From owner-freebsd-bugs@freebsd.org Sat Dec 15 13:10:51 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0BBCF130DFB0 for ; Sat, 15 Dec 2018 13:10:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 97E6B6F9DD for ; Sat, 15 Dec 2018 13:10:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 5351E130DFAF; Sat, 15 Dec 2018 13:10:50 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 30CAB130DFAD for ; Sat, 15 Dec 2018 13:10:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C29406F9D4 for ; Sat, 15 Dec 2018 13:10:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id E6D05D634 for ; Sat, 15 Dec 2018 13:10:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wBFDAmRV058163 for ; Sat, 15 Dec 2018 13:10:48 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wBFDAmOR058162 for bugs@FreeBSD.org; Sat, 15 Dec 2018 13:10:48 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 230722] [nvme][resume] Delay and possible deadlock after resume Date: Sat, 15 Dec 2018 13:10:49 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: shuriku@shurik.kiev.ua X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 15 Dec 2018 13:10:51 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230722 --- Comment #11 from Alexandr Krivulya --- With kernel patched from nvme-suspend branch I have a new messages in log: Dec 15 14:50:41 thinkpad kernel: pm_runtime_get_if_in_use not implemented -- see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: sched_setscheduler_nocheck not implemented= -- see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: register_oom_notifier not implemented -- s= ee your local kernel hacker Dec 15 14:50:41 thinkpad kernel: [drm] Initialized i915 1.6.0 20171222 for drmn0 on minor 0 Dec 15 14:50:41 thinkpad kernel: register_acpi_notifier not implemented -- = see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: async_schedule is dodgy -- see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: pm_runtime_set_autosuspend_delay not implemented -- see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: __pm_runtime_use_autosuspend not implement= ed -- see your local kernel hacker Dec 15 14:50:41 thinkpad kernel: async_synchronize_cookie not implemented -- see your local kernel hacker Also kernel panicked while suspending: Fatal trap 12: page fault while in kernel mode cpuid =3D 3; apic id =3D 06 fault virtual address =3D 0x4d8 fault code =3D supervisor write data, page not present instruction pointer =3D 0x20:0xffffffff807ca21d stack pointer =3D 0x28:0xfffffe00004857a0 frame pointer =3D 0x28:0xfffffe00004857c0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 13 (g_down) trap number =3D 12 panic: page fault cpuid =3D 3 time =3D 1544877759 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0000485= 450 vpanic() at vpanic+0x1b4/frame 0xfffffe00004854b0 panic() at panic+0x43/frame 0xfffffe0000485510 trap_fatal() at trap_fatal+0x369/frame 0xfffffe0000485560 trap_pfault() at trap_pfault+0x49/frame 0xfffffe00004855c0 trap() at trap+0x29f/frame 0xfffffe00004856d0 calltrap() at calltrap+0x8/frame 0xfffffe00004856d0 --- trap 0xc, rip =3D 0xffffffff807ca21d, rsp =3D 0xfffffe00004857a0, rbp = =3D 0xfffffe00004857c0 --- nvme_qpair_submit_request() at nvme_qpair_submit_request+0x2d/frame 0xfffffe00004857c0 nvme_ctrlr_submit_io_request() at nvme_ctrlr_submit_io_request+0x2f/frame 0xfffffe00004857e0 nvme_ns_cmd_deallocate() at nvme_ns_cmd_deallocate+0x84/frame 0xfffffe0000485820 nvme_ns_bio_process() at nvme_ns_bio_process+0x257/frame 0xfffffe00004858a0 nvd_strategy() at nvd_strategy+0x4d/frame 0xfffffe00004858d0 g_disk_start() at g_disk_start+0x360/frame 0xfffffe0000485920 g_io_schedule_down() at g_io_schedule_down+0x1a1/frame 0xfffffe0000485960 g_down_procbody() at g_down_procbody+0x6d/frame 0xfffffe0000485970 fork_exit() at fork_exit+0x83/frame 0xfffffe00004859b0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00004859b0 --- trap 0, rip =3D 0, rsp =3D 0, rbp =3D 0 --- KDB: enter: panic --=20 You are receiving this mail because: You are the assignee for the bug.=