Re: unkillable firefox
On Thu, Dec 29, 2016 at 01:59:12AM +0200, Konstantin Belousov wrote: > On Wed, Dec 28, 2016 at 03:24:39PM -0800, Steve Kargl wrote: > > Patch results in a panic when I start X server. > > > > You do not have INVARIANTS in the kernel config ? > Correct. > Below is my guess about the issue in the patch. Hopefully it fixes > your panic and still cure the bug I see in your previous report. It fixes both the panic and appears to fix firefox. At least, I can't get firefox to get into a wedged state. Now, I need to go find out why I have kern.ipc.shm_use_phys set to 1 (likely, a remnant from isome ancient app installed from the /usr/ports). Thanks for the quick response. -- Steve 20161221 https://www.youtube.com/watch?v=IbCHE-hONow ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: unkillable firefox
On Wed, Dec 28, 2016 at 03:24:39PM -0800, Steve Kargl wrote: > Patch results in a panic when I start X server. > > Fatal trap 12: page fault while in kernel mode > cpuid = 7; apic id = 17 > fault virtual address = 0x30 > fault code = supervisor read data, page not present > instruction pointer = 0x20:0x807d3999 > stack pointer = 0x0:0xfe0238c22720 > frame pointer = 0x0:0xfe0238c22750 > code segment= base 0x0, limit 0xf, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 > processor eflags= interrupt enabled, resume, IOPL = 0 > current process = 790 (fvwm) > trap number = 12 > panic: page fault > cpuid = 7 > KDB: stack backtrace: > db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0238c223b0 > vpanic() at vpanic+0x186/frame 0xfe0238c22430 > panic() at panic+0x43/frame 0xfe0238c22490 > trap_fatal() at trap_fatal+0x322/frame 0xfe0238c224e0 > trap_pfault() at trap_pfault+0x1bc/frame 0xfe0238c22540 > trap() at trap+0x253/frame 0xfe0238c22650 > calltrap() at calltrap+0x8/frame 0xfe0238c22650 > --- trap 0xc, rip = 0x807d3999, rsp = 0xfe0238c22720, rbp = > 0xfe0238c22750 --- > vm_fault_populate_cleanup() at vm_fault_populate_cleanup+0x39/frame > 0xfe0238c22750 > vm_fault_hold() at vm_fault_hold+0x1a65/frame 0xfe0238c22880 > vm_fault() at vm_fault+0x78/frame 0xfe0238c228c0 > trap_pfault() at trap_pfault+0xf6/frame 0xfe0238c22920 > trap() at trap+0x2ed/frame 0xfe0238c22a30 > calltrap() at calltrap+0x8/frame 0xfe0238c22a30 > > (kgdb) bt > #0 doadump (textdump=1) at pcpu.h:222 > #1 0x80590002 in kern_reboot (howto=) > at /usr/src/sys/kern/kern_shutdown.c:386 > #2 0x805904c0 in vpanic (fmt=, > ap=) at /usr/src/sys/kern/kern_shutdown.c:779 > #3 0x805902f3 in panic (fmt=) > at /usr/src/sys/kern/kern_shutdown.c:710 > #4 0x808151d2 in trap_fatal (frame=0xfe0238c22660, eva=48) > at /usr/src/sys/amd64/amd64/trap.c:801 > #5 0x8081539c in trap_pfault (frame=0xfe0238c22660, usermode=0) > at /usr/src/sys/amd64/amd64/trap.c:658 > #6 0x80814ab3 in trap (frame=0xfe0238c22660) > at /usr/src/sys/amd64/amd64/trap.c:421 > #7 0x807fb023 in calltrap () > at /usr/src/sys/amd64/amd64/exception.S:236 > #8 0x807d3999 in vm_fault_populate_cleanup ( > object=, first=, > last=) at pcpu.h:222 > #9 0x807d2105 in vm_fault_hold (map=0xf8000999f000, > vaddr=8597401600, fault_type=, fault_flags=0, > m_hold=0x0) at /usr/src/sys/vm/vm_fault.c:402 > #10 0x807d0658 in vm_fault (map=0xf8000999f000, > vaddr=, fault_type=1 '\001', > fault_flags=) at /usr/src/sys/vm/vm_fault.c:464 > #11 0x808152d6 in trap_pfault (frame=0xfe0238c22a40, usermode=1) > at /usr/src/sys/amd64/amd64/trap.c:708 > #12 0x80814b4d in trap (frame=0xfe0238c22a40) > at /usr/src/sys/amd64/amd64/trap.c:326 > #13 0x807fb023 in calltrap () > at /usr/src/sys/amd64/amd64/exception.S:236 > #14 0x000200b25c33 in ?? () > You do not have INVARIANTS in the kernel config ? Below is my guess about the issue in the patch. Hopefully it fixes your panic and still cure the bug I see in your previous report. diff --git a/sys/vm/vm_fault.c b/sys/vm/vm_fault.c index e8fb5d00408..4d25e127e8d 100644 --- a/sys/vm/vm_fault.c +++ b/sys/vm/vm_fault.c @@ -304,13 +304,48 @@ vm_fault_restore_map_lock(struct faultstate *fs) fs->lookup_still_valid = true; } +static void +vm_fault_populate_check_page(vm_page_t m, vm_object_t object, vm_pindex_t pidx) +{ + + /* +* Check each page to ensure that the driver is +* obeying the interface: the page must be installed +* in the object, fully valid, and exclusively busied. +*/ + MPASS(m != NULL); + MPASS(vm_page_xbusied(m)); + MPASS(m->valid == VM_PAGE_BITS_ALL); + MPASS(m->object == object); + MPASS(m->pindex == pidx); +} + +static void +vm_fault_populate_cleanup(vm_object_t object, vm_pindex_t first, +vm_pindex_t last) +{ + vm_page_t m; + vm_pindex_t pidx; + + VM_OBJECT_ASSERT_WLOCKED(object); + if (first > last) /* micro-op: avoid page lookup */ + return; + for (pidx = first, m = vm_page_lookup(object, pidx); + pidx <= last; pidx++, m = vm_page_next(m)) { + vm_fault_populate_check_page(m, object, pidx); + vm_page_lock(m); + vm_page_activate(m); + vm_page_unlock(m); + vm_page_xunbusy(m); + } +} static int vm_fault_populate(struct faultstate *fs, vm_offset_t vaddr, vm_prot_t prot, int fault_type, int fault_flags, boolean_t wired, vm_page_t *m_hold) { vm_page_t m; - vm_pindex_t f_first, f_last, pidx; + vm_pindex_t
Re: unkillable firefox
On Thu, Dec 29, 2016 at 12:28:36AM +0200, Konstantin Belousov wrote: > On Wed, Dec 28, 2016 at 12:54:53PM -0800, Steve Kargl wrote: > > > > Firefox is still fubar on freebsd-current. Following kib's > > instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD > > current" thread, here's the requested kernel info > > PID USERNAMETHR PRI NICE SIZERES STATE C TIMEWCPU > > COMMAND > > 96285 kargl64 400 1008M 678M select 0 2:01 18.10% > > firefox > > 96256 kargl 2 470 834M 304M STOP0 0:04 0.00% > > firefox > > Do you have kern.ipc.shm_use_phys set to 1 ? Yes, I do have this sysctl set to 1. > Try the following patch, please. > Patch results in a panic when I start X server. Fatal trap 12: page fault while in kernel mode cpuid = 7; apic id = 17 fault virtual address = 0x30 fault code = supervisor read data, page not present instruction pointer = 0x20:0x807d3999 stack pointer = 0x0:0xfe0238c22720 frame pointer = 0x0:0xfe0238c22750 code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 790 (fvwm) trap number = 12 panic: page fault cpuid = 7 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe0238c223b0 vpanic() at vpanic+0x186/frame 0xfe0238c22430 panic() at panic+0x43/frame 0xfe0238c22490 trap_fatal() at trap_fatal+0x322/frame 0xfe0238c224e0 trap_pfault() at trap_pfault+0x1bc/frame 0xfe0238c22540 trap() at trap+0x253/frame 0xfe0238c22650 calltrap() at calltrap+0x8/frame 0xfe0238c22650 --- trap 0xc, rip = 0x807d3999, rsp = 0xfe0238c22720, rbp = 0xfe0238c22750 --- vm_fault_populate_cleanup() at vm_fault_populate_cleanup+0x39/frame 0xfe0238c22750 vm_fault_hold() at vm_fault_hold+0x1a65/frame 0xfe0238c22880 vm_fault() at vm_fault+0x78/frame 0xfe0238c228c0 trap_pfault() at trap_pfault+0xf6/frame 0xfe0238c22920 trap() at trap+0x2ed/frame 0xfe0238c22a30 calltrap() at calltrap+0x8/frame 0xfe0238c22a30 (kgdb) bt #0 doadump (textdump=1) at pcpu.h:222 #1 0x80590002 in kern_reboot (howto=) at /usr/src/sys/kern/kern_shutdown.c:386 #2 0x805904c0 in vpanic (fmt=, ap=) at /usr/src/sys/kern/kern_shutdown.c:779 #3 0x805902f3 in panic (fmt=) at /usr/src/sys/kern/kern_shutdown.c:710 #4 0x808151d2 in trap_fatal (frame=0xfe0238c22660, eva=48) at /usr/src/sys/amd64/amd64/trap.c:801 #5 0x8081539c in trap_pfault (frame=0xfe0238c22660, usermode=0) at /usr/src/sys/amd64/amd64/trap.c:658 #6 0x80814ab3 in trap (frame=0xfe0238c22660) at /usr/src/sys/amd64/amd64/trap.c:421 #7 0x807fb023 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:236 #8 0x807d3999 in vm_fault_populate_cleanup ( object=, first=, last=) at pcpu.h:222 #9 0x807d2105 in vm_fault_hold (map=0xf8000999f000, vaddr=8597401600, fault_type=, fault_flags=0, m_hold=0x0) at /usr/src/sys/vm/vm_fault.c:402 #10 0x807d0658 in vm_fault (map=0xf8000999f000, vaddr=, fault_type=1 '\001', fault_flags=) at /usr/src/sys/vm/vm_fault.c:464 #11 0x808152d6 in trap_pfault (frame=0xfe0238c22a40, usermode=1) at /usr/src/sys/amd64/amd64/trap.c:708 #12 0x80814b4d in trap (frame=0xfe0238c22a40) at /usr/src/sys/amd64/amd64/trap.c:326 #13 0x807fb023 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:236 #14 0x000200b25c33 in ?? () -- Steve 20161221 https://www.youtube.com/watch?v=IbCHE-hONow ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: unkillable firefox
On Wed, Dec 28, 2016 at 12:54:53PM -0800, Steve Kargl wrote: > On Tue, Dec 20, 2016 at 01:29:20PM -0800, Steve Kargl wrote: > > Anyone know how to kill firefox? > > > > last pid: 69652; load averages: 0.49, 0.27, 0.24 up 1+02:40:06 > > 13:16:02 > > 126 processes: 1 running, 121 sleeping, 4 stopped > > CPU: 0.8% user, 0.0% nice, 0.0% system, 0.0% interrupt, 100% idle > > Mem: 2049M Active, 3739M Inact, 496M Laundry, 1365M Wired, 783M Buf, 239M > > Free > > Swap: 16G Total, 1772K Used, 16G Free > > > > PID USERNAME PRI NICE SIZERES STATE C TIMEWCPU COMMAND > > 63902 kargl 40 0 3157M 2302M STOP1 10:50 0.00% > > firefox{firefox} > > 63902 kargl -16 0 3157M 2302M STOP2 5:46 0.00% > > firefox{Composit > > 16874 kargl 40 0 740M 330M STOP1 0:07 0.00% > > firefox{firefox} > > 16874 kargl -16 0 740M 330M STOP1 0:00 0.00% > > firefox{Composit > > > > It seems that firefox is wedged in the thread firefox{Compositor}, > > and slowly eating up memory. This is on an amd64 system at > > r310125 and latest firefox from ports. procstat suggests that its > > stuck in a vm sleep queue. > > > > % procstat -k 63902 > > PIDTID COMM TDNAME KSTACK > > 63902 100504 firefox-mi_switch thread_suspend_switch > > thread_single exit1 sigexit postsig ast > > Xfast_syscall > > 63902 101494 firefoxCompositor mi_switch sleepq_wait _sleep > > vm_page_busy_sleep > > vm_page_sleep_if_busy > > vm_fault_hold vm_fault trap_pfault trap > > calltrap > > > > Firefox is still fubar on freebsd-current. Following kib's > instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD > current" thread, here's the requested kernel info > PID USERNAMETHR PRI NICE SIZERES STATE C TIMEWCPU COMMAND > 96285 kargl64 400 1008M 678M select 0 2:01 18.10% firefox > 96256 kargl 2 470 834M 304M STOP0 0:04 0.00% firefox > 96276 kargl 2 400 593M 307M STOP1 0:03 0.00% firefox > 96265 kargl 2 400 592M 307M STOP1 0:03 0.00% firefox > > % ps -H -o pid,lwp,mwchan,nwchan 96265 > PIDLWP MWCHAN NWCHAN > 96265 100137 - - > 96265 100737 vmpfw f80232a1a980 > > % kgdb /usr/obj/usr/src/sys/SPEW/kernel.full /dev/mem > (kgdb) p/x *(struct vm_page *)0xf80232a1a980 > $1 = {plinks = {q = {tqe_next = 0xf8023467d980, > tqe_prev = 0x80d9e1b8}, s = {ss = { > sle_next = 0xf8023467d980}, pv = 0x80d9e1b8}, memguard = { > p = 0xf8023467d980, v = 0x80d9e1b8}}, listq = { > tqe_next = 0xf80232a1a9e8, tqe_prev = 0xf8010c0614f8}, > object = 0xf8010c0614b0, pindex = 0x0, phys_addr = 0x5960, md = { > pv_list = {tqh_first = 0x0, tqh_last = 0xf80232a1a9b8}, > pv_gen = 0x31c, pat_mode = 0x6}, wire_count = 0x0, busy_lock = 0x6, > hold_count = 0x0, flags = 0x0, aflags = 0x2, oflags = 0x4, queue = 0xff, > psind = 0x1, segind = 0x3, order = 0xd, pool = 0x0, act_count = 0x0, > valid = 0xff, dirty = 0x0} > (kgdb) p/x *(struct vm_object *)0xf8010c0614b0 > $2 = {lock = {lock_object = {lo_name = 0x80937e16, > lo_flags = 0x2563, lo_data = 0x0, lo_witness = 0x0}, rw_lock = > 0x1}, > object_list = {tqe_next = 0xf8010c0615a0, > tqe_prev = 0xf8010c0613e0}, shadow_head = {lh_first = 0x0}, > shadow_list = {le_next = 0x0, le_prev = 0x0}, memq = { > tqh_first = 0xf80232a1a980, tqh_last = 0xf80234685e00}, rtree = { > rt_root = 0xf80138b253f0}, size = 0x347, generation = 0x1, > ref_count = 0x3, shadow_count = 0x0, memattr = 0x6, type = 0x4, > flags = 0x1016, pg_color = 0x0, paging_in_progress = 0x1, > resident_page_count = 0x347, backing_object = 0x0, > backing_object_offset = 0x0, pager_object_list = { > tqe_next = 0xf801d68e93c0, tqe_prev = 0xf801058c8cc8}, rvq = { > lh_first = 0xf80230563d00}, handle = 0x0, un_pager = {vnp = { > vnp_size = 0x0, writemappings = 0xf8010c061568}, devp = { > devp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}, > ops = 0x81367fa0, dev = 0xf80153397048}, sgp = { > sgp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}}, swp = { > swp_tmpfs = 0x0, swp_bcount = 0xc061568}}, cred = 0x0, charge = 0x0, > umtx_data = 0x0} Do you have kern.ipc.shm_use_phys set to 1 ? Try the following patch, please. diff --git a/sys/vm/vm_fault.c b/sys/vm/vm_fault.c index e8fb5d00408..98bd7bae3db 100644 --- a/sys/vm/vm_fault.c +++ b/sys/vm/vm_fault.c @@ -304,13 +304,48 @@ vm_fault_restore_map_lock(struct faultstate *fs) fs->lookup_still_valid =
Re: unkillable firefox
On Tue, Dec 20, 2016 at 01:29:20PM -0800, Steve Kargl wrote: > Anyone know how to kill firefox? > > last pid: 69652; load averages: 0.49, 0.27, 0.24 up 1+02:40:06 > 13:16:02 > 126 processes: 1 running, 121 sleeping, 4 stopped > CPU: 0.8% user, 0.0% nice, 0.0% system, 0.0% interrupt, 100% idle > Mem: 2049M Active, 3739M Inact, 496M Laundry, 1365M Wired, 783M Buf, 239M Free > Swap: 16G Total, 1772K Used, 16G Free > > PID USERNAME PRI NICE SIZERES STATE C TIMEWCPU COMMAND > 63902 kargl 40 0 3157M 2302M STOP1 10:50 0.00% > firefox{firefox} > 63902 kargl -16 0 3157M 2302M STOP2 5:46 0.00% > firefox{Composit > 16874 kargl 40 0 740M 330M STOP1 0:07 0.00% > firefox{firefox} > 16874 kargl -16 0 740M 330M STOP1 0:00 0.00% > firefox{Composit > > It seems that firefox is wedged in the thread firefox{Compositor}, > and slowly eating up memory. This is on an amd64 system at > r310125 and latest firefox from ports. procstat suggests that its > stuck in a vm sleep queue. > > % procstat -k 63902 > PIDTID COMM TDNAME KSTACK > 63902 100504 firefox-mi_switch thread_suspend_switch > thread_single exit1 sigexit postsig ast > Xfast_syscall > 63902 101494 firefoxCompositor mi_switch sleepq_wait _sleep > vm_page_busy_sleep vm_page_sleep_if_busy > vm_fault_hold vm_fault trap_pfault trap > calltrap > Firefox is still fubar on freebsd-current. Following kib's instructions in the thread "Mozilla firefox freezes/zombie on FreeBSD current" thread, here's the requested kernel info PID USERNAMETHR PRI NICE SIZERES STATE C TIMEWCPU COMMAND 96285 kargl64 400 1008M 678M select 0 2:01 18.10% firefox 96256 kargl 2 470 834M 304M STOP0 0:04 0.00% firefox 96276 kargl 2 400 593M 307M STOP1 0:03 0.00% firefox 96265 kargl 2 400 592M 307M STOP1 0:03 0.00% firefox % ps -H -o pid,lwp,mwchan,nwchan 96265 PIDLWP MWCHAN NWCHAN 96265 100137 - - 96265 100737 vmpfw f80232a1a980 % kgdb /usr/obj/usr/src/sys/SPEW/kernel.full /dev/mem (kgdb) p/x *(struct vm_page *)0xf80232a1a980 $1 = {plinks = {q = {tqe_next = 0xf8023467d980, tqe_prev = 0x80d9e1b8}, s = {ss = { sle_next = 0xf8023467d980}, pv = 0x80d9e1b8}, memguard = { p = 0xf8023467d980, v = 0x80d9e1b8}}, listq = { tqe_next = 0xf80232a1a9e8, tqe_prev = 0xf8010c0614f8}, object = 0xf8010c0614b0, pindex = 0x0, phys_addr = 0x5960, md = { pv_list = {tqh_first = 0x0, tqh_last = 0xf80232a1a9b8}, pv_gen = 0x31c, pat_mode = 0x6}, wire_count = 0x0, busy_lock = 0x6, hold_count = 0x0, flags = 0x0, aflags = 0x2, oflags = 0x4, queue = 0xff, psind = 0x1, segind = 0x3, order = 0xd, pool = 0x0, act_count = 0x0, valid = 0xff, dirty = 0x0} (kgdb) p/x *(struct vm_object *)0xf8010c0614b0 $2 = {lock = {lock_object = {lo_name = 0x80937e16, lo_flags = 0x2563, lo_data = 0x0, lo_witness = 0x0}, rw_lock = 0x1}, object_list = {tqe_next = 0xf8010c0615a0, tqe_prev = 0xf8010c0613e0}, shadow_head = {lh_first = 0x0}, shadow_list = {le_next = 0x0, le_prev = 0x0}, memq = { tqh_first = 0xf80232a1a980, tqh_last = 0xf80234685e00}, rtree = { rt_root = 0xf80138b253f0}, size = 0x347, generation = 0x1, ref_count = 0x3, shadow_count = 0x0, memattr = 0x6, type = 0x4, flags = 0x1016, pg_color = 0x0, paging_in_progress = 0x1, resident_page_count = 0x347, backing_object = 0x0, backing_object_offset = 0x0, pager_object_list = { tqe_next = 0xf801d68e93c0, tqe_prev = 0xf801058c8cc8}, rvq = { lh_first = 0xf80230563d00}, handle = 0x0, un_pager = {vnp = { vnp_size = 0x0, writemappings = 0xf8010c061568}, devp = { devp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}, ops = 0x81367fa0, dev = 0xf80153397048}, sgp = { sgp_pglist = {tqh_first = 0x0, tqh_last = 0xf8010c061568}}, swp = { swp_tmpfs = 0x0, swp_bcount = 0xc061568}}, cred = 0x0, charge = 0x0, umtx_data = 0x0} -- Steve 20161221 https://www.youtube.com/watch?v=IbCHE-hONow ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
FreeBSD_HEAD_i386 - Build #4499 - Fixed
FreeBSD_HEAD_i386 - Build #4499 - Fixed: Build information: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/ Full change log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/changes Full build log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4499/console Change summaries: 310675 by ngie: Fix the build by moving the initializers for len/nswapdev down below the declarations MFC after: 3 days Pointyhat to: ngie 310674 by mmel: Limit number of stripes supported by HDA codec to maximum number announced by HDA controller. Incorrectly implermented HDA codec may report support for more stripes that HDA controller already have. Due to this, always limit number of enabled stripes by global controller maximum. Reviewed by:mav MFC after: 1 month Differential Revision: https://reviews.freebsd.org/D8922 ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
FreeBSD_HEAD_i386 - Build #4498 - Failure
FreeBSD_HEAD_i386 - Build #4498 - Failure: Build information: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/ Full change log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/changes Full build log: https://jenkins.FreeBSD.org/job/FreeBSD_HEAD_i386/4498/console Change summaries: 310669 by ngie: style(9): clean up whitespace MFC after: 3 days 310668 by ngie: style(9) fixes: clean up leading whitespace MFC after: 3 days 310667 by ngie: style(9) fixes: clean up leading whitespace MFC after: 3 days 310666 by ngie: style(9) fixes - Clean up trailing whitespace - Fix variable type alignment in storage_OS_get_swap(..) MFC after: 3 days 310665 by ngie: Only build/install usr.sbin/bsnmpd/modules/snmp_hast if MK_HAST != no MFC after: 1 week 310664 by ngie: Only build/install usr.sbin/bsnmpd/modules/snmp_wlan if MK_WIRELESS != no MFC after: 1 week The end of the build log: [...truncated 131742 lines...] --- all_subdir_usr.sbin --- --- all_subdir_usr.sbin/bsdconfig/networking --- ===> usr.sbin/bsdconfig/networking (all) --- all_subdir_usr.sbin/bsdconfig/networking/include --- ===> usr.sbin/bsdconfig/networking/include (all) --- all_subdir_usr.sbin/bsdconfig/networking/share --- ===> usr.sbin/bsdconfig/networking/share (all) --- all_subdir_usr.sbin/bsdconfig/packages --- ===> usr.sbin/bsdconfig/packages (all) --- all_subdir_usr.sbin/bsdconfig/packages/include --- ===> usr.sbin/bsdconfig/packages/include (all) --- all_subdir_usr.sbin/bsdconfig/password --- ===> usr.sbin/bsdconfig/password (all) --- all_subdir_usr.sbin/bsdconfig/password/include --- ===> usr.sbin/bsdconfig/password/include (all) --- all_subdir_usr.sbin/bsdconfig/password/share --- ===> usr.sbin/bsdconfig/password/share (all) --- all_subdir_usr.sbin/bsdconfig/security --- ===> usr.sbin/bsdconfig/security (all) --- all_subdir_usr.sbin/bsnmpd --- --- snmp_bridge.so.6.full --- building shared library snmp_bridge.so.6 cc -target i386-unknown-freebsd12.0 --sysroot=/usr/obj/usr/src/tmp -B/usr/obj/usr/src/tmp/usr/bin -fstack-protector-strong -shared -Wl,-x -Wl,--fatal-warnings -Wl,--warn-shared-textrel -o snmp_bridge.so.6.full -Wl,-soname,snmp_bridge.so.6 `NM='nm' NMFLAGS='' lorder bridge_snmp.pico bridge_if.pico bridge_port.pico bridge_addrs.pico bridge_pf.pico bridge_sys.pico bridge_tree.pico | tsort -q` --- all_subdir_usr.sbin/bsdconfig --- --- all_subdir_usr.sbin/bsdconfig/security/include --- ===> usr.sbin/bsdconfig/security/include (all) --- all_subdir_usr.sbin/bsdconfig/share --- ===> usr.sbin/bsdconfig/share (all) --- all_subdir_usr.sbin/bsdconfig/share/media --- ===> usr.sbin/bsdconfig/share/media (all) --- all_subdir_usr.sbin/bsnmpd --- --- snmp_bridge.3.gz --- sed -e 's%@MODPATH@%/usr/lib/%g' -e 's%@DEFPATH@%/usr/share/snmp/defs/%g'-e 's%@MIBSPATH@%/usr/share/snmp/mibs/%g' < /usr/src/usr.sbin/bsnmpd/modules/snmp_bridge/snmp_bridge.3 | gzip -cn > snmp_bridge.3.gz --- snmp_bridge.so.6.debug --- objcopy --only-keep-debug snmp_bridge.so.6.full snmp_bridge.so.6.debug --- snmp_bridge.so.6 --- objcopy --strip-debug --add-gnu-debuglink=snmp_bridge.so.6.debug snmp_bridge.so.6.full snmp_bridge.so.6 --- all_subdir_usr.sbin/bsnmpd/modules/snmp_hostres --- ===> usr.sbin/bsnmpd/modules/snmp_hostres (all) --- all_subdir_usr.sbin/bsdconfig --- --- all_subdir_usr.sbin/bsdconfig/share/packages --- ===> usr.sbin/bsdconfig/share/packages (all) --- all_subdir_usr.sbin/bsdconfig/startup --- ===> usr.sbin/bsdconfig/startup (all) --- all_subdir_usr.sbin/bsnmpd --- --- hostres_tree.c --- cat /usr/src/usr.sbin/bsnmpd/modules/snmp_hostres/hostres_tree.def | gensnmptree -p hostres_ --- hostres_oid.h --- cat /usr/src/usr.sbin/bsnmpd/modules/snmp_hostres/hostres_tree.def | gensnmptree -e host hrStorageOther hrStorageRam hrStorageVirtualMemory hrStorageFixedDisk hrStorageRemovableDisk hrStorageFloppyDisk hrStorageCompactDisc hrStorageRamDisk hrStorageFlashMemory hrStorageNetworkDisk hrDeviceOther hrDeviceUnknown hrDeviceProcessor hrDeviceNetwork hrDevicePrinter hrDeviceDiskStorage hrDeviceVideo hrDeviceAudio hrDeviceCoprocessor hrDeviceKeyboard hrDeviceModem hrDeviceParallelPort hrDevicePointing hrDeviceSerialPort hrDeviceTape hrDeviceClock hrDeviceVolatileMemory hrDeviceNonVolatileMemory hrFSOther hrFSUnknown hrFSBerkeleyFFS hrFSSys5FS hrFSFat hrFSHPFS hrFSHFS hrFSMFS hrFSNTFS hrFSVNode hrFSJournaled hrFSiso9660 hrFSRockRidge hrFSNFS hrFSNetware hrFSAFS hrFSDFS hrFSAppleshare hrFSRFS hrFSDGCFS hrFSBFS hrFSFAT32 hrFSLinuxExt2 > hostres_oid.h --- .depend --- echo snmp_hostres.so.6.full: /usr/obj/usr/src/tmp/usr/lib/libkvm.a /usr/obj/usr/src/tmp/usr/lib/libdevinfo.a /usr/obj/usr/src/tmp/usr/lib/libm.a /usr/obj/usr/src/tmp/usr/lib/libgeom.a /usr/obj/usr/src/tmp/usr/lib/libmemstat.a >> .depend --- hostres_begemot.pico --- cc -target i386-unknown-freebsd12.0 --sysroot=/usr/obj/usr/src/tmp -B/usr/obj/usr/src/tmp/usr/bin -fpic -DPIC -g -O2 -pipe