From owner-freebsd-arm@FreeBSD.ORG Tue Jul 2 06:17:25 2013 Return-Path: Delivered-To: freebsd-arm@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id A76A6E2F for ; Tue, 2 Jul 2013 06:17:25 +0000 (UTC) (envelope-from gonzo@id.bluezbox.com) Received: from id.bluezbox.com (id.bluezbox.com [88.198.91.248]) by mx1.freebsd.org (Postfix) with ESMTP id 2F4AC189D for ; Tue, 2 Jul 2013 06:17:24 +0000 (UTC) Received: from [207.6.254.8] (helo=[192.168.1.65]) by id.bluezbox.com with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.77 (FreeBSD)) (envelope-from ) id 1Utttv-000GRd-Ow; Mon, 01 Jul 2013 23:17:22 -0700 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\)) Subject: Re: Raspberry pi not ready to self-host yet? From: Oleksandr Tymoshenko In-Reply-To: <20130701202716.264a5ac9@bender.Home> Date: Mon, 1 Jul 2013 23:17:00 -0700 Content-Transfer-Encoding: 7bit Message-Id: <27399D4B-8CEF-427B-9201-A47564F7DF50@bluezbox.com> References: <800732D1-B06A-40AE-AE69-F6170662B2AA@turbofuzz.com> <20130626235542.27844683@ivory.wynn.com> <79CFABCE-156A-44B5-B989-A3607C47B2AF@mail.turbofuzz.com> <20130627013142.5fdb2544@ivory.wynn.com> <20130627111623.137ad2ca@ivory.wynn.com> <20130627215424.GA2441@night.db.net> <463D25BB-88D6-4B2E-A7F2-05A8B0525571@gmail.com> <489E95FC-AF71-483C-BA08-81276B850B7F@bluezbox.com> <20130701202716.264a5ac9@bender.Home> To: Andrew Turner X-Mailer: Apple Mail (2.1503) Sender: gonzo@id.bluezbox.com X-Spam-Level: -- X-Spam-Report: Spam detection software, running on the system "id.bluezbox.com", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see The administrator of that system for details. Content preview: On 2013-07-01, at 12:27 PM, Andrew Turner wrote: > On Mon, 1 Jul 2013 01:33:59 -0700 > Oleksandr Tymoshenko wrote: > >> >> On 2013-07-01, at 1:14 AM, Jordan Hubbard >> wrote: >> >>> Well, I managed to build and install an RPI-B kernel on the PI >>> itself last night using gcc as the compiler, but it doesn't boot. >>> I get the dreaded "kernel boot args: (null)" and then a hang before >>> even getting into the device probes. >> >> It crashes due to INVARIANTS options in kernel config. I'm going to >> look into this problem some time next week unless someone beats me >> to it. Just disable them for now. > > There are two panics: > 1. In vm_map_zinit() the sx lock fails to initialise because it thinks > it is already initialised. This is because the bit to check this has > been set in uma_startup() by the line: > slab->us_flags = UMA_SLAB_BOOT; > This is only a problem with INVARIANTS because the location of > us_flags changes when it is enabled, and in this case the slab is > reused as the memory allocated without zeroing it out first. > 2. uma_dbg_alloc/uma_dbg_free use atomic operations on memory where the > cache appears to not be set to write-back. Attempting this is not > guaranteed to work. I haven't looked into this fully to see if this > is correct, but from the panic I was seeing this appears to be the > case. > > I have been talking to Jeff Roberson on panic 1. As I'm nit sure if my > assessment of panic 2 is correct I haven't looked at how to fix it. [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: fubar.geek.nz] -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Cc: freebsd-arm@freebsd.org, Jordan Hubbard , Jeff Roberson X-BeenThere: freebsd-arm@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting FreeBSD to the StrongARM Processor List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Jul 2013 06:17:25 -0000 On 2013-07-01, at 12:27 PM, Andrew Turner wrote: > On Mon, 1 Jul 2013 01:33:59 -0700 > Oleksandr Tymoshenko wrote: > >> >> On 2013-07-01, at 1:14 AM, Jordan Hubbard >> wrote: >> >>> Well, I managed to build and install an RPI-B kernel on the PI >>> itself last night using gcc as the compiler, but it doesn't boot. >>> I get the dreaded "kernel boot args: (null)" and then a hang before >>> even getting into the device probes. >> >> It crashes due to INVARIANTS options in kernel config. I'm going to >> look into this problem some time next week unless someone beats me >> to it. Just disable them for now. > > There are two panics: > 1. In vm_map_zinit() the sx lock fails to initialise because it thinks > it is already initialised. This is because the bit to check this has > been set in uma_startup() by the line: > slab->us_flags = UMA_SLAB_BOOT; > This is only a problem with INVARIANTS because the location of > us_flags changes when it is enabled, and in this case the slab is > reused as the memory allocated without zeroing it out first. > 2. uma_dbg_alloc/uma_dbg_free use atomic operations on memory where the > cache appears to not be set to write-back. Attempting this is not > guaranteed to work. I haven't looked into this fully to see if this > is correct, but from the panic I was seeing this appears to be the > case. > > I have been talking to Jeff Roberson on panic 1. As I'm nit sure if my > assessment of panic 2 is correct I haven't looked at how to fix it. My analysis so far: busdma_bufalloc_create takes alloc/free functions as an arguments and sets it as an allocator for newly created uma zone. AFAIU uma zone uses this function to allocate slab structures as well was actual memory areas. The allocator function used used for "coherent" busdma bufalloc allocates non-cached (write-back) memory. So when debug code tries atomic access to uma_slab_t fields it generates exception. Using different allocators for service structures and work memory might be a solution but I do not know enough about VM internals to know if it's plausible solution.