidWlzc29uQHdhbmFkb28uZnI= X-ME-Date: Sun, 22 Apr 2018 00:09:48 +0200 X-ME-IP: 90.5.43.84 Subject: Re: i386 hangs during halt "vnodes remaining... 0 time out" To: Rick Macklem , "freebsd-current@freebsd.org" References: From: Claude Buisson Message-ID: <247bdb2f-d8b7-aba0-997d-050717cab100@orange.fr> Date: Sun, 22 Apr 2018 00:09:46 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 22:09:57 -0000 On 04/21/2018 23:09, Rick Macklem wrote: > With a recent head/current kernel (doesn't happen when running a Dec. 2017 one), > when I do a halt, it gets as far as: > > vnodes remaining... 0 time out > > and that's it (the time out appears several seconds after the first "0"). > With a Dec. 2017 kernel there would be several "0"s printed. > It appears that it is stuck in the first iteration of the sched_sync() loop after > it is no longer in SYNCER_RUNNING state. > > Any ideas? rick > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > There is a PR which seems related: 227404 I was hit by this problem when upgrading an i386 UP system from r329142 to r332518. The culprit appears to be r329612. I reverted 4 files: sys/kern/vfs_bio.c -> r329187 sys/kern/vfs_subr.c -> r328643 sys/sys/buf.h -> r329078 sys/sys/bufobj.h -> r326256 rebuild the system, and the hang disappeared. I have now 2 i386 UP and 1 amd64 MP systems running with this modification, and 1 RPI2 in the pipe line. Hope it helps Claude Buisson From owner-freebsd-current@freebsd.org Sat Apr 21 22:28:02 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2916DFA9338 for ; Sat, 21 Apr 2018 22:28:02 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from smtp-out-so.shaw.ca (smtp-out-so.shaw.ca [64.59.136.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 9BE2A87415; Sat, 21 Apr 2018 22:28:01 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from spqr.komquats.com ([70.67.125.17]) by shaw.ca with ESMTPA id A0z1fGPOhbrv9A0z3fmjQo; Sat, 21 Apr 2018 16:27:54 -0600 X-Authority-Analysis: v=2.3 cv=JOMVTfCb c=1 sm=1 tr=0 a=VFtTW3WuZNDh6VkGe7fA3g==:117 a=VFtTW3WuZNDh6VkGe7fA3g==:17 a=kj9zAlcOel0A:10 a=Kd1tUaAdevIA:10 a=YqRfAJJkAAAA:8 a=hF2rLc1pAAAA:8 a=6I5d2MoRAAAA:8 a=YxBL1-UpAAAA:8 a=q1TktWUj2a0_YGXEua8A:9 a=CjuIK1q_8ugA:10 a=EZxYlxVqKW1-bC4Rwo9g:22 a=O9OM7dhJW_8Hj9EqqvKN:22 a=IjZwj45LgO3ly-622nXo:22 a=Ia-lj3WSrqcvXOmTRaiG:22 Received: from slippy.cwsent.com (slippy [10.1.1.91]) by spqr.komquats.com (Postfix) with ESMTPS id AC4D83AB; Sat, 21 Apr 2018 15:27:51 -0700 (PDT) Received: from slippy.cwsent.com (localhost [127.0.0.1]) by slippy.cwsent.com (8.15.2/8.15.2) with ESMTP id w3LMRpbI002978; Sat, 21 Apr 2018 15:27:51 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Received: from slippy (cy@localhost) by slippy.cwsent.com (8.15.2/8.15.2/Submit) with ESMTP id w3LMRp5W002975; Sat, 21 Apr 2018 15:27:51 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Message-Id: <201804212227.w3LMRp5W002975@slippy.cwsent.com> X-Authentication-Warning: slippy.cwsent.com: cy owned process doing -bs X-Mailer: exmh version 2.8.0 04/21/2012 with nmh-1.7.1 Reply-to: Cy Schubert From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.cschubert.com/ To: Tijl Coosemans cc: Rick Macklem , "freebsd-current@freebsd.org" Subject: Re: i386 hangs during halt "vnodes remaining... 0 time out" In-Reply-To: Message from Tijl Coosemans of "Sat, 21 Apr 2018 23:49:34 +0200." <20180421234934.10d7dfab@kalimero.tijl.coosemans.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Sat, 21 Apr 2018 15:27:51 -0700 X-CMAE-Envelope: MS4wfJfZHhyktM/YDhxHzLfthdcO375tYHHfhDxf43mUMRjvc6vVT85AYlrrP+ix1+kjPK7LKQdvm/K027jbGA4QoFSKr/EYgn1rzDf9Ua1wM207ZjU8efgg H2RIjXGkKztdn1s68h/2fS1hgf1oDydGkrmX0oLSWjOzKeCFavRSps+Dkylx7gbAO3YfltDKDWIVuZqmuw8InYx+wqnJJyCZUWnlTg/3fQkwsFS+475TC6/1 z2/hS0VDldAoZAsEzouVGQ== X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 22:28:02 -0000 In message <20180421234934.10d7dfab@kalimero.tijl.coosemans.org>, Tijl Cooseman s writes: > --MP_/TDsO+CDIra7UXGs=vVO3NTB > Content-Type: text/plain; charset=US-ASCII > Content-Transfer-Encoding: 7bit > Content-Disposition: inline > > On Sat, 21 Apr 2018 21:09:09 +0000 Rick Macklem wrote: > > With a recent head/current kernel (doesn't happen when running a Dec. > > 2017 one), when I do a halt, it gets as far as: > > > > vnodes remaining... 0 time out > > > > and that's it (the time out appears several seconds after the first "0"). > > With a Dec. 2017 kernel there would be several "0"s printed. > > It appears that it is stuck in the first iteration of the sched_sync() > > loop after it is no longer in SYNCER_RUNNING state. > > > > Any ideas? rick > > See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227404 > I have a patch (attached) but haven't been able to test it yet. I've noticed this as well on my old Penium-M laptop (updated about twice a year). I'll try your patch this weekend or early next week. ~cy > > --MP_/TDsO+CDIra7UXGs=vVO3NTB > Content-Type: text/x-patch > Content-Transfer-Encoding: 7bit > Content-Disposition: attachment; filename=bufdaemon.patch > > Index: sys/kern/vfs_bio.c > =================================================================== > --- sys/kern/vfs_bio.c (revision 332165) > +++ sys/kern/vfs_bio.c (working copy) > @@ -791,9 +791,12 @@ bufspace_daemon(void *arg) > { > struct bufdomain *bd; > > + EVENTHANDLER_REGISTER(shutdown_pre_sync, kthread_shutdown, curthread, > + SHUTDOWN_PRI_LAST); > + > bd = arg; > for (;;) { > - kproc_suspend_check(curproc); > + kthread_suspend_check(); > > /* > * Free buffers from the clean queue until we meet our > @@ -3357,7 +3360,7 @@ buf_daemon() > /* > * This process needs to be suspended prior to shutdown sync. > */ > - EVENTHANDLER_REGISTER(shutdown_pre_sync, kproc_shutdown, bufdaemonproc, > + EVENTHANDLER_REGISTER(shutdown_pre_sync, kthread_shutdown, curthread, > SHUTDOWN_PRI_LAST); > > /* > @@ -3381,7 +3384,7 @@ buf_daemon() > bd_request = 0; > mtx_unlock(&bdlock); > > - kproc_suspend_check(bufdaemonproc); > + kthread_suspend_check(); > > /* > * Save speedupreq for this pass and reset to capture new > > --MP_/TDsO+CDIra7UXGs=vVO3NTB > Content-Type: text/plain; charset="us-ascii" > MIME-Version: 1.0 > Content-Transfer-Encoding: 7bit > Content-Disposition: inline > > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > > --MP_/TDsO+CDIra7UXGs=vVO3NTB-- > -- Cheers, Cy Schubert FreeBSD UNIX: Web: http://www.FreeBSD.org The need of the many outweighs the greed of the few. From owner-freebsd-current@freebsd.org Sat Apr 21 23:30:57 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D0957FACF4E for ; Sat, 21 Apr 2018 23:30:57 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670061.outbound.protection.outlook.com [40.107.67.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT TLS CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 65FED7554E for ; Sat, 21 Apr 2018 23:30:56 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM (52.132.66.153) by YQBPR0101MB1922.CANPRD01.PROD.OUTLOOK.COM (52.132.71.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.696.13; Sat, 21 Apr 2018 23:30:55 +0000 Received: from YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a]) by YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM ([fe80::893c:efc2:d71f:945a%13]) with mapi id 15.20.0696.015; Sat, 21 Apr 2018 23:30:55 +0000 From: Rick Macklem To: Konstantin Belousov CC: "freebsd-current@freebsd.org" , "George Mitchell" , Peter Subject: Re: SCHED_ULE makes 256Mbyte i386 unusable Thread-Topic: SCHED_ULE makes 256Mbyte i386 unusable Thread-Index: AQHT2aRaIslt1yc1ckCslUza9Eao6KQLppMAgAA0JP0= Date: Sat, 21 Apr 2018 23:30:55 +0000 Message-ID: References: , <20180421201128.GO6887@kib.kiev.ua> In-Reply-To: <20180421201128.GO6887@kib.kiev.ua> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca; x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; YQBPR0101MB1922; 7:2HIN80XkpcSA2Al9RXcH42mXohi6VpXRUrh5BdY9s6BGvrWnySvsQ//tfKSAoM7/c4puZuDqbP6JTATC72e4F+0+CPpDd9TuS2n/O3Lqs9E7khWqWYHaXQkObvbcwfUq7Um2Yr4174e7Mv7l/dV2ndXgGokeLQxSwhfjflGafwLm3yW7D60YwAZmrbs0e5krS2lskyRKY98p4+CqIVRPD48Bw4nDlW/TlbthrVm0A3SYz9IMFGQOfYU6WW+TwEgN x-ms-exchange-antispam-srfa-diagnostics: SOS; x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(8990040)(2017052603328)(7153060)(7193020); SRVR:YQBPR0101MB1922; x-ms-traffictypediagnostic: YQBPR0101MB1922: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(10201501046)(3231232)(944501410)(52105095)(93006095)(93001095)(3002001)(6041310)(20161123564045)(20161123562045)(20161123560045)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011); SRVR:YQBPR0101MB1922; BCL:0; PCL:0; RULEID:; SRVR:YQBPR0101MB1922; x-forefront-prvs: 064903DDDC x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39380400002)(346002)(366004)(376002)(39860400002)(396003)(51914003)(74316002)(11346002)(54906003)(229853002)(1411001)(102836004)(6506007)(76176011)(476003)(6916009)(446003)(7696005)(14454004)(74482002)(26005)(186003)(59450400001)(3280700002)(305945005)(5250100002)(33656002)(5660300001)(786003)(8676002)(9686003)(2900100001)(86362001)(99286004)(316002)(3660700001)(6246003)(55016002)(2906002)(81166006)(25786009)(8936002)(4326008)(53936002)(478600001)(39060400002)(6436002); DIR:OUT; SFP:1101; SCL:1; SRVR:YQBPR0101MB1922; H:YQBPR0101MB1042.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; MLV:ovrnspm; PTR:InfoNoRecords; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-microsoft-antispam-message-info: zJl/hVBIC5b8NTE/BvxNRPdaZxD7bnmVRTa2cWi+cd4Lgkz7DepHWp1qPmBDtpks3RT7oz8lOURvuGTsvk6q2Zy33nPKe1OsRiwQ5OjZl6erBHbky4K1W3+M6npki802xDBfOeDUdC87ArgvJxHCHuqglcu4fYUUa0VijDfwDjs1XavgJuCpIcqIem34LtPg spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 6d33983c-f13a-450b-76a8-08d5a7dfeddf X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 6d33983c-f13a-450b-76a8-08d5a7dfeddf X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2018 23:30:55.2871 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQBPR0101MB1922 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 23:30:58 -0000 Konstantin Belousov wrote: >On Sat, Apr 21, 2018 at 07:21:58PM +0000, Rick Macklem wrote: >> I decided to start a new thread on current related to SCHED_ULE, since I= see >> more than just performance degradation and on a recent current kernel. >> (I cc'd a couple of the people discussing performance problems in freebs= d-stable >> recently under a subject line of "Re: kern.sched.quantum: Creepy, sadis= tic scheduler". >> >> When testing a pNFS server on a single core i386 with 256Mbytes using a = Dec. 2017 >> current/head kernel, I would see about a 30% performance degradation (el= apsed >> run time for a kernel build over NFSv4.1) when the server kernel was bui= lt with >> options SCHED_ULE >> instead of >> options SCHED_4BSD >> >> Now, with a kernel from a couple of days ago, the >> options SCHED_ULE >> kernel becomes unusable shortly after starting testing. >> I have seen two variants of this: >> - Became essentially hung. All I could do was ping the machine from the = network. >> - Reported "vm_thread_new: kstack allocation failed >> and then any attempt to do anything gets "No more processes". >This is strange. It usually means that you get KVA either exhausted or >severly fragmented. Yes. I reduced the number of nfsd threads from 256->32 and the SCHED_ULE kernel is working ok now. I haven't done enough to compare performance yet. Maybe I'll post again when I have some numbers. >Enter ddb, it should be operational since pings are replied. Try to see >where the threads are stuck. I didn't do this, since reducing the number of kernel threads seems to have= fixed the problem. For the pNFS server, the nfsd threads will spawn additional ke= rnel threads to do proxies to the mirrored DS servers. >> with the only difference being a kernel built with >> options SCHED_4BSD >> everything works and performs the same as the Dec 2017 kernel. >> >> I can try rolling back through the revisions, but it would be nice if so= meone >> could suggest where to start, because it takes a couple of hours to buil= d a >> kernel on this system. >> >> So, something has made things worse for a head/current kernel this winte= r, rick > >There are at least two potentially relevant changes. > >First is r326758 Dec 11 which bumped KSTACK_PAGES on i386 to 4. I've been running this machine with KSTACK_PAGES=3D4 for some time, so no c= hange. >Second is r332489 Apr 13, which introduced 4/4G KVA/UVA split. Could this change have resulted in the system being able to allocate fewer kernel threads/stacks for some reason? >Consequences of the first one are obvious, it is much harder to find >the place to map the stack. Second change, on the other hand, provides >almost full 4G for KVA and should have mostly compensate for the negative >effects of the first. > >And, I cannot see how changing the scheduler would fix or even affect that >behaviour. My hunch is that the system was running near its limit for kernel threads/s= tacks. Then, somehow, the timing SCHED_ULE caused resulted in the nfsd trying to g= et to a higher peak number of threads and hit the limit. SCHED_4BSD happened to result in timing such that it stayed just below the limit and worked. I can think of a couple of things that might affect this: 1 - If SCHED_ULE doesn't do the termination of kernel threads as quickly, t= hen they wouldn't terminate and release their resources before more new o= nes are spawned. 2 - If SCHED_ULE handles the nfsd threads in a more "bursty" way, then the = burst could try and spawn more mirror DS worker threads at about the same t= ime. Anyhow, thanks for the help, rick