On Wed, May 26, 2021 at 02:51:53AM +0200, Peter N. M. Hansteen wrote: > Somewhat encouraged by the last few weeks' adventure with ASUS > laptops (thanks, kettenis@!) I decided to try out an incrementally > higher range model, the Zenbook S. > > The latest amd64 snapshot installer seemed to work fine until > it encountered the main storage in the unit, which the firmware > sees as > > PCIE bus:0 Dev:E Func:0 > Device type: NVMe SSD (953.8GB) > Model name: INTEL SSDOEKNV 010T8 > > But shows up in the installer kernel dmesg as only > > sd0 at scsibus0 targ 1 lun 0: (Generic, STORAGE DEVICE, 0233), removable.
that appears to be something else on usb? 'scsibus0 at umass0: 2 targets, initiator 0' from https://www.bsdly.net/~peter/20210525_233623.jpg can you provide a dmesg and pcidump -v output? I didn't see an image that made it clear which cpu / inteldrm device this has. > > Installing to a removable USB device was a bit hit and miss, after a > bit of fiddling with boot -c and disable acpicpu* and disable iwx* in > response to the errors I got I did manage to get it to display its > full 3300x2200 in X, but the file system layout on the 16GB device I > used initially did not have space in /home to store the the entire > output of sendbug -P from the device. > > The following shows the various panics and traces as best I could > capture them: > > https://www.bsdly.net/~peter/20210525_223507.jpg > https://www.bsdly.net/~peter/20210525_223511.jpg > https://www.bsdly.net/~peter/20210525_233623.jpg > https://www.bsdly.net/~peter/20210525_235112.jpg kernel: protection fault trap, code=0 Stopped at pool_do_put+0xc9: movq 0x8(%rcx),%rcx > https://www.bsdly.net/~peter/20210525_235137.jpg kernel: protection fault trap, code=0 pool_do_put()+0xc9 movq 0x8(%rcx),%rcx pool_put()+0x71 process_zap()+0x14f dowait4() sys_wait4() syscall() > https://www.bsdly.net/~peter/20210525_235449.jpg panic: pool_do_get: procpl free list modified: ... db_enter()+0x10 popq %rbp panic()+0x12a pool_do_get()+0x321 pool_get()+0x93 fork1()+0x1b6 syscall()+0x3b9 > https://www.bsdly.net/~peter/20210525_235502.jpg as above with ps showing *init > https://www.bsdly.net/~peter/20210525_235717.jpg panic: pool_do_get: drmobj free list modified: ... panic: kernel diagnostic assertion "!_kernel_lock_held()" failed: file "/usr/src/sys/uvm/uvm_map.c", line 2707 db_enter()+0x10 popq %rbp panic()+0x12a __assert()+0x2b uvm_map_teardown()+0x23e uvmspace_free()+0x5a reaper()+0x14c > https://www.bsdly.net/~peter/20210525_235739.jpg as above with some ps output > https://www.bsdly.net/~peter/20210525_235747.jpg ps output > https://www.bsdly.net/~peter/20210525_235753.jpg ps output > https://www.bsdly.net/~peter/20210525_235903.jpg kernel: protection fault trap, code=0 pool_do_put()+0xc9 movq 0x8(%rcx),%rcx pool_put()+0x71 process_zap()+0x14f dowait4()+0x303 sys_wait4()+0x5a syscall()+0x3b9 > https://www.bsdly.net/~peter/20210525_235914.jpg above with ps output > https://www.bsdly.net/~peter/20210526_015841.jpg uvm_fault() kernel: page fault trap, code=0 Stopped at i915_gem_object_pin_map+0x2a: testb $0x3,0(%rax) > https://www.bsdly.net/~peter/20210526_015851.jpg uvm_fault() kernel: page fault trap, code=0 Stopped at i915_gem_object_pin_map+0x2a: testb $0x3,0(%rax) i915_gem_object_pin_map()+0x2a __execlists_context_alloc()+0x187 __intel_context_do_pin()+0x15a i915_gem_do_execbuffer() i915_gem_execbuffer2_ioctl()+0x1cb drm_do_ioctl()+0x28c > https://www.bsdly.net/~peter/20210526_015901.jpg ps output *Xorg > https://www.bsdly.net/~peter/20210526_015906.jpg ps output > https://www.bsdly.net/~peter/20210526_024111.jpg uvm_fault() kernel: page fault trap, code=0 Stopped at i915_gem_object_pin_map+0x2a: testb $0x3,0(%rax) i915_gem_object_pin_map()+0x2a __execlists_context_alloc()+0x187 __intel_context_do_pin()+0x15a i915_gem_do_execbuffer()+0x2820 i915_gem_execbuffer2_ioctl()+0x1cb drm_do_ioctl()+0x28c > https://www.bsdly.net/~peter/20210526_024123.jpg ps output *Xorg > https://www.bsdly.net/~peter/20210526_024128.jpg ps output > https://www.bsdly.net/~peter/20210526_024312.jpg panic: pool_do_get: procpl free list modified: ... db_enter()+0x10 popq %rbp panic()+0x12a pool_do_get()+0x321 pool_get()+0x93 fork1()+0x1b6 syscall()+0x3b9 > https://www.bsdly.net/~peter/20210526_024322.jpg panic: pool_do_get: procpl free list modified: ... db_enter()+0x10 popq %rbp panic()+0x12a pool_do_get()+0x321 pool_get()+0x93 fork1()+0x1b6 syscall()+0x3b9 > https://www.bsdly.net/~peter/20210526_024335.jpg as above with ps > > I will make some more attempts at catching real sendbug > output after I have caught a bit of sleep. > > All the best, > Peter > > -- > Peter N. M. Hansteen, member of the first RFC 1149 implementation team > http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/ > "Remember to set the evil bit on all malicious network traffic" > delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds. > >