From owner-freebsd-stable@freebsd.org Mon Apr 2 16:41:33 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 09E92F765B0 for ; Mon, 2 Apr 2018 16:41:32 +0000 (UTC) (envelope-from lists@knigma.org) Received: from shrewd.pub.knigma.org (shrewd.ipv6.pub.knigma.org [IPv6:2001:8b0:b0:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0E1D8869A4 for ; Mon, 2 Apr 2018 16:41:31 +0000 (UTC) (envelope-from lists@knigma.org) Received: from dhcp13.wireless.knigma.org (localhost [127.0.0.1]) (authenticated bits=0) by shrewd.pub.knigma.org (8.15.2/8.15.2) with ESMTPSA id w32GfSKB001721 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 2 Apr 2018 17:41:29 +0100 (BST) (envelope-from lists@knigma.org) Reply-To: markk@knigma.org Subject: Re: FreeBSD 10.4 kernel breaks on i7-7700 / PRIME H270M-PLUS To: freebsd-stable@freebsd.org, Eugene Grosbein References: <5AC1C628.6030309@grosbein.net> <3c184bf8-8651-22a7-a040-8260b44647da@knigma.org> <5AC233B2.2050805@grosbein.net> From: Mark Knight Message-ID: <827319fc-b634-c0aa-063b-6e4a0ade8163@knigma.org> Date: Mon, 2 Apr 2018 17:41:28 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <5AC233B2.2050805@grosbein.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.2 (shrewd.pub.knigma.org [127.0.0.1]); Mon, 02 Apr 2018 17:41:30 +0100 (BST) X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Apr 2018 16:41:33 -0000 On 02/04/2018 14:44, Eugene Grosbein wrote: > 3. Boot new kernel using nextboot(8) and see if it will crash instead of deadlock > and if so, fill the PR to Bugzilla. Thanks again. Drat, no crash. The only difference was a few new errors during the boot - which I'm assuming are unrelated. > Apr 2 17:27:58 shrewd kernel: [16] lock order reversal: > Apr 2 17:27:58 shrewd kernel: [16] 1st 0xfffff80077653418 ufs (ufs) @ /usr/src/sys/kern/vfs_subr.c:2253 > Apr 2 17:27:58 shrewd kernel: [16] 2nd 0xfffffe03dbe7d218 bufwait (bufwait) @ /usr/src/sys/ufs/ffs/ffs_vnops.c:262 > Apr 2 17:27:58 shrewd kernel: [16] 3rd 0xfffff80077c089a0 ufs (ufs) @ /usr/src/sys/kern/vfs_subr.c:2253 > Apr 2 17:27:58 shrewd kernel: [16] KDB: stack backtrace: > Apr 2 17:27:58 shrewd kernel: [16] db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0462049b30 > Apr 2 17:27:58 shrewd kernel: [16] kdb_backtrace() at kdb_backtrace+0x39/frame 0xfffffe0462049be0 > Apr 2 17:27:58 shrewd kernel: [16] witness_checkorder() at witness_checkorder+0xe2b/frame 0xfffffe0462049c70 > Apr 2 17:27:58 shrewd kernel: [16] __lockmgr_args() at __lockmgr_args+0x988/frame 0xfffffe0462049d90 > Apr 2 17:27:58 shrewd kernel: [16] ffs_lock() at ffs_lock+0x84/frame 0xfffffe0462049de0 > Apr 2 17:27:58 shrewd kernel: [16] VOP_LOCK1_APV() at VOP_LOCK1_APV+0xfc/frame 0xfffffe0462 > Apr 2 17:27:58 shrewd kernel: 049e10 > Apr 2 17:27:59 shrewd kernel: [16] _vn_lock() at _vn_lock+0xaa/frame 0xfffffe0462049e80 > Apr 2 17:27:59 shrewd kernel: [16] vget() at vget+0x67/frame 0xfffffe0462049ec0 > Apr 2 17:27:59 shrewd kernel: [16] vfs_hash_get() at vfs_hash_get+0xe1/frame 0xfffffe0462049f10 > Apr 2 17:27:59 shrewd kernel: [16] ffs_vgetf() at ffs_vgetf+0x40/frame 0xfffffe0462049fa0 > Apr 2 17:27:59 shrewd kernel: [16] softdep_sync_buf() at softdep_sync_buf+0xa25/frame 0xfffffe046204a090 > Apr 2 17:27:59 shrewd kernel: [16] ffs_syncvnode() at ffs_syncvnode+0x286/frame 0xfffffe046204a110 > Apr 2 17:27:59 shrewd kernel: [16] ffs_truncate() at ffs_truncate+0x6a9/frame 0xfffffe046204a2f0 > Apr 2 17:27:59 shrewd kernel: [16] ufs_direnter() at ufs_direnter+0x7c8/frame 0xfffffe046204a3b0 > Apr 2 17:27:59 shrewd kernel: [16] ufs_makeinode() at ufs_makeinode+0x5d9/frame 0xfffffe046204a570 > Apr 2 17:27:59 shrewd kernel: [16] ufs_create() at ufs_create+0x34/frame 0xfffffe046204a590 > Apr 2 17:27:59 shrewd kernel: [16] VOP_CREATE_APV() at VOP_CREATE_APV+0xf1/frame 0xfffffe046204a5c0 > Apr 2 17:27:59 shrewd kernel: [16] vn_open_cred() at vn_open_cred+0x2c3/frame 0xfffffe046204a720 > Apr 2 17:27:59 shrewd kernel: [16] kern_openat() at kern_openat+0x26f/frame 0xfffffe046204a8a0 > Apr 2 17:27:59 shrewd kernel: [16] amd64_syscall() at amd64_syscall+0x2c6/frame 0xfffffe046204a9b0 > Apr 2 17:27:59 shrewd kernel: [16] Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe046204a9b0 > Apr 2 17:27:59 shrewd kernel: [16] --- syscall (5, FreeBSD ELF64, sys_open), rip = 0x801fcc9aa, rsp = 0x7fffdfdf9c38, rbp = 0x7fffdfdf9c60 --- > Apr 2 17:28:48 shrewd kernel: [66] lock order reversal: > Apr 2 17:28:48 shrewd kernel: [66] 1st 0xfffffe03dbf949f8 bufwait (bufwait) @ /usr/src/sys/kern/vfs_bio.c:3130 > Apr 2 17:28:48 shrewd kernel: [66] 2nd 0xfffff8000b741000 dirhash (dirhash) @ /usr/src/sys/ufs/ufs/ufs_dirhash.c:280 > Apr 2 17:28:48 shrewd kernel: [66] KDB: stack backtrace: > Apr 2 17:28:48 shrewd kernel: [66] db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0462185130 > Apr 2 17:28:48 shrewd kernel: [66] kdb_backtrace() at kdb_backtrace+0x39/frame 0xfffffe04621851e0 > Apr 2 17:28:48 shrewd kernel: [66] witness_checkorder() at witness_checkorder+0xe2b/frame 0xfffffe0462185270 > Apr 2 17:28:48 shrewd kernel: [66] _sx_xlock() at _sx_xlock+0x75/frame 0xfffffe04621852b0 > Apr 2 17:28:48 shrewd kernel: [66] ufsdirhash_add() at ufsdirhash_add+0x3a/frame 0xfffffe04621852f0 > Apr 2 17:28:48 shrewd kernel: [66] ufs_direnter() at ufs_direnter+0x622/frame 0xfffffe04621853b0 > Apr 2 17:28:48 shrewd kernel: [66] ufs_makeinode() at ufs_makeinode+0x5d9/frame 0xfffffe0462185570 > Apr 2 17:28:48 shrewd kernel: [66] ufs_create() at ufs_create+0x34/frame 0xfffffe0462185590 > Apr 2 17:28:48 shrewd kernel: [66] VOP_CREATE_APV() at VOP_CREATE_APV+0xf1/frame 0xfffffe04621855c0 > Apr 2 17:28:48 shrewd kernel: [66] vn_open_cred() at vn_open_cred+0x2c3/frame 0xfffffe0462185720 > Apr 2 17:28:48 shrewd kernel: [66] kern_openat() at kern_openat+0x26f/frame 0xfffffe04621858a0 > Apr 2 17:28:48 shrewd kernel: [66] amd64_syscall() at amd64_syscall+0x2c6/frame 0xfffffe04621859b0 > Apr 2 17:28:48 shrewd kernel: [66] Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe04621859b0 > Apr 2 17:28:48 shrewd kernel: [66] --- syscall (499, FreeBSD ELF64, sys_openat), rip = 0x80174cb7a, rsp = 0x7fffffff7f58, rbp = 0x7fffffff7fd0 --- -- Mark Knight