From nobody Sun Mar 17 07:00:41 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Ty85Q4B0tz5FS2G for ; Sun, 17 Mar 2024 07:00:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Ty85Q15S9z3xtl for ; Sun, 17 Mar 2024 07:00:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1710658842; a=rsa-sha256; cv=none; b=E33bwdH6YLPDycdVXOQAXVrFexFMhMPRdiKP3AGmEfEshglvBAq4MP9zMaQiX3/rzZL1gu nhmOxYj/dXr3rNmPpUu1USfW0CvIuZDBV0o43qlTiURyjkoEySTokr9YhrnpScQoc4MAyj M8D43Eb2NL+ezVBtwCtNcC4KV0MAHPyZc82J3TxeUDGdBaYmK95cI9uB48jDVWVesf1mM6 GJSf9d7LhyRW6Q2iLWJemx+epDgRClYBqvtN+vUUPYg3b+DX/QfqBF71FYxfoCjrVK7Jnp VZs64cKa0P3yjt2lX7mCD0eXolZv8k7NopT6a2/495Al0mDfbfP6ewNXVwDAcw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1710658842; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=e+FM8ST05BUo/i1WM0cFwLQjOiisf3vwQihW7TcJYlU=; b=yfa/v6DIC+7chtjxlKJJ6rQPdtPHret9jpUa6BH3D1G8mscl512xQ4/Fqpi2LaCy2Ab8Jg 0slAITbYWqBvukHeac8EYBY+ZArLgfhyZLdDZLMys6l4rIwlh9H0hEALtk7RcxE3iEuwk4 vvDkU196wnBYOcvFzxkrhqea2VtUF6RLLL3OtV2latTcuZ6T94xqZxDyliwfJ3Jk/HFfSq SF1wzX0oPOZWEZSk7Rozv/YekZw+ydx/Xliy9WOw/+iijR6U61E490vNJgx36fq9aJtfLh cdKy/xdy2UdrGdMbOVlx9gtS1Ejt0Tuz9IU7PEFdUfMqt8KFU1T6BnQVj+vTxA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Ty85Q0fKRzSdB for ; Sun, 17 Mar 2024 07:00:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 42H70fb9049694 for ; Sun, 17 Mar 2024 07:00:41 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 42H70fx9049689 for bugs@FreeBSD.org; Sun, 17 Mar 2024 07:00:41 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 277389] Reproduceable low memory freeze on 14.0-RELEASE-p5 Date: Sun, 17 Mar 2024 07:00:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277389 --- Comment #24 from Mark Millard --- (In reply to pascal.guitierrez from comment #11) If you can test main , stable/14 , or stable/13 , then testing with: nullfs_load=3D"YES" vfs.nullfs.cache_vnodes=3D0 zfs_load=3D"YES" in /boot/loader.conf could prove interesting. vfs.nullfs.cache_vnodes has been MFC'd but no releng/* has it yet. nullfs.ko is what adds vfs.nullfs.cache_vnodes , thus the the explicit load as early as possible, just before the assignment. In my context I got: # kldstat Id Refs Address Size Name 1 84 0xffffffff80200000 1d497b0 kernel 2 1 0xffffffff81f4a000 9810 nullfs.ko 3 1 0xffffffff81f55000 5e8fe0 zfs.ko 4 1 0xffffffff8253e000 7718 cryptodev.ko . . . --=20 You are receiving this mail because: You are the assignee for the bug.=