top -m io Segmentation fault(core dumped) on fresh r335360

2018-06-19 Thread Alex V. Petrov
top -m io
Segmentation fault(core dumped)
FreeBSD alex.super 12.0-CURRENT FreeBSD 12.0-CURRENT #11 r335360: Tue
Jun 19 14:53:20 +07 2018
alex@alex.super:/usr/obj/usr/src/amd64.amd64/sys/IOSCHED  amd64
-- 
-
Alex.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Ryzen public erratas

2018-06-19 Thread Gary Jennejohn
On Mon, 18 Jun 2018 22:44:13 -0700
Eitan Adler  wrote:

> On 13 June 2018 at 04:16, Eitan Adler  wrote:
> > On 13 June 2018 at 03:35, Konstantin Belousov  wrote:  
> >> Today I noted that AMD published the public errata document for Ryzens,
> >> https://developer.amd.com/wp-content/resources/55449_1.12.pdf
> >>
> >> Some of the issues listed there looks quite relevant to the potential
> >> hangs that some people still experience with the machines.  I wrote
> >> a script which should apply the recommended workarounds to the erratas
> >> that I find interesting.
> >>
> >> To run it, kldload cpuctl, then apply the latest firmware update to your
> >> CPU, then run the following shell script.  Comments indicate the errata
> >> number for the workarounds.
> >>
> >> Please report the results.  If the script helps, I will code the kernel
> >> change to apply the workarounds.
> >>
> >> #!/bin/sh
> >>
> >> # Enable workarounds for erratas listed in
> >> # https://developer.amd.com/wp-content/resources/55449_1.12.pdf
> >>
> >> # 1057, 1109
> >> sysctl machdep.idle_mwait=0
> >> sysctl machdep.idle=hlt  
> >
> >
> > Is this needed if it was previously machdep.idle: acpi ?  
> 
> This might explain why I've never seen the lockup issues mentioned by
> other people. What would cause my machine to differ from others?
> 

I had sysctl machdep.idle_mwait=1 and machdep.idle=acpi before
applying the shell script.  I had multiple lockups every week,
sometimes multiple lockups per day.

With the idle settings from the script it still locks up, but
not as often.

I suspect I also need to update the CPU firmware, although I
expect that the new BIOS version I installed last week would
have done that already.

-- 
Gary Jennejohn
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: review of nfsd rc.d script patch

2018-06-19 Thread Rick Macklem
Don Lewis wrote:
>On 15 Jun, Rick Macklem wrote:
>> Hi,
>>
>> For the pNFS service MDS machine, the nfsd can't be started until all nfs 
>> mounts
>> in /etc/fstab are done.
>> I think that adding "mountcritremote" to the "# REQUIRE:" line is sufficient 
>> to do this?
>>
>> I don't think delaying the startup of the nfsd daemon until after any NFS 
>> mounts
>> are done will do any harm, but if others think it would be a POLA violation,
>> I could make this dependent on the pNFS service being enabled.
>> Does anyone think this would cause a POLA violation?
>
>Sounds like that would break cross mounts.  Back in the olden days
>before the automounter, I would set up workstation clusters with hosta
>exporting local filesystem /home/hosta, and hostb exporting /home/hostb.
>In addition, hosta would do a bg NFS mount of /home/hostb and hostb
>would do a bg NFS mount of /home/hosta.  That way everybody would have a
>consistent view of everything.  If a power failure took down everything,
>the first system up would export its local filesystem and even though it
>wouldn't be able to mount any remote filesystems, mount would background
>itself at the boot would complete.  As the remaining machines came up,
>they would be able to mount the remote filesystems of the machine that
>came up earlier, and the early machines would mount the filesystems from
>the later machines as they became available.
>
>If nfsd is delayed until all the NFS filesystems are mounted, the above
>setup would deadlock.
I think you would have used the "bg" mount option on the NFS mounts to get
the above to work? (That is what makes the mount go "background" if it can't
contact the NFS server.)

If so, this would still behave the same after this patch.

The patch forces "mountcritremote" to complete before nfsd is run (to be honest,
since "m" comes before "n", I think that happens anyhow? This patch just tries 
to
ensure that).
It does not force waiting for mount completion if "bg" is specified.
(Put another way, "bg" can't be used for mounts of DSs for the pNFS server 
setup.)

rick
ps: I recall a small company that only had a few SGI workstations and did a 
setup
  like the above. However, they weren't very good at configuring it and, as 
such,
  everyone would run around for a half hour after a power failure, trying 
to get
  the workstations back up;-)
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: ESXi NFSv4.1 client id is nasty

2018-06-19 Thread Rick Macklem
Steve Wills wrote:
On 06/18/18 17:42, Rick Macklem wrote:
>> Steve Wills wrote:
>>> Would it be possible or reasonable to use the client ID to log a message
>>> telling the admin to enable a sysctl to enable the hacks?
>> Yes. However, this client implementation id is only seen by the server
>> when the client makes a mount attempt.
>>
>> I suppose it could log the message and fail the mount, if the "hack" sysctl 
>> isn't
>> set?
>
>I hadn't thought of failing the mount, just defaulting not enabling the
>hacks unless the admin chooses to enable them. But at the same time
>being proactive about telling the admin to enable them.
>
>I.E. keep the implementation RFC compliant since we wouldn't be changing
>the behavior based on the implementation ID, only based upon the admin
>setting the sysctl, which we told them to do based on the implementation ID.
Well, without one of the hacks (as head currently is) the mounts always fail,
so ESXi mounts failing is a feature of the "unhacked" server.
(The ReclaimComplete failure fails the mount.)

>Just an idea, maybe Warner's suggestion is a better one.
Yes, I think Warner has the right idea, although logging a message w.r.t. the
ReclaimComplete failure (which fails these mounts) when the hacks are turned
off sounds like a good one to me.

>Steve

rick

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: ESXi NFSv4.1 client id is nasty

2018-06-19 Thread Warner Losh
On Tue, Jun 19, 2018 at 5:11 AM, Rick Macklem  wrote:

> Steve Wills wrote:
> On 06/18/18 17:42, Rick Macklem wrote:
> >> Steve Wills wrote:
> >>> Would it be possible or reasonable to use the client ID to log a
> message
> >>> telling the admin to enable a sysctl to enable the hacks?
> >> Yes. However, this client implementation id is only seen by the server
> >> when the client makes a mount attempt.
> >>
> >> I suppose it could log the message and fail the mount, if the "hack"
> sysctl isn't
> >> set?
> >
> >I hadn't thought of failing the mount, just defaulting not enabling the
> >hacks unless the admin chooses to enable them. But at the same time
> >being proactive about telling the admin to enable them.
> >
> >I.E. keep the implementation RFC compliant since we wouldn't be changing
> >the behavior based on the implementation ID, only based upon the admin
> >setting the sysctl, which we told them to do based on the implementation
> ID.
> Well, without one of the hacks (as head currently is) the mounts always
> fail,
> so ESXi mounts failing is a feature of the "unhacked" server.
> (The ReclaimComplete failure fails the mount.)
>
> >Just an idea, maybe Warner's suggestion is a better one.
> Yes, I think Warner has the right idea, although logging a message w.r.t.
> the
> ReclaimComplete failure (which fails these mounts) when the hacks are
> turned
> off sounds like a good one to me.
>

I think so too, rate limited, with an invitation to turn on the hack :)

Warner
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: A head buildworld race visible in the ci.freebsd.org build history

2018-06-19 Thread Li-Wen Hsu
On Mon, Jun 18, 2018 at 8:36 PM Ed Maste  wrote:
> Li-Wen reported that the build is done in a 11.1-rel jail though, so
> the libarchive (or any userland) change shouldn't be responsible.
>
> Can we update a canary builder to somewhere between r328278 and r88?

butler1.nyi.freebsd.org is running r331373 now.

-- 
Li-Wen Hsu 
https://lwhsu.org
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Current @ r335314 not bootable with Geli and ZFS

2018-06-19 Thread Allan Jude
On 2018-06-18 12:42, Thomas Laus wrote:
> Something changed in /boot/gptzfsboot between r334610 and r335314.  I
> built current this morning and my system is un-bootable.  I am using
> redundant ZFS disks and only copied the updated /boot/gptzfsboot file to
> my ada0 drive.  I was able to boot the ada1 drive that still had the
> gptzfsboot file from r334610.
> 
> I had a similar issue a few months ago with the upgrades to the Geli +
> ZFS booting process.  These were resolved and operation has been fine
> since the last 'hick-up' in the testing process.  I might not be the
> only person running the combination of Geli encryption and using a ZFS
> filesystem, but it should not be that much uncommon setup that I am the
> first to report the problem.
> 
> Let me know far back I need to revert my sources to identify the commit
> that broke gptzfsboot.  My system goes into a continuous reboot loop
> before presenting the password prompt.  It is very early in the startup
> process.
> 
> Tom
> 

We tested all of the changes with the setup in tools/boot/rootgen.sh, it
will be interesting to figure out what went wrong with your setup, and
add it as a test case to prevent this in the future.

The recent changes are:

r335245 (reading the size of the disk)
r335254 (reading past the end of the disk)
r335276 (enable the serial console sooner so the password prompt can be
used over serial)

There is also one outstanding fix: https://reviews.freebsd.org/D15847

-- 
Allan Jude
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Current @ r335314 not bootable with Geli and ZFS

2018-06-19 Thread Thomas Laus
On 06/19/18 12:09, Allan Jude wrote:
> 
> We tested all of the changes with the setup in tools/boot/rootgen.sh, it
> will be interesting to figure out what went wrong with your setup, and
> add it as a test case to prevent this in the future.
> 
> The recent changes are:
> 
> r335245 (reading the size of the disk)
> r335254 (reading past the end of the disk)
> r335276 (enable the serial console sooner so the password prompt can be
> used over serial)
> 
> There is also one outstanding fix: https://reviews.freebsd.org/D15847
>
I don't think that my issue is related to the fix described in the
review.  I am using ~256G SSD's.  They are slightly different sizes but
are both >200M.  I will try backing out the commits starting with
r335276 and work backward from there.  I will review the changes made to
gptzfsboot to get the date that it was last touched.  When I replace
only gptzfsboot with one made 2 weeks ago (r334610) everything boots OK
and I get a password prompt for the geli password.  If the gptzfs
bootcode after r335314 is copied to the boot record, the computer goes
into a continuous reboot loop and only a part of the password prompt is
shown before the reboot.

The filesize on the bad gptzfsboot file is 121922 bytes and the good one
is 121634 bytes.  The filesize on that file has not changed in a few
months.  I keep old versions of this file since imp fixed things for me
a few months ago when he made changes for loader code migration from
Forth that caused a similar issue.

Tom


-- 
Public Keys:
PGP KeyID = 0x5F22FDC1
GnuPG KeyID = 0x620836CF
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Current @ r335314 not bootable with Geli and ZFS

2018-06-19 Thread Thomas Laus
On 06/19/18 14:22, Thomas Laus wrote:
> On 06/19/18 12:09, Allan Jude wrote:
>>
>> We tested all of the changes with the setup in tools/boot/rootgen.sh, it
>> will be interesting to figure out what went wrong with your setup, and
>> add it as a test case to prevent this in the future.
>>
>> The recent changes are:
>>
>> r335245 (reading the size of the disk)
>> r335254 (reading past the end of the disk)
>> r335276 (enable the serial console sooner so the password prompt can be
>> used over serial)
>>
Allan:

It looks like the problem is with r335276.  I reverted back to that
revision and built stand, my boot problem was still there.  I reverted
further back to r335254 and everything worked fine.

Tom

-- 
Public Keys:
PGP KeyID = 0x5F22FDC1
GnuPG KeyID = 0x620836CF
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Current @ r335314 not bootable with Geli and ZFS

2018-06-19 Thread Toomas Soome


> On 19 Jun 2018, at 21:51, Thomas Laus  wrote:
> 
> On 06/19/18 14:22, Thomas Laus wrote:
>> On 06/19/18 12:09, Allan Jude wrote:
>>> 
>>> We tested all of the changes with the setup in tools/boot/rootgen.sh, it
>>> will be interesting to figure out what went wrong with your setup, and
>>> add it as a test case to prevent this in the future.
>>> 
>>> The recent changes are:
>>> 
>>> r335245 (reading the size of the disk)
>>> r335254 (reading past the end of the disk)
>>> r335276 (enable the serial console sooner so the password prompt can be
>>> used over serial)
>>> 
> Allan:
> 
> It looks like the problem is with r335276.  I reverted back to that
> revision and built stand, my boot problem was still there.  I reverted
> further back to r335254 and everything worked fine.
> 

ou, in illumos side there was an idea of having early boot printouts mirrored 
to serial, but it got turned down because there is no way to tell if any system 
has some bad side effects from it… (either directly or indirectly by having 
some weird device connected to the serial).

rgds,
toomas

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: top -m io Segmentation fault(core dumped) on fresh r335360

2018-06-19 Thread Eitan Adler
On 19 June 2018 at 02:28, Alex V. Petrov  wrote:
> top -m io
> Segmentation fault(core dumped)
> FreeBSD alex.super 12.0-CURRENT FreeBSD 12.0-CURRENT #11 r335360: Tue
> Jun 19 14:53:20 +07 2018
> alex@alex.super:/usr/obj/usr/src/amd64.amd64/sys/IOSCHED  amd64

r335390 should fix it.



-- 
Eitan Adler
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


ci.freebsd.org's FreeBSD-head-amd64-gcc broken by -r335338 and/or -r335339 (-r335389 still broken)

2018-06-19 Thread Mark Millard
>From https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc/6190/consoleText
and https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc/6213/ as examples:

--- ixl_pf_qmgr.o ---
In file included from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.h:36:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.c:36:
/workspace/src/sys/dev/ixl/ixl_pf.h:339:6: error: redundant redeclaration of 
'ixl_set_queue_rx_itr' [-Werror=redundant-decls]
 void ixl_set_queue_rx_itr(struct ixl_rx_queue *);
  ^~~~
In file included from /workspace/src/sys/dev/ixl/ixl_pf.h:39:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.h:36,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.c:36:
/workspace/src/sys/dev/ixl/ixl.h:545:8: note: previous declaration of 
'ixl_set_queue_rx_itr' was here
 void   ixl_set_queue_rx_itr(struct ixl_rx_queue *que);
^~~~
In file included from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.h:36:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.c:36:
/workspace/src/sys/dev/ixl/ixl_pf.h:404:5: error: redundant redeclaration of 
'ixl_max_aq_speed_to_value' [-Werror=redundant-decls]
 u64 ixl_max_aq_speed_to_value(u8);
 ^
In file included from /workspace/src/sys/dev/ixl/ixl_pf.h:39:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.h:36,
 from /workspace/src/sys/dev/ixl/ixl_pf_qmgr.c:36:
/workspace/src/sys/dev/ixl/ixl.h:549:6: note: previous declaration of 
'ixl_max_aq_speed_to_value' was here
 u64  ixl_max_aq_speed_to_value(u8);
  ^


and:


--- all_subdir_ixl ---
In file included from /workspace/src/sys/dev/ixl/ixl_pf_main.c:36:0:
/workspace/src/sys/dev/ixl/ixl_pf.h:339:6: error: redundant redeclaration of 
'ixl_set_queue_rx_itr' [-Werror=redundant-decls]
 void ixl_set_queue_rx_itr(struct ixl_rx_queue *);
  ^~~~
In file included from /workspace/src/sys/dev/ixl/ixl_pf.h:39:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_main.c:36:
/workspace/src/sys/dev/ixl/ixl.h:545:8: note: previous declaration of 
'ixl_set_queue_rx_itr' was here
 void   ixl_set_queue_rx_itr(struct ixl_rx_queue *que);
^~~~
In file included from /workspace/src/sys/dev/ixl/ixl_pf_main.c:36:0:
/workspace/src/sys/dev/ixl/ixl_pf.h:404:5: error: redundant redeclaration of 
'ixl_max_aq_speed_to_value' [-Werror=redundant-decls]
 u64 ixl_max_aq_speed_to_value(u8);
 ^
In file included from /workspace/src/sys/dev/ixl/ixl_pf.h:39:0,
 from /workspace/src/sys/dev/ixl/ixl_pf_main.c:36:
/workspace/src/sys/dev/ixl/ixl.h:549:6: note: previous declaration of 
'ixl_max_aq_speed_to_value' was here
 u64  ixl_max_aq_speed_to_value(u8);
  ^
In file included from /workspace/src/sys/dev/ixl/ixl_pf_main.c:39:0:
/workspace/src/sys/dev/ixl/ixl_pf_iov.h:60:7: error: redundant redeclaration of 
'ixl_handle_vflr' [-Werror=redundant-decls]
 void  ixl_handle_vflr(void *arg, int pending);
   ^~~
In file included from /workspace/src/sys/dev/ixl/ixl_pf_main.c:36:0:
/workspace/src/sys/dev/ixl/ixl_pf.h:405:6: note: previous declaration of 
'ixl_handle_vflr' was here
 void ixl_handle_vflr(void *, int);
  ^~~


===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: A head buildworld race visible in the ci.freebsd.org build history

2018-06-19 Thread Mark Millard



On 2018-Jun-19, at 8:02 AM, Li-Wen Hsu  wrote:

> On Mon, Jun 18, 2018 at 8:36 PM Ed Maste  wrote:
>> Li-Wen reported that the build is done in a 11.1-rel jail though, so
>> the libarchive (or any userland) change shouldn't be responsible.
>> 
>> Can we update a canary builder to somewhere between r328278 and r88?
> 
> butler1.nyi.freebsd.org is running r331373 now.


But there seems to be another of the ar -> ranlib failures
after that on butler1.nyi.freebsd.org :

https://ci.freebsd.org/job/FreeBSD-head-powerpc-build/6321/ shows:

22:12:05 
--- _bootstrap-tools-lib/liby ---

22:12:05 
ranlib -D liby.a

22:12:05 
ranlib: fatal: Failed to open 'liby.a'

22:12:05 
*** [liby.a] Error code 70


with:

NODE_LABELS bhyve_host butler1.nyi.freebsd.org jailer jailer_fast
NODE_NAME   butler1.nyi.freebsd.org



And in fact there is at least one more:

https://ci.freebsd.org/job/FreeBSD-head-sparc64-build/8291/consoleText

shows:

--- all_subdir_lib/libipsec ---
ranlib -D libipsec_p.a
ranlib: fatal: Failed to open 'libipsec_p.a'
*** [libipsec_p.a] Error code 70



===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


svn commit: r335399: . . . head/sys/security/mac_veriexec/ . . . breaks ci.freebsg.org builds of FreeBSD-head-{armv6,ar,m7,i386,mips,powerpc,powerpcspe}-build

2018-06-19 Thread Mark Millard
Stephen J. Kiernan stevek at FreeBSD.org 
Wed Jun 20 00:41:33 UTC 2018


Author: stevek
Date: Wed Jun 20 00:41:30 2018
New Revision: 335399
URL: 
https://svnweb.freebsd.org/changeset/base/335399


Log:
  MAC/veriexec implements a verified execution environment using the MAC
  framework.

. . .


But the logs on ci.freebsd.prg show for -r335399 and later for
FreeBSD-head-{armv6,ar,m7,i386,mips,powerpc,powerpcspe}-build
messages like:


--- all_subdir_mac_veriexec ---
cc1: warnings being treated as errors
/usr/src/sys/security/mac_veriexec/veriexec_fingerprint.c: In function 
'identify_error':
/usr/src/sys/security/mac_veriexec/veriexec_fingerprint.c:115: warning: format 
'%lu' expects type 'long unsigned int', but argument 5 has type 'dev_t' 
[-Wformat]
/usr/src/sys/security/mac_veriexec/veriexec_fingerprint.c:115: warning: format 
'%lu' expects type 'long unsigned int', but argument 6 has type 'ino_t' 
[-Wformat]
. . .
--- all_subdir_mac_veriexec ---
*** [veriexec_fingerprint.o] Error code 1

And, as a result, those builds fail on ci.freebsd.org .

Basically the 32-bit architectures fail and the 64-bit
ones do not (for the same code).


I've not checked the later *veriex* related check-ins:

-r335400
-r335401
-r335402

for possible similar problems.

===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: A head buildworld race visible in the ci.freebsd.org build history

2018-06-19 Thread Li-Wen Hsu
On Tue, Jun 19, 2018 at 9:24 PM Mark Millard  wrote:
>
> On 2018-Jun-19, at 8:02 AM, Li-Wen Hsu  wrote:
>
> > On Mon, Jun 18, 2018 at 8:36 PM Ed Maste  wrote:
> >> Li-Wen reported that the build is done in a 11.1-rel jail though, so
> >> the libarchive (or any userland) change shouldn't be responsible.
> >>
> >> Can we update a canary builder to somewhere between r328278 and r88?
> >
> > butler1.nyi.freebsd.org is running r331373 now.
>
>
> But there seems to be another of the ar -> ranlib failures
> after that on butler1.nyi.freebsd.org :

Yes I was trying to narrow down the cause, now it seems between
r328278 and r330304.

butler1.nyi.freebsd.org is back to run r328278.  And I'll try to
reproduce this in elsewhere.

-- 
Li-Wen Hsu 
https://lwhsu.org
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: A head buildworld race visible in the ci.freebsd.org build history

2018-06-19 Thread Mark Millard



On 2018-Jun-19, at 9:14 PM, Li-Wen Hsu  wrote:

> On Tue, Jun 19, 2018 at 9:24 PM Mark Millard  wrote:
>> 
>> On 2018-Jun-19, at 8:02 AM, Li-Wen Hsu  wrote:
>> 
>>> On Mon, Jun 18, 2018 at 8:36 PM Ed Maste  wrote:
 Li-Wen reported that the build is done in a 11.1-rel jail though, so
 the libarchive (or any userland) change shouldn't be responsible.
 
 Can we update a canary builder to somewhere between r328278 and r88?
>>> 
>>> butler1.nyi.freebsd.org is running r331373 now.
>> 
>> 
>> But there seems to be another of the ar -> ranlib failures
>> after that on butler1.nyi.freebsd.org :
> 
> Yes I was trying to narrow down the cause, now it seems between
> r328278 and r330304.
> 
> butler1.nyi.freebsd.org is back to run r328278.  And I'll try to
> reproduce this in elsewhere.

Okay. Then I'll quit looking to report which way butler1.nyi.freebsd.org
is working (implicitly: search direction information).

I will report if I see any new examples. (Seems unlikely.)


Side note . . .

It took me a while to find what to look to find the head version
and jail version involved. For what I reported (powerpc):

22:12:03  uname:
22:12:03  FreeBSD FreeBSD-head-powerpc-build.jail.ci.FreeBSD.org 11.1-RELEASE 
FreeBSD 12.0-CURRENT #0 r330304M: Sat Mar  3 02:23:02 UTC 2018 
pe...@build-12.freebsd.org:/usr/obj/usr/src/sys/CLUSTER12  amd64

Now I know.


===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"