Re: unkillable firefox

2016-12-28 Thread Steve Kargl
On Thu, Dec 29, 2016 at 01:59:12AM +0200, Konstantin Belousov wrote:
> On Wed, Dec 28, 2016 at 03:24:39PM -0800, Steve Kargl wrote:
> > Patch results in a panic when I start X server.
> > 
> 
> You do not have INVARIANTS in the kernel config ?
> 

Correct.

> Below is my guess about the issue in the patch.  Hopefully it fixes
> your panic and still cure the bug I see in your previous report.

It fixes both the panic and appears to fix firefox.  At least,
I can't get firefox to get into a wedged state.  Now, I need
to go find out why I have kern.ipc.shm_use_phys set to 1 (likely,
a remnant from isome ancient app installed from the /usr/ports).  

Thanks for the quick response.

-- 
Steve
20161221 https://www.youtube.com/watch?v=IbCHE-hONow
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: unkillable firefox

2016-12-28 Thread Konstantin Belousov
On Wed, Dec 28, 2016 at 03:24:39PM -0800, Steve Kargl wrote:
> Patch results in a panic when I start X server.
> 
> Fatal trap 12: page fault while in kernel mode
> cpuid = 7; apic id = 17
> fault virtual address   = 0x30
> fault code  = supervisor read data, page not present
> instruction pointer = 0x20:0x807d3999
> stack pointer   = 0x0:0xfe0238c22720
> frame pointer   = 0x0:0xfe0238c22750
> code segment= base 0x0, limit 0xf, type 0x1b
> = DPL 0, pres 1, long 1, def32 0, gran 1
> processor eflags= interrupt enabled, resume, IOPL = 0
> current process = 790 (fvwm)
> trap number = 12
> panic: page fault
> cpuid = 7
> KDB: stack backtrace:
> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0238c223b0
> vpanic() at vpanic+0x186/frame 0xfe0238c22430
> panic() at panic+0x43/frame 0xfe0238c22490
> trap_fatal() at trap_fatal+0x322/frame 0xfe0238c224e0
> trap_pfault() at trap_pfault+0x1bc/frame 0xfe0238c22540
> trap() at trap+0x253/frame 0xfe0238c22650
> calltrap() at calltrap+0x8/frame 0xfe0238c22650
> --- trap 0xc, rip = 0x807d3999, rsp = 0xfe0238c22720, rbp = 
> 0xfe0238c22750 ---
> vm_fault_populate_cleanup() at vm_fault_populate_cleanup+0x39/frame 
> 0xfe0238c22750
> vm_fault_hold() at vm_fault_hold+0x1a65/frame 0xfe0238c22880
> vm_fault() at vm_fault+0x78/frame 0xfe0238c228c0
> trap_pfault() at trap_pfault+0xf6/frame 0xfe0238c22920
> trap() at trap+0x2ed/frame 0xfe0238c22a30
> calltrap() at calltrap+0x8/frame 0xfe0238c22a30
> 
> (kgdb) bt
> #0  doadump (textdump=1) at pcpu.h:222
> #1  0x80590002 in kern_reboot (howto=)
> at /usr/src/sys/kern/kern_shutdown.c:386
> #2  0x805904c0 in vpanic (fmt=, 
> ap=) at /usr/src/sys/kern/kern_shutdown.c:779
> #3  0x805902f3 in panic (fmt=)
> at /usr/src/sys/kern/kern_shutdown.c:710
> #4  0x808151d2 in trap_fatal (frame=0xfe0238c22660, eva=48)
> at /usr/src/sys/amd64/amd64/trap.c:801
> #5  0x8081539c in trap_pfault (frame=0xfe0238c22660, usermode=0)
> at /usr/src/sys/amd64/amd64/trap.c:658
> #6  0x80814ab3 in trap (frame=0xfe0238c22660)
> at /usr/src/sys/amd64/amd64/trap.c:421
> #7  0x807fb023 in calltrap ()
> at /usr/src/sys/amd64/amd64/exception.S:236
> #8  0x807d3999 in vm_fault_populate_cleanup (
> object=, first=, 
> last=) at pcpu.h:222
> #9  0x807d2105 in vm_fault_hold (map=0xf8000999f000, 
> vaddr=8597401600, fault_type=, fault_flags=0, 
> m_hold=0x0) at /usr/src/sys/vm/vm_fault.c:402
> #10 0x807d0658 in vm_fault (map=0xf8000999f000, 
> vaddr=, fault_type=1 '\001', 
> fault_flags=) at /usr/src/sys/vm/vm_fault.c:464
> #11 0x808152d6 in trap_pfault (frame=0xfe0238c22a40, usermode=1)
> at /usr/src/sys/amd64/amd64/trap.c:708
> #12 0x80814b4d in trap (frame=0xfe0238c22a40)
> at /usr/src/sys/amd64/amd64/trap.c:326
> #13 0x807fb023 in calltrap ()
> at /usr/src/sys/amd64/amd64/exception.S:236
> #14 0x000200b25c33 in ?? ()
> 

You do not have INVARIANTS in the kernel config ?

Below is my guess about the issue in the patch.  Hopefully it fixes
your panic and still cure the bug I see in your previous report.

diff --git a/sys/vm/vm_fault.c b/sys/vm/vm_fault.c
index e8fb5d00408..4d25e127e8d 100644
--- a/sys/vm/vm_fault.c
+++ b/sys/vm/vm_fault.c
@@ -304,13 +304,48 @@ vm_fault_restore_map_lock(struct faultstate *fs)
fs->lookup_still_valid = true;
 }
 
+static void
+vm_fault_populate_check_page(vm_page_t m, vm_object_t object, vm_pindex_t pidx)
+{
+
+   /*
+* Check each page to ensure that the driver is
+* obeying the interface: the page must be installed
+* in the object, fully valid, and exclusively busied.
+*/
+   MPASS(m != NULL);
+   MPASS(vm_page_xbusied(m));
+   MPASS(m->valid == VM_PAGE_BITS_ALL);
+   MPASS(m->object == object);
+   MPASS(m->pindex == pidx);
+}
+
+static void
+vm_fault_populate_cleanup(vm_object_t object, vm_pindex_t first,
+vm_pindex_t last)
+{
+   vm_page_t m;
+   vm_pindex_t pidx;
+
+   VM_OBJECT_ASSERT_WLOCKED(object);
+   if (first > last) /* micro-op: avoid page lookup */
+   return;
+   for (pidx = first, m = vm_page_lookup(object, pidx);
+   pidx <= last; pidx++, m = vm_page_next(m)) {
+   vm_fault_populate_check_page(m, object, pidx);
+   vm_page_lock(m);
+   vm_page_activate(m);
+   vm_page_unlock(m);
+   vm_page_xunbusy(m);
+   }
+}
 
 static int
 vm_fault_populate(struct faultstate *fs, vm_offset_t vaddr, vm_prot_t prot,
 int fault_type, int fault_flags, boolean_t wired, vm_page_t *m_hold)
 {
vm_page_t m;
-   vm_pindex_t f_first, f_last, pidx;
+   vm_pindex_t 

Re: unkillable firefox

2016-12-28 Thread Steve Kargl
On Thu, Dec 29, 2016 at 12:28:36AM +0200, Konstantin Belousov wrote:
> On Wed, Dec 28, 2016 at 12:54:53PM -0800, Steve Kargl wrote:
> > 
> > Firefox is still fubar on freebsd-current.  Following kib's
> > instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD
> > current" thread, here's the requested kernel info
> >   PID USERNAMETHR PRI NICE   SIZERES STATE   C   TIMEWCPU 
> > COMMAND
> > 96285 kargl64  400  1008M   678M select  0   2:01  18.10% 
> > firefox
> > 96256 kargl 2  470   834M   304M STOP0   0:04   0.00% 
> > firefox
> 
> Do you have kern.ipc.shm_use_phys set to 1 ?

Yes, I do have this sysctl set to 1.

> Try the following patch, please.
> 

Patch results in a panic when I start X server.

Fatal trap 12: page fault while in kernel mode
cpuid = 7; apic id = 17
fault virtual address   = 0x30
fault code  = supervisor read data, page not present
instruction pointer = 0x20:0x807d3999
stack pointer   = 0x0:0xfe0238c22720
frame pointer   = 0x0:0xfe0238c22750
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 790 (fvwm)
trap number = 12
panic: page fault
cpuid = 7
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0238c223b0
vpanic() at vpanic+0x186/frame 0xfe0238c22430
panic() at panic+0x43/frame 0xfe0238c22490
trap_fatal() at trap_fatal+0x322/frame 0xfe0238c224e0
trap_pfault() at trap_pfault+0x1bc/frame 0xfe0238c22540
trap() at trap+0x253/frame 0xfe0238c22650
calltrap() at calltrap+0x8/frame 0xfe0238c22650
--- trap 0xc, rip = 0x807d3999, rsp = 0xfe0238c22720, rbp = 
0xfe0238c22750 ---
vm_fault_populate_cleanup() at vm_fault_populate_cleanup+0x39/frame 
0xfe0238c22750
vm_fault_hold() at vm_fault_hold+0x1a65/frame 0xfe0238c22880
vm_fault() at vm_fault+0x78/frame 0xfe0238c228c0
trap_pfault() at trap_pfault+0xf6/frame 0xfe0238c22920
trap() at trap+0x2ed/frame 0xfe0238c22a30
calltrap() at calltrap+0x8/frame 0xfe0238c22a30

(kgdb) bt
#0  doadump (textdump=1) at pcpu.h:222
#1  0x80590002 in kern_reboot (howto=)
at /usr/src/sys/kern/kern_shutdown.c:386
#2  0x805904c0 in vpanic (fmt=, 
ap=) at /usr/src/sys/kern/kern_shutdown.c:779
#3  0x805902f3 in panic (fmt=)
at /usr/src/sys/kern/kern_shutdown.c:710
#4  0x808151d2 in trap_fatal (frame=0xfe0238c22660, eva=48)
at /usr/src/sys/amd64/amd64/trap.c:801
#5  0x8081539c in trap_pfault (frame=0xfe0238c22660, usermode=0)
at /usr/src/sys/amd64/amd64/trap.c:658
#6  0x80814ab3 in trap (frame=0xfe0238c22660)
at /usr/src/sys/amd64/amd64/trap.c:421
#7  0x807fb023 in calltrap ()
at /usr/src/sys/amd64/amd64/exception.S:236
#8  0x807d3999 in vm_fault_populate_cleanup (
object=, first=, 
last=) at pcpu.h:222
#9  0x807d2105 in vm_fault_hold (map=0xf8000999f000, 
vaddr=8597401600, fault_type=, fault_flags=0, 
m_hold=0x0) at /usr/src/sys/vm/vm_fault.c:402
#10 0x807d0658 in vm_fault (map=0xf8000999f000, 
vaddr=, fault_type=1 '\001', 
fault_flags=) at /usr/src/sys/vm/vm_fault.c:464
#11 0x808152d6 in trap_pfault (frame=0xfe0238c22a40, usermode=1)
at /usr/src/sys/amd64/amd64/trap.c:708
#12 0x80814b4d in trap (frame=0xfe0238c22a40)
at /usr/src/sys/amd64/amd64/trap.c:326
#13 0x807fb023 in calltrap ()
at /usr/src/sys/amd64/amd64/exception.S:236
#14 0x000200b25c33 in ?? ()




-- 
Steve
20161221 https://www.youtube.com/watch?v=IbCHE-hONow
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: unkillable firefox

2016-12-28 Thread Konstantin Belousov
On Wed, Dec 28, 2016 at 12:54:53PM -0800, Steve Kargl wrote:
> On Tue, Dec 20, 2016 at 01:29:20PM -0800, Steve Kargl wrote:
> > Anyone know how to kill firefox?
> > 
> > last pid: 69652;  load averages:  0.49,  0.27,  0.24  up 1+02:40:06  
> > 13:16:02
> > 126 processes: 1 running, 121 sleeping, 4 stopped
> > CPU:  0.8% user,  0.0% nice,  0.0% system,  0.0% interrupt,  100% idle
> > Mem: 2049M Active, 3739M Inact, 496M Laundry, 1365M Wired, 783M Buf, 239M 
> > Free
> > Swap: 16G Total, 1772K Used, 16G Free
> > 
> >   PID USERNAME   PRI NICE SIZERES STATE   C   TIMEWCPU COMMAND
> > 63902 kargl  40   0  3157M  2302M STOP1  10:50   0.00% 
> > firefox{firefox}
> > 63902 kargl -16   0  3157M  2302M STOP2   5:46   0.00% 
> > firefox{Composit
> > 16874 kargl  40   0   740M   330M STOP1   0:07   0.00% 
> > firefox{firefox}
> > 16874 kargl -16   0   740M   330M STOP1   0:00   0.00% 
> > firefox{Composit
> > 
> > It seems that firefox is wedged in the thread firefox{Compositor},
> > and slowly eating up memory.  This is on an amd64 system at
> > r310125 and latest firefox from ports.  procstat suggests that its
> > stuck in a vm sleep queue.
> > 
> > % procstat -k 63902
> >   PIDTID COMM   TDNAME   KSTACK   
> > 63902 100504 firefox-mi_switch thread_suspend_switch
> >  thread_single exit1 sigexit postsig ast
> >  Xfast_syscall 
> > 63902 101494 firefoxCompositor   mi_switch sleepq_wait _sleep 
> >  vm_page_busy_sleep 
> > vm_page_sleep_if_busy
> >  vm_fault_hold vm_fault trap_pfault trap
> >  calltrap 
> > 
> 
> Firefox is still fubar on freebsd-current.  Following kib's
> instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD
> current" thread, here's the requested kernel info
>   PID USERNAMETHR PRI NICE   SIZERES STATE   C   TIMEWCPU COMMAND
> 96285 kargl64  400  1008M   678M select  0   2:01  18.10% firefox
> 96256 kargl 2  470   834M   304M STOP0   0:04   0.00% firefox
> 96276 kargl 2  400   593M   307M STOP1   0:03   0.00% firefox
> 96265 kargl 2  400   592M   307M STOP1   0:03   0.00% firefox
> 
> % ps -H -o pid,lwp,mwchan,nwchan 96265
>   PIDLWP MWCHAN NWCHAN
> 96265 100137 -  -
> 96265 100737 vmpfw  f80232a1a980
> 
> % kgdb /usr/obj/usr/src/sys/SPEW/kernel.full /dev/mem
> (kgdb) p/x *(struct vm_page *)0xf80232a1a980
> $1 = {plinks = {q = {tqe_next = 0xf8023467d980, 
>   tqe_prev = 0x80d9e1b8}, s = {ss = {
> sle_next = 0xf8023467d980}, pv = 0x80d9e1b8}, memguard = {
>   p = 0xf8023467d980, v = 0x80d9e1b8}}, listq = {
> tqe_next = 0xf80232a1a9e8, tqe_prev = 0xf8010c0614f8}, 
>   object = 0xf8010c0614b0, pindex = 0x0, phys_addr = 0x5960, md = {
> pv_list = {tqh_first = 0x0, tqh_last = 0xf80232a1a9b8}, 
> pv_gen = 0x31c, pat_mode = 0x6}, wire_count = 0x0, busy_lock = 0x6, 
>   hold_count = 0x0, flags = 0x0, aflags = 0x2, oflags = 0x4, queue = 0xff, 
>   psind = 0x1, segind = 0x3, order = 0xd, pool = 0x0, act_count = 0x0, 
>   valid = 0xff, dirty = 0x0}
> (kgdb) p/x *(struct vm_object *)0xf8010c0614b0
> $2 = {lock = {lock_object = {lo_name = 0x80937e16, 
>   lo_flags = 0x2563, lo_data = 0x0, lo_witness = 0x0}, rw_lock = 
> 0x1}, 
>   object_list = {tqe_next = 0xf8010c0615a0, 
> tqe_prev = 0xf8010c0613e0}, shadow_head = {lh_first = 0x0}, 
>   shadow_list = {le_next = 0x0, le_prev = 0x0}, memq = {
> tqh_first = 0xf80232a1a980, tqh_last = 0xf80234685e00}, rtree = {
> rt_root = 0xf80138b253f0}, size = 0x347, generation = 0x1, 
>   ref_count = 0x3, shadow_count = 0x0, memattr = 0x6, type = 0x4, 
>   flags = 0x1016, pg_color = 0x0, paging_in_progress = 0x1, 
>   resident_page_count = 0x347, backing_object = 0x0, 
>   backing_object_offset = 0x0, pager_object_list = {
> tqe_next = 0xf801d68e93c0, tqe_prev = 0xf801058c8cc8}, rvq = {
> lh_first = 0xf80230563d00}, handle = 0x0, un_pager = {vnp = {
>   vnp_size = 0x0, writemappings = 0xf8010c061568}, devp = {
>   devp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}, 
>   ops = 0x81367fa0, dev = 0xf80153397048}, sgp = {
>   sgp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}}, swp = {
>   swp_tmpfs = 0x0, swp_bcount = 0xc061568}}, cred = 0x0, charge = 0x0, 
>   umtx_data = 0x0}

Do you have kern.ipc.shm_use_phys set to 1 ?

Try the following patch, please.

diff --git a/sys/vm/vm_fault.c b/sys/vm/vm_fault.c
index e8fb5d00408..98bd7bae3db 100644
--- a/sys/vm/vm_fault.c
+++ b/sys/vm/vm_fault.c
@@ -304,13 +304,48 @@ vm_fault_restore_map_lock(struct faultstate *fs)
fs->lookup_still_valid = 

Re: unkillable firefox

2016-12-28 Thread Steve Kargl
On Tue, Dec 20, 2016 at 01:29:20PM -0800, Steve Kargl wrote:
> Anyone know how to kill firefox?
> 
> last pid: 69652;  load averages:  0.49,  0.27,  0.24  up 1+02:40:06  
> 13:16:02
> 126 processes: 1 running, 121 sleeping, 4 stopped
> CPU:  0.8% user,  0.0% nice,  0.0% system,  0.0% interrupt,  100% idle
> Mem: 2049M Active, 3739M Inact, 496M Laundry, 1365M Wired, 783M Buf, 239M Free
> Swap: 16G Total, 1772K Used, 16G Free
> 
>   PID USERNAME   PRI NICE SIZERES STATE   C   TIMEWCPU COMMAND
> 63902 kargl  40   0  3157M  2302M STOP1  10:50   0.00% 
> firefox{firefox}
> 63902 kargl -16   0  3157M  2302M STOP2   5:46   0.00% 
> firefox{Composit
> 16874 kargl  40   0   740M   330M STOP1   0:07   0.00% 
> firefox{firefox}
> 16874 kargl -16   0   740M   330M STOP1   0:00   0.00% 
> firefox{Composit
> 
> It seems that firefox is wedged in the thread firefox{Compositor},
> and slowly eating up memory.  This is on an amd64 system at
> r310125 and latest firefox from ports.  procstat suggests that its
> stuck in a vm sleep queue.
> 
> % procstat -k 63902
>   PIDTID COMM   TDNAME   KSTACK   
> 63902 100504 firefox-mi_switch thread_suspend_switch
>  thread_single exit1 sigexit postsig ast
>  Xfast_syscall 
> 63902 101494 firefoxCompositor   mi_switch sleepq_wait _sleep 
>  vm_page_busy_sleep vm_page_sleep_if_busy
>  vm_fault_hold vm_fault trap_pfault trap
>  calltrap 
> 

Firefox is still fubar on freebsd-current.  Following kib's
instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD
current" thread, here's the requested kernel info
  PID USERNAMETHR PRI NICE   SIZERES STATE   C   TIMEWCPU COMMAND
96285 kargl64  400  1008M   678M select  0   2:01  18.10% firefox
96256 kargl 2  470   834M   304M STOP0   0:04   0.00% firefox
96276 kargl 2  400   593M   307M STOP1   0:03   0.00% firefox
96265 kargl 2  400   592M   307M STOP1   0:03   0.00% firefox

% ps -H -o pid,lwp,mwchan,nwchan 96265
  PIDLWP MWCHAN NWCHAN
96265 100137 -  -
96265 100737 vmpfw  f80232a1a980

% kgdb /usr/obj/usr/src/sys/SPEW/kernel.full /dev/mem
(kgdb) p/x *(struct vm_page *)0xf80232a1a980
$1 = {plinks = {q = {tqe_next = 0xf8023467d980, 
  tqe_prev = 0x80d9e1b8}, s = {ss = {
sle_next = 0xf8023467d980}, pv = 0x80d9e1b8}, memguard = {
  p = 0xf8023467d980, v = 0x80d9e1b8}}, listq = {
tqe_next = 0xf80232a1a9e8, tqe_prev = 0xf8010c0614f8}, 
  object = 0xf8010c0614b0, pindex = 0x0, phys_addr = 0x5960, md = {
pv_list = {tqh_first = 0x0, tqh_last = 0xf80232a1a9b8}, 
pv_gen = 0x31c, pat_mode = 0x6}, wire_count = 0x0, busy_lock = 0x6, 
  hold_count = 0x0, flags = 0x0, aflags = 0x2, oflags = 0x4, queue = 0xff, 
  psind = 0x1, segind = 0x3, order = 0xd, pool = 0x0, act_count = 0x0, 
  valid = 0xff, dirty = 0x0}
(kgdb) p/x *(struct vm_object *)0xf8010c0614b0
$2 = {lock = {lock_object = {lo_name = 0x80937e16, 
  lo_flags = 0x2563, lo_data = 0x0, lo_witness = 0x0}, rw_lock = 0x1}, 
  object_list = {tqe_next = 0xf8010c0615a0, 
tqe_prev = 0xf8010c0613e0}, shadow_head = {lh_first = 0x0}, 
  shadow_list = {le_next = 0x0, le_prev = 0x0}, memq = {
tqh_first = 0xf80232a1a980, tqh_last = 0xf80234685e00}, rtree = {
rt_root = 0xf80138b253f0}, size = 0x347, generation = 0x1, 
  ref_count = 0x3, shadow_count = 0x0, memattr = 0x6, type = 0x4, 
  flags = 0x1016, pg_color = 0x0, paging_in_progress = 0x1, 
  resident_page_count = 0x347, backing_object = 0x0, 
  backing_object_offset = 0x0, pager_object_list = {
tqe_next = 0xf801d68e93c0, tqe_prev = 0xf801058c8cc8}, rvq = {
lh_first = 0xf80230563d00}, handle = 0x0, un_pager = {vnp = {
  vnp_size = 0x0, writemappings = 0xf8010c061568}, devp = {
  devp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}, 
  ops = 0x81367fa0, dev = 0xf80153397048}, sgp = {
  sgp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}}, swp = {
  swp_tmpfs = 0x0, swp_bcount = 0xc061568}}, cred = 0x0, charge = 0x0, 
  umtx_data = 0x0}

-- 
Steve
20161221 https://www.youtube.com/watch?v=IbCHE-hONow
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


FreeBSD_HEAD_i386 - Build #4499 - Fixed

2016-12-28 Thread jenkins-admin
FreeBSD_HEAD_i386 - Build #4499 - Fixed:

Build information: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/
Full change log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/changes
Full build log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/console

Change summaries:

310675 by ngie:
Fix the build by moving the initializers for len/nswapdev down below the
declarations

MFC after:  3 days
Pointyhat to:   ngie

310674 by mmel:
Limit number of stripes supported by HDA codec to maximum number
announced by HDA controller.
Incorrectly implermented HDA codec may report support for more stripes
that HDA controller already have. Due to this, always limit number of
enabled stripes by global controller maximum.

Reviewed by:mav
MFC after:  1 month
Differential Revision: https://reviews.freebsd.org/D8922

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


FreeBSD_HEAD_i386 - Build #4498 - Failure

2016-12-28 Thread jenkins-admin
FreeBSD_HEAD_i386 - Build #4498 - Failure:

Build information: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/
Full change log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/changes
Full build log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/console

Change summaries:

310669 by ngie:
style(9): clean up whitespace

MFC after:  3 days

310668 by ngie:
style(9) fixes: clean up leading whitespace

MFC after:  3 days

310667 by ngie:
style(9) fixes: clean up leading whitespace

MFC after:  3 days

310666 by ngie:
style(9) fixes

- Clean up trailing whitespace
- Fix variable type alignment in storage_OS_get_swap(..)

MFC after:  3 days

310665 by ngie:
Only build/install usr.sbin/bsnmpd/modules/snmp_hast if MK_HAST != no

MFC after:  1 week

310664 by ngie:
Only build/install usr.sbin/bsnmpd/modules/snmp_wlan if MK_WIRELESS != no

MFC after:  1 week



The end of the build log:

[...truncated 131742 lines...]
--- all_subdir_usr.sbin ---
--- all_subdir_usr.sbin/bsdconfig/networking ---
===> usr.sbin/bsdconfig/networking (all)
--- all_subdir_usr.sbin/bsdconfig/networking/include ---
===> usr.sbin/bsdconfig/networking/include (all)
--- all_subdir_usr.sbin/bsdconfig/networking/share ---
===> usr.sbin/bsdconfig/networking/share (all)
--- all_subdir_usr.sbin/bsdconfig/packages ---
===> usr.sbin/bsdconfig/packages (all)
--- all_subdir_usr.sbin/bsdconfig/packages/include ---
===> usr.sbin/bsdconfig/packages/include (all)
--- all_subdir_usr.sbin/bsdconfig/password ---
===> usr.sbin/bsdconfig/password (all)
--- all_subdir_usr.sbin/bsdconfig/password/include ---
===> usr.sbin/bsdconfig/password/include (all)
--- all_subdir_usr.sbin/bsdconfig/password/share ---
===> usr.sbin/bsdconfig/password/share (all)
--- all_subdir_usr.sbin/bsdconfig/security ---
===> usr.sbin/bsdconfig/security (all)
--- all_subdir_usr.sbin/bsnmpd ---
--- snmp_bridge.so.6.full ---
building shared library snmp_bridge.so.6
cc -target i386-unknown-freebsd12.0 --sysroot=/usr/obj/usr/src/tmp 
-B/usr/obj/usr/src/tmp/usr/bin  -fstack-protector-strong -shared -Wl,-x 
-Wl,--fatal-warnings -Wl,--warn-shared-textrel  -o snmp_bridge.so.6.full 
-Wl,-soname,snmp_bridge.so.6  `NM='nm' NMFLAGS='' lorder bridge_snmp.pico 
bridge_if.pico bridge_port.pico bridge_addrs.pico bridge_pf.pico 
bridge_sys.pico bridge_tree.pico |  tsort -q` 
--- all_subdir_usr.sbin/bsdconfig ---
--- all_subdir_usr.sbin/bsdconfig/security/include ---
===> usr.sbin/bsdconfig/security/include (all)
--- all_subdir_usr.sbin/bsdconfig/share ---
===> usr.sbin/bsdconfig/share (all)
--- all_subdir_usr.sbin/bsdconfig/share/media ---
===> usr.sbin/bsdconfig/share/media (all)
--- all_subdir_usr.sbin/bsnmpd ---
--- snmp_bridge.3.gz ---
sed -e 's%@MODPATH@%/usr/lib/%g' -e 
's%@DEFPATH@%/usr/share/snmp/defs/%g'-e 
's%@MIBSPATH@%/usr/share/snmp/mibs/%g' < 
/usr/src/usr.sbin/bsnmpd/modules/snmp_bridge/snmp_bridge.3 | gzip -cn > 
snmp_bridge.3.gz
--- snmp_bridge.so.6.debug ---
objcopy --only-keep-debug snmp_bridge.so.6.full snmp_bridge.so.6.debug
--- snmp_bridge.so.6 ---
objcopy --strip-debug --add-gnu-debuglink=snmp_bridge.so.6.debug  
snmp_bridge.so.6.full snmp_bridge.so.6
--- all_subdir_usr.sbin/bsnmpd/modules/snmp_hostres ---
===> usr.sbin/bsnmpd/modules/snmp_hostres (all)
--- all_subdir_usr.sbin/bsdconfig ---
--- all_subdir_usr.sbin/bsdconfig/share/packages ---
===> usr.sbin/bsdconfig/share/packages (all)
--- all_subdir_usr.sbin/bsdconfig/startup ---
===> usr.sbin/bsdconfig/startup (all)
--- all_subdir_usr.sbin/bsnmpd ---
--- hostres_tree.c ---
cat /usr/src/usr.sbin/bsnmpd/modules/snmp_hostres/hostres_tree.def | 
gensnmptree -p hostres_
--- hostres_oid.h ---
cat /usr/src/usr.sbin/bsnmpd/modules/snmp_hostres/hostres_tree.def | 
gensnmptree -e host hrStorageOther hrStorageRam hrStorageVirtualMemory  
hrStorageFixedDisk hrStorageRemovableDisk hrStorageFloppyDisk  
hrStorageCompactDisc hrStorageRamDisk hrStorageFlashMemory  
hrStorageNetworkDisk hrDeviceOther hrDeviceUnknown  hrDeviceProcessor 
hrDeviceNetwork hrDevicePrinter  hrDeviceDiskStorage hrDeviceVideo 
hrDeviceAudio  hrDeviceCoprocessor hrDeviceKeyboard hrDeviceModem  
hrDeviceParallelPort hrDevicePointing  hrDeviceSerialPort hrDeviceTape 
hrDeviceClock  hrDeviceVolatileMemory hrDeviceNonVolatileMemory  hrFSOther 
hrFSUnknown hrFSBerkeleyFFS hrFSSys5FS hrFSFat hrFSHPFS hrFSHFS hrFSMFS 
hrFSNTFS hrFSVNode hrFSJournaled  hrFSiso9660 hrFSRockRidge hrFSNFS hrFSNetware 
hrFSAFS hrFSDFS  hrFSAppleshare hrFSRFS hrFSDGCFS hrFSBFS hrFSFAT32 
hrFSLinuxExt2 > hostres_oid.h
--- .depend ---
echo snmp_hostres.so.6.full: /usr/obj/usr/src/tmp/usr/lib/libkvm.a 
/usr/obj/usr/src/tmp/usr/lib/libdevinfo.a /usr/obj/usr/src/tmp/usr/lib/libm.a 
/usr/obj/usr/src/tmp/usr/lib/libgeom.a 
/usr/obj/usr/src/tmp/usr/lib/libmemstat.a >> .depend
--- hostres_begemot.pico ---
cc -target i386-unknown-freebsd12.0 --sysroot=/usr/obj/usr/src/tmp 
-B/usr/obj/usr/src/tmp/usr/bin -fpic -DPIC -g -O2 -pipe