Re: tmpfs deadlock on stable/9

2011-12-08 Thread Dmitry Morozovsky
On Thu, 8 Dec 2011, Dmitry Morozovsky wrote:

   It is available at http://bsd.woozle.net/tmpfs-lock-20111207.txt (~260k)
   
   BTW, at least some of the debugger commands referenced (show locks, show 
   alllocks) are no longer exist
  This means that you do not have witness in your kernel.
  Look at the reference I pointed you once more.
 
 Ah I see, my bad.  I'll test this with WITNESS-enabled kernel tomorrow and 
 return with updated results.

Hmm, I'd rebuilt kernel with WITNESS/WITNESS_SKIPSPIN and can't reproduce this 
deadlock.  Will try further.

-- 
Sincerely,
D.Marck [DM5020, MCK-RIPE, DM3-RIPN]
[ FreeBSD committer: ma...@freebsd.org ]

*** Dmitry Morozovsky --- D.Marck --- Wild Woozle --- ma...@rinet.ru ***

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


WITHOUT_OPENSSH=true in src.conf

2011-12-08 Thread Oliver Brandmueller
Hi,

on my 9.0-PRERELEASE I'm trying to build a system stripped off several 
things from world, I'd rather like to install via ports (bind9, ssh and 
others).

If I put WITHOUT_BIND into src.conf, the world ist built without bind, 
after installworld I can call make delete-old and make 
delete-old-libs and the remains of the base supplied bind get removed, 
thus leaving me with the one I installed from ports.

I tried the same for WITHOUT_OPENSSH. make delete-old(-libs) doesn't 
remove the old ssh related files from the base. The thigs don't get 
build/updated, thus leaving you with old binaries/libs around, the old 
ssh binary taking preference in the default PATH over the one installed 
from ports.


Sure, I can remove the old ones manually or use the overwrite base 
option in the openssh ports, but this seems a POLA violation to me?


- Oliver


-- 
| Oliver Brandmueller  http://sysadm.in/ o...@sysadm.in |
|Ich bin das Internet. Sowahr ich Gott helfe. |
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: tmpfs deadlock on stable/9

2011-12-08 Thread Dmitry Morozovsky
On Thu, 8 Dec 2011, Dmitry Morozovsky wrote:

It is available at http://bsd.woozle.net/tmpfs-lock-20111207.txt (~260k)

BTW, at least some of the debugger commands referenced (show locks, 
show 
alllocks) are no longer exist
   This means that you do not have witness in your kernel.
   Look at the reference I pointed you once more.
  
  Ah I see, my bad.  I'll test this with WITNESS-enabled kernel tomorrow and 
  return with updated results.
 
 Hmm, I'd rebuilt kernel with WITNESS/WITNESS_SKIPSPIN and can't reproduce 
 this 
 deadlock.  Will try further.

On the other hand, after boot I see several LORs:

Dec  8 02:34:18 kern.crit beaver kernel: lock order reversal:
Dec  8 02:34:18 kern.crit beaver kernel: 1st 0xfe005163b818 zfs (zfs) @ 
/usr/src/sys/kern/vfs_mount.c:829
Dec  8 02:34:18 kern.crit beaver kernel: 2nd 0xfe005163cbd8 devfs (devfs) 
@ /usr/src/sys/kern/vfs_subr.c:2166
Dec  8 02:34:18 kern.crit beaver kernel: KDB: stack backtrace:
Dec  8 02:34:18 kern.crit beaver kernel: db_trace_self_wrapper() at 
db_trace_self_wrapper+0x2a
Dec  8 02:34:18 kern.crit beaver kernel: kdb_backtrace() at kdb_backtrace+0x37
Dec  8 02:34:18 kern.crit beaver kernel: _witness_debugger() at 
_witness_debugger+0x2c
Dec  8 02:34:18 kern.crit beaver kernel: witness_checkorder() at 
witness_checkorder+0x651
Dec  8 02:34:18 kern.crit beaver kernel: __lockmgr_args() at 
__lockmgr_args+0xb98
Dec  8 02:34:18 kern.crit beaver kernel: vop_stdlock() at vop_stdlock+0x39
Dec  8 02:34:18 kern.crit beaver kernel: VOP_LOCK1_APV() at VOP_LOCK1_APV+0x46
Dec  8 02:34:18 kern.crit beaver kernel: _vn_lock() at _vn_lock+0x47
Dec  8 02:34:18 kern.crit beaver kernel: vget() at vget+0x56
Dec  8 02:34:18 kern.crit beaver kernel: devfs_allocv() at devfs_allocv+0x13f
Dec  8 02:34:18 kern.crit beaver kernel: devfs_root() at devfs_root+0x4d
Dec  8 02:34:18 kern.crit beaver kernel: vfs_donmount() at vfs_donmount+0xdcb
Dec  8 02:34:18 kern.crit beaver kernel: sys_nmount() at sys_nmount+0x63
Dec  8 02:34:18 kern.crit beaver kernel: amd64_syscall() at 
amd64_syscall+0x25a
Dec  8 02:34:18 kern.crit beaver kernel: Xfast_syscall() at Xfast_syscall+0xf7
Dec  8 02:34:18 kern.crit beaver kernel: --- syscall (378, FreeBSD ELF64, 
sys_nmount), rip = 0x800ab5ecc, rsp = 0x7fffccc8, rbp = 0x801009048 ---
Dec  8 02:34:29 kern.crit beaver kernel: 4-i386.lab.rinet.ru
Dec  8 02:34:32 kern.crit beaver kernel: 6-i386.lab.rinet.ru.
Dec  8 02:41:15 kern.crit beaver kernel: lock order reversal:
Dec  8 02:41:15 kern.crit beaver kernel: 1st 0xfe004ea069f8 tmpfs (tmpfs) 
@ /usr/src/sys/fs/nullfs/null_vnops.c:597
Dec  8 02:41:15 kern.crit beaver kernel: 2nd 0xfe019db46bd8 zfs (zfs) @ 
/usr/src/sys/fs/nullfs/null_vnops.c:597
Dec  8 02:41:15 kern.crit beaver kernel: KDB: stack backtrace:
Dec  8 02:41:15 kern.crit beaver kernel: db_trace_self_wrapper() at 
db_trace_self_wrapper+0x2a
Dec  8 02:41:15 kern.crit beaver kernel: kdb_backtrace() at kdb_backtrace+0x37
Dec  8 02:41:15 kern.crit beaver kernel: _witness_debugger() at 
_witness_debugger+0x2c
Dec  8 02:41:15 kern.crit beaver kernel: witness_checkorder() at 
witness_checkorder+0x651
Dec  8 02:41:15 kern.crit beaver kernel: __lockmgr_args() at 
__lockmgr_args+0xb98
Dec  8 02:41:15 kern.crit beaver kernel: vop_stdlock() at vop_stdlock+0x39
Dec  8 02:41:15 kern.crit beaver kernel: VOP_LOCK1_APV() at VOP_LOCK1_APV+0x46
Dec  8 02:41:15 kern.crit beaver kernel: null_lock() at null_lock+0xbb
Dec  8 02:41:15 kern.crit beaver kernel: VOP_LOCK1_APV() at VOP_LOCK1_APV+0x46
Dec  8 02:41:15 kern.crit beaver kernel: _vn_lock() at _vn_lock+0x47
Dec  8 02:41:15 kern.crit beaver kernel: nullfs_root() at nullfs_root+0x45
Dec  8 02:41:15 kern.crit beaver kernel: vfs_donmount() at vfs_donmount+0xdcb
Dec  8 02:41:15 kern.crit beaver kernel: sys_nmount() at sys_nmount+0x63
Dec  8 02:41:15 kern.crit beaver kernel: amd64_syscall() at 
amd64_syscall+0x25a
Dec  8 02:41:15 kern.crit beaver kernel: Xfast_syscall() at Xfast_syscall+0xf7
Dec  8 02:41:15 kern.crit beaver kernel: --- syscall (378, FreeBSD ELF64, 
sys_nmount), rip = 0x8008a1ecc, rsp = 0x7fffceb8, rbp = 0x7fffcf30 ---
Dec  8 02:41:16 kern.crit beaver kernel: lock order reversal:
Dec  8 02:41:16 kern.crit beaver kernel: 1st 0xfe0171868638 tmpfs (tmpfs) 
@ /usr/src/sys/fs/nullfs/null_vnops.c:597
Dec  8 02:41:16 kern.crit beaver kernel: 2nd 0xfe004ea0ebd8 devfs (devfs) 
@ /usr/src/sys/kern/vfs_subr.c:2166
Dec  8 02:41:16 kern.crit beaver kernel: KDB: stack backtrace:
Dec  8 02:41:16 kern.crit beaver kernel: db_trace_self_wrapper() at 
db_trace_self_wrapper+0x2a
Dec  8 02:41:16 kern.crit beaver kernel: kdb_backtrace() at kdb_backtrace+0x37
Dec  8 02:41:16 kern.crit beaver kernel: _witness_debugger() at 
_witness_debugger+0x2c
Dec  8 02:41:16 kern.crit beaver kernel: witness_checkorder() at 
witness_checkorder+0x651
Dec  8 02:41:16 kern.crit beaver kernel: __lockmgr_args() at 
__lockmgr_args+0xb98
Dec  8 02:41:16 kern.crit beaver kernel: 

FreeBSD 9.0-RC3 Available...

2011-12-08 Thread Ken Smith

The third and what should be final Release Candidate build for the
9.0-RELEASE release cycle is now available.  Since this is the
beginning of a brand new branch (stable/9) I cross-post the
announcements to both -current and -stable.  But just so you know
most of the developers active in head and stable/9 pay more attention
to the -current mailing list.  If you notice problems you can report
them through the normal Gnats PR system or on the -current mailing
list.

This should be the last of the test builds.  We hope to begin the final
release builds in about a week.  The 9.0-RELEASE cycle will be tracked
here:

http://wiki.freebsd.org/Releng/9.0TODO

The location of the FTP install tree and ISOs is the same as it has
been for BETA2/BETA3/RC1/RC2.  The layout to a large degree is being
dictated by the new build infrastructure and installer.  But it's not
particularly well suited to humans so I've added a shorter pathway to
the ISOs.  Unless there are lots of complaints about the layout we'll
stick with this for the release.

ISO images for amd64, i386, ia64, powerpc, powerpc64, and sparc64 are
available here:

  ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/9.0/

That directory is a set of symbolic links to the ISO images for all of
the supported architectures, and checksum files (for example there is
a symlink named CHECKSUM.MD5-amd64 that points to the CHECKSUM.MD5 file
for the amd64 architecture).

MD5/SHA256 checksums are tacked on below.

If you would like to use csup/cvsup mechanisms to access the source
tree the branch tag to use is now RELENG_9_0, if you use . (head)
you will get 10-CURRENT.  If you would like to access the source tree
via SVN it is svn://svn.freebsd.org/base/releng/9.0/.  We still have
the nit that the creation of a new SVN branch winds up causing what
looks like a check-in of the entire tree in CVS (a side-effect of the
svn2cvs exporter) so mergemaster -F is your friend if you are using
csup/cvsup.

FreeBSD Update
--

The freebsd-update(8) utility supports binary upgrades of i386 and amd64 systems
running earlier FreeBSD releases. Systems running 7.[34]-RELEASE,
8.[12]-RELEASE, 9.0-BETA[123], or 9.0-RC[1,2] can upgrade as follows:

First, a minor change must be made to the freebsd-update code in order
for it to accept file names appearing in FreeBSD 9.0 which contain the '%'
and '@' characters; without this change, freebsd-update will error out
with the message The update metadata is correctly signed, but failed an
integrity check.

# sed -i '' -e 's/=_/=%@_/' /usr/sbin/freebsd-update

Now freebsd-update can fetch bits belonging to 9.0-RC3.  During this process
freebsd-update will ask for help in merging configuration files.

# freebsd-update upgrade -r 9.0-RC3

Due to changes in the way that FreeBSD is packaged on the release media, two
complications may arise in this process if upgrading from FreeBSD 7.x or 8.x:
1. The FreeBSD kernel, which previously could appear in either /boot/kernel
or /boot/GENERIC, now only appears as /boot/kernel.  As a result, any kernel
appearing in /boot/GENERIC will be deleted.  Please carefully read the output
printed by freebsd-update and confirm that an updated kernel will be placed
into /boot/kernel before proceeding beyond this point.
2. The FreeBSD source tree in /usr/src (if present) will be deleted.  (Normally
freebsd-update will update a source tree, but in this case the changes in
release packaging result in freebsd-update not recognizing that the source tree
from the old release and the source tree from the new release correspond to the
same part of FreeBSD.)

# freebsd-update install

The system must now be rebooted with the newly installed kernel before the
non-kernel components are updated.

# shutdown -r now

After rebooting, freebsd-update needs to be run again to install the new
userland components:

# freebsd-update install

At this point, users of systems being upgraded from FreeBSD 8.2-RELEASE or
earlier will be prompted by freebsd-update to rebuild all third-party
applications (e.g., ports installed from the ports tree) due to updates in
system libraries.

After updating installed third-party applications (and again, only if
freebsd-update printed a message indicating that this was necessary), run
freebsd-update again so that it can delete the old (no longer used) system
libraries:

# freebsd-update install
Finally, reboot into 9.0-RC3:

Checksums:

MD5 (FreeBSD-9.0-RC3-amd64-bootonly.iso) = 53f2bc5a3d18124769bfb066e921559a
MD5 (FreeBSD-9.0-RC3-amd64-disc1.iso) = b88eca54341523713712b184c6a7fc9a
MD5 (FreeBSD-9.0-RC3-amd64-memstick.img) = a9b58348736d4a7a179941e818d33986

MD5 (FreeBSD-9.0-RC3-i386-bootonly.iso) = 86f0410ffb1c55fcb8faf33814e6e95b
MD5 (FreeBSD-9.0-RC3-i386-disc1.iso) = 3585047256b1b8f72319aa55ffa3c3ad
MD5 (FreeBSD-9.0-RC3-i386-memstick.img) = 8be95b49c498e666f87957a8c10997ce

MD5 (FreeBSD-9.0-RC3-ia64-bootonly.iso) = 7a8e99a61d21ae8a5f6be9fb7f878b11
MD5 (FreeBSD-9.0-RC3-ia64-memstick) =