Re: Status of PCIe Hotplug?

2016-09-28 Thread Jan Henrik Sylvester
On 09/27/2016 17:51, Eric van Gyzen wrote:
> In the case of Jan's USB 3.0 ExpressCard, it's possible that one or all
> of the USB controller drivers (xhci, ehci, uhci) didn't cope with the
> surprise removal of the controller.  Before removing the card, try
> detaching the driver(s) with "devctl detach xhciN".  There might be more
> than one device.  Use "pciconf -lc" to find the HotPlug-capable pcib
> devices (bridges).  Use devinfo to find which one is your ExpressCard
> slot and find all the devices attached to it.  Then use devctl to detach
> the devices.  There could be a tree of devices; in that case, you can
> usually start at the level immediately under pcibN; you don't need to
> detach every device from the bottom up.  Once all the devices are
> detached, you should be able to remove the card safely.

Doing "devctl detach xhci0" before the removal of the USB 3.0
ExpressCard, there is no panic, the device gets deattached properly, and
I can reconnect it later.

Anyhow, because the mechanism holding the ExpressCard is not completely
reliable, on the third time inserting the card, it did not hold and I
got a panic, because it was immediately ejected without devctl detach.

Due to the card not holding firmly, I often pulled it together with the
usb device on 10.3-RELEASE and never got a panic. I guess it is a
regression in the usb driver dealing with sudden loss of the device.

The panic message is below, I guess I should take this discussion to
freebsd-usb@, CCed.

Thanks,
Jan Henrik


Fatal trap 9: general protection fault while in kernel mode
cpuid = 1; acpic id = 01
instruction pointer = 0x20:0x80b1549c
stack pointer   = 0x28:0xfe022f62ca00
frame pointer   = 0x28:0xfe022f62ca70
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 14 (usbus1)
trap number = 9
panic: general protection fault
cpuid = 1
KDB: stack backtrace:
#0 0x80b24077 at kdb_backtrace+0x67
#1 0x80ad93e2 at vpanic+0x182
#2 0x80ad9253 at panic+0x43
#3 0x80fa0d31 at trap_fatal+0x351
#4 0x80fa09c8 at trap+0x768
#5 0x80f84141 at calltrap+0x8
#6 0x808f2f63 at usb_detach_device+0xf3
#7 0x808f1d5b at usb_unconfigure+0x2b
#8 0x808f5623 at usb_free_device+0x103
#9 0x808f58b1 at usb_bus_detach+0x161
#10 0x80903e95 at usb_process+0x125
#11 0x80a90055 at fork_exit+0x85
#12 0x80f8467e at fork_trampoline+0xe
Uptime: 18m27s
Automatic reboot in 15 seconds - press a key on the console to abort

___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Status of PCIe Hotplug?

2016-09-28 Thread Hans Petter Selasky

Hi,

Can you compile your kernel with debugging enabled so that we get the 
sourcelines in the dump below. Also please include some parts of the 
preceeding dmesg.


Do you have USB compiled into the kernel or loaded as a module?

What does kldstat output after you plug the card?

What is the dmesg leading up to this?

The bug looks like some .ko was unloaded too early, due to refcounts 
dropping incorrectly.


--HPS




Fatal trap 9: general protection fault while in kernel mode
cpuid = 1; acpic id = 01
instruction pointer = 0x20:0x80b1549c
stack pointer   = 0x28:0xfe022f62ca00
frame pointer   = 0x28:0xfe022f62ca70
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 14 (usbus1)
trap number = 9
panic: general protection fault
cpuid = 1
KDB: stack backtrace:
#0 0x80b24077 at kdb_backtrace+0x67
#1 0x80ad93e2 at vpanic+0x182
#2 0x80ad9253 at panic+0x43
#3 0x80fa0d31 at trap_fatal+0x351
#4 0x80fa09c8 at trap+0x768
#5 0x80f84141 at calltrap+0x8
#6 0x808f2f63 at usb_detach_device+0xf3
#7 0x808f1d5b at usb_unconfigure+0x2b
#8 0x808f5623 at usb_free_device+0x103
#9 0x808f58b1 at usb_bus_detach+0x161
#10 0x80903e95 at usb_process+0x125
#11 0x80a90055 at fork_exit+0x85
#12 0x80f8467e at fork_trampoline+0xe
Uptime: 18m27s
Automatic reboot in 15 seconds - press a key on the console to abort


___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Status of PCIe Hotplug?

2016-09-28 Thread Borja Marcos

> On 27 Sep 2016, at 17:51, Eric van Gyzen  wrote:
> 
> 
> To my knowledge, all the necessary PCIe-layer code is present.  However,
> that's just one layer:  Many drivers will likely need changes in order
> to cope with surprise removal of their devices.

Thank you very much, that’s what I needed to know :) I saw that the bits were
indeed present, but I was wondering wether I should expect it to work or not.

> For that reason, HotPlug needs a lot of testing on a variety of
> platforms.  The FreeBSD developer base is much smaller than its user
> base, of course, so the variety of our testing is rather limited.  You
> can help immensely by giving us detailed bug reports, either on a
> mailing list or in Bugzilla.  For a panic, the panic messages and stack
> trace of the current thread will be very helpful.  Complete crashinfo(8)
> output would be great.

Of course. Unfortunately, due to poor timing and a DOA server last month, this
server is in a countdown to get into production tomorrow running Solaris, but 
I’ll try
to get whatever I can today.

Thanks!





Borja.

___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

Re: 11.0 stuck on high network load

2016-09-28 Thread Julien Charbon

 Hi Slawa,

On 9/26/16 7:22 PM, Slawa Olhovchenkov wrote:
> On Mon, Sep 26, 2016 at 11:33:12AM +0200, Julien Charbon wrote:
>> On 9/25/16 2:46 PM, Slawa Olhovchenkov wrote:
>>> On Fri, Sep 23, 2016 at 11:01:43PM +0300, Slawa Olhovchenkov wrote:
> On 9/21/16 9:51 PM, Slawa Olhovchenkov wrote:
>> On Wed, Sep 21, 2016 at 09:11:24AM +0200, Julien Charbon wrote:
>>>  You can also use Dtrace and lockstat (especially with the lockstat -s
>>> option):
>>>
>>> https://wiki.freebsd.org/DTrace/One-Liners#Kernel_Locks
>>> https://www.freebsd.org/cgi/man.cgi?query=lockstat&manpath=FreeBSD+11.0-RELEASE
>>>
>>>  But I am less familiar with Dtrace/lockstat tools.
>>
>> I am still use old kernel and got lockdown again.
>> Try using lockstat (I am save more output), interesting may be next:
>>
>> R/W writer spin on writer: 190019 events in 1.070 seconds (177571 
>> events/sec)
>>
>> ---
>> Count indv cuml rcnt nsec Lock   Caller  
>> 
>> 140839  74%  74% 0.0024659 tcpinp 
>> tcp_tw_2msl_scan+0xc6   
>>
>>   nsec -- Time Distribution -- count Stack   
>> 
>>   4096 |   913   tcp_twstart+0xa3
>> 
>>   8192 |   58191 
>> tcp_do_segment+0x201f   
>>  16384 |@@ 29594 tcp_input+0xe1c 
>> 
>>  32768 |   23447 ip_input+0x15f  
>> 
>>  65536 |@@@16197 
>> 131072 |@  8674  
>> 262144 |   3358  
>> 524288 |   456   
>>1048576 |   9 
>> ---
>> Count indv cuml rcnt nsec Lock   Caller  
>> 
>> 49180  26% 100% 0.0015929 tcpinp 
>> tcp_tw_2msl_scan+0xc6   
>>
>>   nsec -- Time Distribution -- count Stack   
>> 
>>   4096 |   157   pfslowtimo+0x54 
>> 
>>   8192 |@@@24796 
>> softclock_call_cc+0x179 
>>  16384 |@@ 11223 softclock+0x44  
>> 
>>  32768 |   7426  
>> intr_event_execute_handlers+0x95
>>  65536 |@@ 3918  
>> 131072 |   1363  
>> 262144 |   278   
>> 524288 |   19
>> ---
>
>  This is interesting, it seems that you have two call paths competing
> for INP locks here:
>
>  - pfslowtimo()/tcp_tw_2msl_scan(reuse=0) and
>
>  - tcp_input()/tcp_twstart()/tcp_tw_2msl_scan(reuse=1)

 My current hypothesis:

 nginx do write() (or may be close()?) to socket, kernel lock
 first inp in V_twq_2msl, happen callout for pfslowtimo() on the same
 CPU core and tcp_tw_2msl_scan infinity locked on same inp.

 In this case you modification can't help, before next try we need some
 like yeld().
>>>
>>> Or may be locks leaks.
>>> Or both.
>>
>>  You are totally right, pfslowtimo()/tcp_tw_2msl_scan(reuse=0) is
>> infinitely blocked on INP_WLOCK() by "something" (that could be related
>> to write()).
>>
>>  As I reached my limit of debugging without WITNESS, could you share
>> your /etc/sysctl.conf, /boot/loader.conf files?  And any specific
>> configuration you have (like having a Nginx workers affinity, Nginx
>> special options, etc.).  Like that I can try to reproduce it on releng/11.0.
> 
> Some more traces from ddb:
> 
> Tracing command intr pid 12 tid 100103 td 0xf8012508ea00
> sched_switch() at 0x804c956d = sched_switch+0x6ad/frame 
> 0xfe2020ea8330
> mi_switch() at 0x804a8d92 = mi_switch+0xd2/frame 0xfe2020ea8360
> turnstile_wait() at 0x804ef177 = turnstile_wait+0x2a7/frame 
> 0xfe2020ea83a0
> __mtx_lock_sleep() at 0x80484d9d = __mtx_lock_sleep+0x13d/frame 
> 0xfe2020ea8420
> sodealloc() at 0x8051b992 = sodealloc+0x32/frame 0xfe2020ea8460
> tcp_close() at 0x80618150 = tcp_close+0xd0/frame 0xfe2020ea8490
> tcp_do_segment() at 0x80610226 = tcp_do_segment+0x1666/frame 
> 0xfe2020ea8590
> tcp_input() at 0x8060e17c = tcp_input+0xe1c/frame 0xfe2020ea86e0
> ip_input() at 0x805a087f = ip_input+0x15f/frame 0xfe20

Re: 11.0 stuck on high network load

2016-09-28 Thread Slawa Olhovchenkov
On Wed, Sep 28, 2016 at 12:06:47PM +0200, Julien Charbon wrote:

> > Tracing command intr pid 12 tid 100026 td 0xf8011424b500
> > sched_switch() at 0x804c956d = sched_switch+0x6ad/frame 
> > 0xfe3876f0
> > mi_switch() at 0x804a8d92 = mi_switch+0xd2/frame 0xfe387720
> > critical_exit() at 0x804a6bee = critical_exit+0x7e/frame 
> > 0xfe387740
> > ipi_bitmap_handler() at 0x80775629 = ipi_bitmap_handler+0x79/frame 
> > 0xfe387780
> > Xipi_intr_bitmap_handler() at 0x806cc15e = 
> > Xipi_intr_bitmap_handler+0x8e/frame 0xfe387780
> > --- interrupt, rip = 0x80484c1f, rsp = 0xfe387850, rbp = 
> > 0xfe387850 ---
> > __mtx_lock_flags() at 0x80484c1f = __mtx_lock_flags+0x2f/frame 
> > 0xfe387850
> > sodealloc() at 0x8051b992 = sodealloc+0x32/frame 0xfe387890
> > tcp_close() at 0x80618150 = tcp_close+0xd0/frame 0xfe3878c0
> > tcp_timer_2msl() at 0x8061dda3 = tcp_timer_2msl+0x1f3/frame 
> > 0xfe3878f0
> > softclock_call_cc() at 0x804b4ca9 = softclock_call_cc+0x179/frame 
> > 0xfe3879c0
> > softclock() at 0x804b5034 = softclock+0x44/frame 0xfe3879e0
> > intr_event_execute_handlers() at 0x8046c605 = 
> > intr_event_execute_handlers+0x95/frame 0xfe387a20
> > ithread_loop() at 0x8046cc26 = ithread_loop+0xa6/frame 
> > 0xfe387a70
> > fork_exit() at 0x8046a211 = fork_exit+0x71/frame 0xfe387ab0
> > fork_trampoline() at 0x806cb50e = fork_trampoline+0xe/frame 
> > 0xfe387ab0
> > --- trap 0, rip = 0, rsp = 0, rbp = 0 ---
> 
>  Nice stack traces, all threads are blocked in sodealloc() or soalloc()
> and if you look at how mtx_lock(&so_global_mtx) and
> mtx_unlock(&so_global_mtx) are used, it is hard to think about a
> scenario that can lead to this state.
> 
>  I am still trying to reproduce your issue, without success so far.

May be some hardware-related (low-speed CPU?).
Yesternight I am collect new stack traces and kernel dump.
May be I can see something?

db> ps
  pid  ppid  pgrp   uid   state   wmesg wchancmd
   12 0 0 0  RL  (threaded)  [intr]
100023   RunQ[swi4: clock (8)]
100107   Run CPU 8   [irq291: ix0:q2]
   11 0 0 0  RL  (threaded)  [idle]
100011   CanRun  [idle: cpu8]

cpuid= 8
dynamic pcpu = 0xfe201d69cf00
curthread= 0xf8012508d500: pid 12 "irq291: ix0:q2"
curpcb   = 0xfe2020ebcb80
fpcurthread  = none
idlethread   = 0xf8011422c500: tid 100011 "idle: cpu8"
curpmap  = 0x80d49998
tssp = 0x80d7fcd0
commontssp   = 0x80d7fcd0
rsp0 = 0xfe2020ebcb80
gs32p= 0x80d86528
ldt  = 0x80d86568
tss  = 0x80d86558


Tracing command nginx pid 1061 tid 101747 td 0xf8014b35b500
sched_switch() at 0x804c956d = sched_switch+0x6ad/frame 
0xfe2021b70330
mi_switch() at 0x804a8d92 = mi_switch+0xd2/frame 0xfe2021b70360
turnstile_wait() at 0x804ef177 = turnstile_wait+0x2a7/frame 
0xfe2021b703a0
__rw_wlock_hard() at 0x8049c314 = __rw_wlock_hard+0x94/frame 
0xfe2021b70430
in_lltable_lookup() at 0x80594823 = in_lltable_lookup+0x83/frame 
0xfe2021b70450
arpresolve() at 0x8058d2aa = arpresolve+0x9a/frame 0xfe2021b704b0
ether_output() at 0x805755e2 = ether_output+0x2f2/frame 
0xfe2021b70550
ip_output() at 0x805a4200 = ip_output+0x1390/frame 0xfe2021b706b0
tcp_output() at 0x806149d5 = tcp_output+0x17a5/frame 0xfe2021b70850
tcp_usr_disconnect() at 0x80620094 = tcp_usr_disconnect+0x74/frame 
0xfe2021b70880
soclose() at 0x8051c238 = soclose+0x38/frame 0xfe2021b708b0
_fdrop() at 0x8045639a = _fdrop+0x1a/frame 0xfe2021b708d0
closef() at 0x80458a53 = closef+0x1e3/frame 0xfe2021b70960
closefp() at 0x804567ad = closefp+0x7d/frame 0xfe2021b709a0
amd64_syscall() at 0x806e4051 = amd64_syscall+0x2c1/frame 
0xfe2021b70ab0
Xfast_syscall() at 0x806cb2bb = Xfast_syscall+0xfb/frame 
0xfe2021b70ab0
--- syscall (6, FreeBSD ELF64, sys_close), rip = 0x8019dbeaa, rsp = 
0x7fffe6a8, rbp = 0x7fffe6c0 ---

Tracing command nginx pid 1060 tid 101749 td 0xf80126a53a00
sched_switch() at 0x804c956d = sched_switch+0x6ad/frame 
0xfe2021b7a240
mi_switch() at 0x804a8d92 = mi_switch+0xd2/frame 0xfe2021b7a270
turnstile_wait() at 0x804ef177 = turnstile_wait+0x2a7/frame 
0xfe2021b7a2b0
__rw_wlock_hard() at 0x8049c314 = __rw_wlock_hard+0x94/frame 
0xfe2021b7a340
in_lltable_lookup() at 0x80594823 = in_lltable_lookup+0x83/frame 
0xfe2

Faça sua Pós-Graduação na Faculdade SENAI – Últimos dias

2016-09-28 Thread FIERGS | FATEC - Faculdade SENAI de Tecnologia

___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


[HEADS-UP] 11.0-RELEASE status update

2016-09-28 Thread Glen Barber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear FreeBSD Community:

Although the FreeBSD 11.0-RELEASE has not yet been officially announced,
many have found images on the Project FTP mirrors.

However, please be aware the final 11.0-RELEASE will be rebuilt and
republished on the Project mirrors as a result of a few last-minute
security fixes we feel are imperative to include in the final release.

FreeBSD users already running 11.0-RELEASE will be given instructions on
how to safely upgrade systems to the 11.0-RELEASE-p1 in the final
announcement email.  Those building from source code can obtain the
latest security updates from the releng/11.0 branch in Subversion:

svn://svn.freebsd.org/base/releng/11.0

As the FreeBSD Project strives to provide the best possible product, the
Release Engineering team decided to build an updated release to include
the fixes.  At present, we expect to have the final release available
Wednesday, October 3rd.  If you have not yet downloaded 11.0-RELEASE,
please wait for the official release announcement.

Thank you in advance for your patience waiting for 11.0-RELEASE, and of
course for understanding the reasons behind the updated release.

Glen
On behalf of:   re@

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=t8IC
-END PGP SIGNATURE-
___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


[REVISED] [HEADS-UP] 11.0-RELEASE status update

2016-09-28 Thread Glen Barber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear FreeBSD Community:

[Corrected the date.]

Although the FreeBSD 11.0-RELEASE has not yet been officially announced,
many have found images on the Project FTP mirrors.

However, please be aware the final 11.0-RELEASE will be rebuilt and
republished on the Project mirrors as a result of a few last-minute
security fixes we feel are imperative to include in the final release.

FreeBSD users already running 11.0-RELEASE will be given instructions on
how to safely upgrade systems to the 11.0-RELEASE-p1 in the final
announcement email.  Those building from source code can obtain the
latest security updates from the releng/11.0 branch in Subversion:

svn://svn.freebsd.org/base/releng/11.0

As the FreeBSD Project strives to provide the best possible product, the
Release Engineering team decided to build an updated release to include
the fixes.  At present, we expect to have the final release available
Wednesday, October 5th.  If you have not yet downloaded 11.0-RELEASE,
please wait for the official release announcement.

Thank you in advance for your patience waiting for 11.0-RELEASE, and of
course for understanding the reasons behind the updated release.

Glen
On behalf of:   re@

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=RcJK
-END PGP SIGNATURE-
___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


RE: [REVISED] [HEADS-UP] 11.0-RELEASE status update

2016-09-28 Thread Alexander Shitov
Will final 11.0-RELEASE include fixes related to broken Hyper-V compatibility?
11.0-RC2, 11.0-RC3 and non-final 11.0-RELEASE failed to install on
Hyper-V 2012 R2 with all current updates.

storvsc0:  on vmbus0
(probe0:blkvsc0:0:0:0): storvsc scsi_status = 2
(probe0:blkvsc0:0:1:1): invalid LUN 1
...
(probe0:blkvsc0:0:0:1): invalid LUN 1
da0 at blkvsc0 bus 0 scbus1 target 0 lun 0
da0: 
da0 at blkvsc0 bus 0 scbus1 target 0 lun 0
da0:  detached

Problem documented in PR
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212721

---
Regards,
Alexander
___
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"