[Bug 229087] 11.2-RC3 Weird keyboard behaviour

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229087

Andriy Gapon  changed:

   What|Removed |Added

 Status|New |Closed
 Resolution|--- |Not A Bug

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 163461] [vfs] vfs.zfs.arc_max/vfs.zfs.arc_meta_limit defaults aren't wise

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=163461

Shane  changed:

   What|Removed |Added

 CC||free...@shaneware.biz

--- Comment #3 from Shane  ---
Rather than start a new report I will jump into this old one.

Currently arc_max is set to the larger of (5/8 of kmem_size) or (kmem_size
minus 1G) - for a system with 8G of ram 5/8 is 5G with kmem size minus 1G about
6GB

While that sounds ok, we also have max_wired which seems to default to 5G (I
see that on an 8G and 16G setup) the issue results from arc being wired but not
included in the max_wired count, that means an 8G system allows 10G to get
wired! a 16GB system allows 20GB to be wired!

When a system has more than 70% of physical ram wired, it gets exteremely slow
and over 80% wired gives a very high chance of needing a hard reset.

At the minimum we need to consider max_wired in the arc_max calculation.

I do believe the arc_max default should be even smaller to be better suited to
more common setups that run processes that use ram, a sysadmin starting a file
server that wants to use most of the ram for cache should know how to set this
as desired, the other 80-90% of users shouldn't have to adjust a setting that
is suited to the smaller use case.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

Bug ID: 229106
   Summary: intr_event_handle is unsafe with respect to interrupt
handler list
   Product: Base System
   Version: CURRENT
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Only Me
  Priority: ---
 Component: kern
  Assignee: b...@freebsd.org
  Reporter: a...@freebsd.org

Created attachment 194354
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=194354&action=edit
code changes to greately increase likelihood of the race

I must state upfront that I discovered the issue through code review and I had
to make special arrangements to provoke the problem.
The core of the issue is that intr_event_handle iterates the list of handlers,
ie_handlers, without any protection whatsoever.  Also, removal and installation
of a filter-only handler does not make any attempt to synchronize with with
intr_event_handle.

As such, it is possible (although very improbable) that intr_event_handle may
iterate into an element just before it is removed and derefence its pointer to
a next element after the former element is freed and the pointer is
overwritten.

This problem is only for a shared interrupts. When an interrupt is not shared,
then it should be disabled before its handler is torn down.

Here is a stack trace of the crash:
fault virtual address   = 0x
fault code  = supervisor read data, page not present
instruction pointer = 0x20:0x80b64ff0
stack pointer   = 0x28:0xfe434970
frame pointer   = 0x28:0xfe4349b0
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= resume, IOPL = 0
current process = 11 (idle: cpu2)
trap number = 12
panic: page fault
cpuid = 2
time = 1529319165
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe434630
vpanic() at vpanic+0x1a3/frame 0xfe434690
panic() at panic+0x43/frame 0xfe4346f0
trap_fatal() at trap_fatal+0x35f/frame 0xfe434740
trap_pfault() at trap_pfault+0x62/frame 0xfe434790
trap() at trap+0x2ba/frame 0xfe4348a0
calltrap() at calltrap+0x8/frame 0xfe4348a0
--- trap 0xc, rip = 0x80b64ff0, rsp = 0xfe434970, rbp =
0xfe4349b0 ---
intr_event_handle() at intr_event_handle+0xa0/frame 0xfe4349b0
intr_execute_handlers() at intr_execute_handlers+0x58/frame 0xfe4349e0
lapic_handle_intr() at lapic_handle_intr+0x6d/frame 0xfe434a20
Xapic_isr1() at Xapic_isr1+0xd0/frame 0xfe434a20
--- interrupt, rip = 0x80bd3b49, rsp = 0xfe434af0, rbp =
0xfe434bb0 ---
sched_idletd() at sched_idletd+0x4a9/frame 0xfe434bb0
fork_exit() at fork_exit+0x84/frame 0xfe434bf0
fork_trampoline() at fork_trampoline+0xe/frame 0xfe434bf0

This is what I did to get the crash.
1. Found hardware with shared interrupts. Specifically, I had three USB OHCI
controllers sharing PCI IRQ 18.
2. Modified the ohci driver, so that it installed a dummy filter instead of its
ithread handler.  This made the driver non-functional, of course.
3. Modified IO-APIC code, so that it kept re-raising the interrupt thus
increasing the chances of getting the race within a reasonable time frame.
4. Re-compiled kern_intr.c with QUEUE_MACRO_DEBUG_TRASH to make the race more
probable by immediately corrupting a removed handler.
5. Triggered the interrupt storm for IRQ 18.
6. Ran a continuous loop of devctl detach followed by devctl attach for ohci
driver instances sharing the interrupt.

All the code modifications are in the attachment.
The devctl command line was:
while true ; do devctl detach ohci3 && devctl attach pci0:0:19:1 ; devctl
detach ohci4 && devctl attach pci0:0:20:5 ; done

The rate of interrupts was about 570K per second:
569k ohci2 ohci

The stack trace in kgdb:
(kgdb) bt
#0  __curthread () at ./machine/pcpu.h:231
#1  doadump (textdump=1) at /usr/devel/svn/head/sys/kern/kern_shutdown.c:366
#2  0x80ba33e2 in kern_reboot (howto=260) at
/usr/devel/svn/head/sys/kern/kern_shutdown.c:446
#3  0x80ba39c3 in vpanic (fmt=, ap=0xfe4346d0)
at /usr/devel/svn/head/sys/kern/kern_shutdown.c:863
#4  0x80ba3a13 in panic (fmt=) at
/usr/devel/svn/head/sys/kern/kern_shutdown.c:790
#5  0x8107c6ff in trap_fatal (frame=0xfe4348b0,
eva=18446744073709551615) at /usr/devel/svn/head/sys/amd64/amd64/trap.c:892
#6  0x8107c772 in trap_pfault (frame=0xfe4348b0,
usermode=) at /usr/devel/svn/head/sys/amd64/amd64/trap.c:728
#7  0x8107bd7a in trap (frame=0xfe4348b0) at
/usr/devel/svn/head/sys/amd64/amd64/trap.c:427
#8  
#9  intr_event_handle (ie=0xf80003349300, frame=0xfe434a30) at
/usr/devel/

[Bug 229107] linprocfs: implement /dev/tty/drivers

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229107

Bug ID: 229107
   Summary: linprocfs: implement /dev/tty/drivers
   Product: Base System
   Version: CURRENT
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Only Me
  Priority: ---
 Component: kern
  Assignee: b...@freebsd.org
  Reporter: ema...@freebsd.org

On Gentoo "Linux (none) 4.14.33-v8-0a76b56e61cf+ #1 SMP PREEMPT Wed Apr 11
11:36:25 BST 2018 aarch64 GNU/Linux" on RPi 3B+ /proc/tty/drivers contains:

/dev/tty /dev/tty5   0 system:/dev/tty
/dev/console /dev/console5   1 system:console
/dev/ptmx/dev/ptmx   5   2 system
/dev/vc/0/dev/vc/0   4   0 system:vtmaster
ttyAMA   /dev/ttyAMA   204 64-77 serial
ttyprintk/dev/ttyprintk   5   3 console
pty_slave/dev/pts  136 0-1048575 pty:slave
pty_master   /dev/ptm  128 0-1048575 pty:master
unknown  /dev/tty4 1-63 console

This seems to be accessed by some common startup code - e.g., invoking bin/ps
reads from /proc/tty/drivers.

strace on Linus shows:

openat(AT_FDCWD, "/proc/tty/drivers", O_RDONLY) = 6
read(6, "/dev/tty /dev/tty   "..., ) = 521
close(6)= 0
newfstatat(AT_FDCWD, "/dev/pts0", 0x7ff7270018, 0) = -1 ENOENT (No such file or
directory)
newfstatat(AT_FDCWD, "/dev/pts/0", {st_mode=S_IFCHR|0620, st_rdev=makedev(136,
0), ...}, 0) = 0
openat(AT_FDCWD, "/usr/lib64/gconv/gconv-modules.cache", O_RDONLY) = 6
fstat(6, {st_mode=S_IFREG|0644, st_size=26244, ...}) = 0
mmap(NULL, 26244, PROT_READ, MAP_SHARED, 6, 0) = 0x7f90e6a000
close(6)= 0
newfstatat(AT_FDCWD, "/proc/946", {st_mode=S_IFDIR|0555, st_size=0, ...}, 0) =
0
openat(AT_FDCWD, "/proc/946/stat", O_RDONLY) = 6
read(6, "946 (kworker/3:2) I 2 0 0 0 -1 6"..., 1024) = 160
close(6)= 0
...

Linux bin/ps under arm64 Linuxulator:
   649 ps   CALL  linux_openat(0xff9c,0x40164a78,0,0)
   649 ps   NAMI  "/compat/linux/proc/tty/drivers"
   649 ps   NAMI  "/proc/tty/drivers"
   649 ps   RET   linux_openat -1 errno -2 No such file or directory

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229107] linprocfs: implement /dev/tty/drivers

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229107

Mark Linimon  changed:

   What|Removed |Added

   Assignee|b...@freebsd.org|emulat...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 213501] Screen blank after sleep/resume

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213501

--- Comment #7 from John Baldwin  ---
(In reply to Andriy Gapon from comment #6)
Yes, X with VESA will most likely not work aside from an older BIOS.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #1 from John Baldwin  ---
This is an old race.  I have a very old p4 branch that dedicates a spin lock to
protecting the list of handlers (and then uses that as the thread_lock of idle
interrupt threads so that the number of spin locks taken for an interrupt
remains the same) that fixes this.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #2 from Andriy Gapon  ---
Yes, it's an old one.
I think that using a spinlock is perfectly fine.
I also have a work-in-progress that tries to solve the problem with some atomic
magic so that intr_event_handle is completely wait / spin free (if the
interrupt thread does not need to run, of course).  I guess that a difference
between those two approaches would be negligible.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

Conrad Meyer  changed:

   What|Removed |Added

 CC||c...@freebsd.org

--- Comment #3 from Conrad Meyer  ---
Just FYI for next time, if you're making code changes, fail_point(9) can make
this kind of scenario much easier to hit.  In particular, you can expand races
by adding in an empty KFAIL_POINT_CODE() and then inducing a delay with sysctl
my.failpoint="50%delay(1000)" (i.e., DELAY(1000) 50% of times we hit that
failpoint; the 50% can help avoid excessive foot-shooting).

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #4 from Conrad Meyer  ---
Is this list a good candidate for epoch(9)-based reclamation? :-)

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #5 from John Baldwin  ---
I suspect you cannot use epoch(9) in primary interrupt context (e.g. filters)
just as you can't use regular mutexes there.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #6 from Andriy Gapon  ---
But a similar approach might work.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #7 from Conrad Meyer  ---
Where does epoch(9) take a regular mtx?  I may just be missing it, but I see
only spin mutexes.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229120] [acpi_ibm] [patch] Add support for newer Thinkpad models with id LEN0268

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229120

Bug ID: 229120
   Summary: [acpi_ibm] [patch] Add support for newer Thinkpad
models with id LEN0268
   Product: Base System
   Version: 11.0-STABLE
  Hardware: amd64
OS: Any
Status: New
  Severity: Affects Some People
  Priority: ---
 Component: misc
  Assignee: b...@freebsd.org
  Reporter: ali...@gmail.com

Created attachment 194370
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=194370&action=edit
Support newer thinkpads with LEN0268 id

The attached patch adds support for newer Thinkpad models. The patch has been
tested on a Thinkpad T480, but should work on other models as well.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229120] [acpi_ibm] [patch] Add support for newer Thinkpad models with id LEN0268

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229120

Mark Linimon  changed:

   What|Removed |Added

   Keywords||patch
   Assignee|b...@freebsd.org|a...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 228755] libvgl under syscons causes system reboot (via SDL 1.2)

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=228755

Mahmoud Al-Qudsi  changed:

   What|Removed |Added

   Keywords||crash, panic
   Hardware|Any |i386
 Status|New |Closed
   Severity|Affects Only Me |Affects Many People
 Resolution|--- |FIXED

--- Comment #2 from Mahmoud Al-Qudsi  ---
Verified fixed.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 190281] netstat -s -i only shows ip6 statistics

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190281

Marie Helene Kvello-Aune  changed:

   What|Removed |Added

 CC||mariehelen...@gmail.com

--- Comment #3 from Marie Helene Kvello-Aune  ---
I decided to look at this today, and to my surprise, I found that netstat
doesn't implement per-interface statistics for IPv4 at all.

In usr.bin/netstat/main.c, line 105-106:
{ N_RIPCBINFO,  N_IPSTAT,   1,  protopr,
  ip_stats, NULL,   "ip",   1,  IPPROTO_RAW },

The 6th argument is supposed to be the function which prints per-interface
statistics.

The equivelant lines for IPv6 (line 141-142):
{ N_RIPCBINFO,  N_IP6STAT,  1,  protopr,
  ip6_stats,ip6_ifstats,"ip6",  1,  IPPROTO_RAW },

ip6_stats and ip6_ifstats are implemented in usr.bin/netstat/inet6.c.
ip_stats (but no ip_ifstats) is implemented in usr.bin/netstat/inet.c.

tl;dr: someone has to implement functions to print the IPv4 information as
well.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 190281] netstat -s -i only shows ip6 statistics

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=190281

--- Comment #4 from Marie Helene Kvello-Aune  ---
... And I just realized I didn't see the comment by Eitan Adler before starting
to dig into this. Oops.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #8 from Andriy Gapon  ---
(In reply to Conrad Meyer from comment #7)
I don't know epoch(9) / ck_epoch implementation details, but given the
constraints[*] of interrupt handling, I think that it could be an overkill.  I
mean, it probably has some overhead that's avoidable.  And for that latency
sensitive code it could matter.

[*] The interrupt handler list can be iterated only by a single thread /
context at a time.  Also, we reduce modifications to a single thread at a time
using a mutex.  Performance of adding and removing interrupt handlers is not
critical.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #9 from Conrad Meyer  ---
(In reply to Andriy Gapon from comment #8)
Yes, performance of add/remove doesn't matter.  But performance of
intr_event_handle() matters very much, and adding a contested spin lock to it
seems like a bad idea.  I suppose it only needs to be taken for shared
interrupts, not MSI, so maybe the impact is not so bad.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #10 from John Baldwin  ---
To be clear, we are not talking about adding a spin mutex.  We are talking
about replacing the existing sched_lock mutex used to schedule the ithread
anyway with a dedicated spin mutex that protects the list of handlers and can
be used as the THREAD_LOCK when scheduling the ithread since ithreads are
changed in this patch to set td_lock to the new mutex when they are idle.  You
can't get away from the mutex to call sched_add(), but this lets you change
what lock is now used for that in essence.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #11 from Conrad Meyer  ---
Sure.  It'd still be a single global spin lock, right?

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #12 from John Baldwin  ---
No, it is kind of per-IRQ, not global.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 229106] intr_event_handle is unsafe with respect to interrupt handler list

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229106

--- Comment #13 from Conrad Meyer  ---
Oh, that's much better.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 203349] [META] FreeBSD Foundation sponsored project dependencies for FreeBSD 11.x

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203349
Bug 203349 depends on bug 223806, which changed state.

Bug 223806 Summary: java/openjdk8: [PATCH] arm64 package builds do not allow 
enough time for build to complete
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223806

   What|Removed |Added

 Status|New |Closed
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 211713] NVME controller failure: resetting (Samsung SM961 SSD Drives)

2018-06-18 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211713

Ali Abdallah  changed:

   What|Removed |Added

 CC||ali...@gmail.com

--- Comment #62 from Ali Abdallah  ---
Same problem on FreeBSD 11.2-RC3 on a Thinkpad T480. After resuming from
suspend the system is not usable for 10-30 seconds, showing the following
messages 

nvme0: Resetting controller due to a timeout.
nvme0: Resetting controller due to a timeout.
nvme0: resetting controller
nvme0: Resetting controller due to a timeout.
nvme0: aborting outstanding i/o
nvme0: WRITE sqid:1 cid:124 nsid:1 lba:302574390 len:72
.
.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"