GENERIC HEAD from , c7f72f27d67-c264590(schedlock), No vmcore GDB: no debug ports present KDB: debugger backends: ddb KDB: current backend: ddb ---<>--- Copyright (c) 1992-2019 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 13.0-CURRENT #0 c7f72f27d67-c264590(schedlock): Sat Nov 23 15:02:07 CET 2019 pho@t2.osted.lan:/var/tmp/object_concurrency/freebsd/sys/amd64/compile/PHO amd64 FreeBSD clang version 9.0.0 (tags/RELEASE_900/final 372316) (based on LLVM 9.0.0) WARNING: WITNESS option enabled, expect reduced performance. WARNING: DIAGNOSTIC option enabled, expect reduced performance. Entering uma_startup with 15 boot pages configured startup_alloc from "UMA Kegs", 13 boot pages left startup_alloc from "UMA Zones", 12 boot pages left startup_alloc from "UMA Zones", 11 boot pages left startup_alloc from "UMA Zones", 10 boot pages left startup_alloc from "UMA Zones", 9 boot pages left startup_alloc from "UMA Zones", 8 boot pages left startup_alloc from "UMA Zones", 7 boot pages left startup_alloc from "UMA Zones", 6 boot pages left startup_alloc from "UMA Zones", 5 boot pages left startup_alloc from "UMA Zones", 4 boot pages left startup_alloc from "UMA Zones", 3 boot pages left startup_alloc from "UMA Zones", 2 boot pages left Entering uma_startup1 with 1 boot pages left Entering uma_startup2 with 1 boot pages left VT(vga): resolution 640x480 CPU: Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz (1995.24-MHz K8-class CPU) Origin="GenuineIntel" Id=0x206d7 Family=0x6 Model=0x2d Stepping=7 Features=0xbfebfbff Features2=0x1fbee3ff AMD Features=0x2c100800 AMD Features2=0x1 XSAVE Features=0x1 VT-x: PAT,HLT,MTF,PAUSE,EPT,UG,VPID TSC: P-state invariant, performance statistics real memory = 68719476736 (65536 MB) avail memory = 66706534400 (63616 MB) : Trying to mount root from ufs:/dev/da0p2 [rw]... WARNING: WITNESS option enabled, expect reduced performance. WARNING: DIAGNOSTIC option enabled, expect reduced performance. Expensive timeout(9) function: 0xffffffff80a396b0(0xffffffff818e5dc8) 0.006695671 s uhub0: 4 ports with 4 removable, self powered uhub2: 2 ports with 2 removable, self powered uhub1: 2 ports with 2 removable, self powered Setting hostuuid: 2bde2bde-f4e2-e111-aab2-001e6756b69b. Setting hostid: 0x0035ff86. WARNING: reducing swap size to maximum of 65536MB per unit Starting file system checks: /dev/da0p2: FILE SYSTEM CLEAN; SKIPPING CHECKS /dev/da0p2: clean, 34965693 free (1238733 frags, 4215870 blocks, 1.3% fragmentation) /dev/ada0p2: FILE SYSTEM CLEAN; SKIPPING CHECKS /dev/ada0p2: clean, 25575781 free (74109 frags, 3187709 blocks, 0.2% fragmentation) /dev/da0p3: FILE SYSTEM CLEAN; SKIPPING CHECKS /dev/da0p3: clean, 24888775 free (11295 frags, 3109685 blocks, 0.0% fragmentation) Mounting local filesystems:. ugen0.2: at usbus0 uhub3 numa-domain 0 on uhub2 uhub3: on usbus0 ugen2.2: at usbus2 uhub4 numa-domain 0 on uhub1 uhub4: on usbus2 ELF ldconfig path: /lib /usr/lib /usr/lib/compat /usr/local/lib /usr/local/lib/compat /usr/local/lib/e2fsprogs /usr/local/lib/gcc8 /usr/local/lib/gcc9 /usr/local/lib/mozjpeg /usr/local/lib/nss /usr/local/lib/perl5/5.30/mach/CORE /usr/local/lib/qt4 /usr/local/lib/qt5 32-bit compatibility ldconfig path: /usr/lib32 /usr/local/lib32/compat Setting hostname: t2.osted.lan. Setting up harvesting: [UMA],[FS_ATIME],SWI,INTERRUPT,NET_NG,[NET_ETHER],NET_TUN,MOUSE,KEYBOARD,ATTACH,CACHED Feeding entropy: uhub3: 6 ports with 6 removable, self powered uhub4: 8 ports with 8 removable, self powered . lo0: link state changed to UP ugen2.3: at usbus2 uhub5 numa-domain 0 on uhub4 uhub5: on usbus2 uhub5: MTT enabled uhub5: 4 ports with 4 removable, self powered ugen2.4: at usbus2 ukbd0 numa-domain 0 on uhub4 ukbd0: on usbus2 kbd2 at ukbd0 Starting Network: lo0 igb0 igb1. lo0: flags=8049 metric 0 mtu 16384 options=680003 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 inet 127.0.0.1 netmask 0xff000000 groups: lo nd6 options=21 igb0: flags=8843 metric 0 mtu 1500 options=4e527bb ether 00:1e:67:56:b6:9b inet 192.168.1.109 netmask 0xffffff00 broadcast 192.168.1.255 inet6 fe80::21e:67ff:fe56:b69b%igb0 prefixlen 64 scopeid 0x1 media: Ethernet autoselect (1000baseT ) status: active nd6 options=23 igb1: flags=8802 metric 0 mtu 1500 options=4e527bb ether 00:1e:67:56:b6:9c media: Ethernet autoselect status: no carrier nd6 options=29 Starting devd. Autoloading module: ioat.ko ioat0: mem 0xd7fa0000-0xd7fa3fff irq 31 at device 4.0 numa-domain 0 on pci0 ioat0: Capabilities: 2f7 ioat1: mem 0xd7f90000-0xd7f93fff irq 39 at device 4.1 numa-domain 0 on pci0 ioat1: Capabilities: 2f7 ioat2: mem 0xd7f80000-0xd7f83fff irq 31 at device 4.2 numa-domain 0 on pci0 ioat2: Capabilities: f7 ioat3: mem 0xd7f70000-0xd7f73fff irq 39 at device 4.3 numa-domain 0 on pci0 ioat3: Capabilities: f7 ioat4: mem 0xd7f60000-0xd7f63fff irq 31 at device 4.4 numa-domain 0 on pci0 ioat4: Capabilities: f7 ioat5: mem 0xd7f50000-0xd7f53fff irq 39 at device 4.5 numa-domain 0 on pci0 ioat5: Capabilities: f7 ioat6: mem 0xd7f40000-0xd7f43fff irq 31 at device 4.6 numa-domain 0 on pci0 ioat6: Capabilities: f7 ioat7: mem 0xd7f30000-0xd7f33fff irq 39 at device 4.7 numa-domain 0 on pci0 ioat7: Capabilities: f7 ioat8: mem 0xfbf70000-0xfbf73fff irq 55 at device 4.0 numa-domain 1 on pci11 ioat8: Capabilities: 2f7 ioat9: mem 0xfbf60000-0xfbf63fff irq 63 at device 4.1 numa-domain 1 on pci11 ioat9: Capabilities: 2f7 ioat10: mem 0xfbf50000-0xfbf53fff irq 55 at device 4.2 numa-domain 1 on pci11 ioat10: Capabilities: f7 ioat11: mem 0xfbf40000-0xfbf43fff irq 63 at device 4.3 numa-domain 1 on pci11 ioat11: Capabilities: f7 ioat12: mem 0xfbf30000-0xfbf33fff irq 55 at device 4.4 numa-domain 1 on pci11 ioat12: Capabilities: f7 ioat13: mem 0xfbf20000-0xfbf23fff irq 63 at device 4.5 numa-domain 1 on pci11 ioat13: Capabilities: f7 ioat14: mem 0xfbf10000-0xfbf13fff irq 55 at device 4.6 numa-domain 1 on pci11 ioat14: Capabilities: f7 ioat15: mem 0xfbf00000-0xfbf03fff irq 63 at device 4.7 numa-domain 1 on pci11 ioat15: Capabilities: f7 Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Starting Network: igb1. igb1: flags=8802 metric 0 mtu 1500 options=4e527bb ether 00:1e:67:56:b6:9c media: Ethernet autoselect status: no carrier nd6 options=29 Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Autoloading module: ioat.ko Configuring vt: keymap. Autoloading module: uhid.ko Autoloading module: ums.ko ums0 numa-domain 0 on uhub4 ums0: on usbus2 ums0: 3 buttons and [Z] coordinates ID=0 add host 127.0.0.1: gateway lo0 fib 0: route already in table add net default: gateway 192.168.1.1 add host ::1: gateway lo0 fib 0: route already in table add net fe80::: gateway ::1 add net ff02::: gateway ::1 add net ::ffff:0.0.0.0: gateway ::1 add net ::0.0.0.0: gateway ::1 Starting rtsold. Creating and/or trimming log files. Starting syslogd. No core dumps found. Starting rpcbind. NFS access cache time=60 Clearing /tmp (X related). Starting nfsuserd. Starting mountd. Starting nfsd. Starting statd. Starting lockd. Recovering vi editor sessions:. Updating motd:. Mounting late filesystems:. Security policy loaded: MAC/ntpd (mac_ntpd) Starting ntpd. Starting powerd. Starting sendmail_submit. Starting sendmail_msp_queue. Performing sanity check on sshd configuration. Starting sshd. Configuring vt: keymap blanktime. Starting cron. Local package initialization: backup. Starting nfscbd. Starting default mousedmoused: unable to open /dev/psm0: No such file or directory . Starting inetd. Sat Nov 23 15:41 FreeBSD/amd64 (t2.osted.lan) (ttyu1) login: Nov 23 15:41:06 t2 su[2644]: pho to root on /dev/pts/0 20191123 15:41:28 all (1/1): tmpfs2.sh newblk leak: 10/24. pts leak: 1/2 20191123 15:42:12 all (1/1): tmpfs2.sh 20191123 15:42:54 all (1/1): tmpfs2.sh 20191123 15:43:37 all (1/1): tmpfs2.sh 20191123 15:44:20 all (1/1): tmpfs2.sh 20191123 15:45:13 all.sh done, elapsed 0 day(s), 00:03.47 20191123 15:47:13 all (1/682): 256m.sh 20191123 15:47:17 all (2/682): fcntl3.sh 20191123 15:47:26 all (3/682): fsck2.sh 20191123 15:47:30 all (4/682): holdcnt04.sh 20191123 15:47:34 all (5/682): ldt2.sh 20191123 15:47:38 all (6/682): linux.sh 20191123 15:47:41 all (7/682): lookup_shared.sh 20191123 15:47:45 all (8/682): mac_chkexec.sh 20191123 15:47:49 all (9/682): mac.sh 20191123 15:47:53 all (10/682): machipc.sh 20191123 15:47:57 all (11/682): machipc2.sh 20191123 15:48:01 all (12/682): md4.sh 20191123 15:48:05 all (13/682): mmap16.sh 20191123 15:48:09 all (14/682): nfs14.sh 20191123 15:48:13 all (15/682): numa.sh 20191123 15:48:16 all (16/682): oom.sh 20191123 15:48:20 all (17/682): pagefault.sh 20191123 15:48:24 all (18/682): parallelmount2.sh 20191123 15:48:28 all (19/682): pathconf2.sh 20191123 15:48:32 all (20/682): pcatch.sh 20191123 15:48:36 all (21/682): pcatch2.sh 20191123 15:48:40 all (22/682): pkru.sh 20191123 15:48:43 all (23/682): pkru2.sh 20191123 15:48:47 all (24/682): pmc6.sh hwpmc: SOFT/16/64/0x67 TSC/1/64/0x20 IAP/4/48/0x3ff IAF/3/48/0x67 lock order reversal: 1st 0xffffffff81c791a8 kernel linker (kernel linker) @ kern/kern_linker.c:1136 2nd 0xffffffff81d9f198 pmc-sx (pmc-sx) @ /var/tmp/object_concurrency/freebsd/sys/dev/hwpmc/hwpmc_mod.c:5783 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80bd2347 at _sx_xlock+0x67 #3 0xffffffff82335486 at load+0x176 #4 0xffffffff80bd5484 at kern_syscall_module_handler+0xb4 #5 0xffffffff80ba6b22 at module_unload+0x32 #6 0xffffffff80b97a0b at linker_file_unload+0x24b #7 0xffffffff80b98dfd at kern_kldunload+0x10d #8 0xffffffff81064850 at amd64_syscall+0x2d0 #9 0xffffffff8103a6f0 at fast_syscall_common+0x101 20191123 15:56:17 all (25/682): procfs6.sh 20191123 15:56:22 all (26/682): procstat.sh 20191123 15:56:26 all (27/682): quota5.sh 20191123 15:56:30 all (28/682): ruby.sh 20191123 15:56:35 all (29/682): schedfuzz.sh 20191123 15:56:39 all (30/682): segregs.sh 20191123 15:56:43 all (31/682): select3.sh 20191123 15:56:48 all (32/682): shm_super.sh 20191123 15:56:52 all (33/682): sigaltstack.sh 20191123 15:56:57 all (34/682): trim8.sh 20191123 15:57:01 all (35/682): random.sh 20191123 15:57:07 all (36/682): trim7.sh 20191123 15:57:11 all (37/682): 1st.sh 20191123 15:57:18 all (38/682): audit.sh 20191123 15:57:24 all (39/682): beneath2.sh lock order reversal: 1st 0xfffff80842c55cc0 ufs (ufs) @ kern/vfs_mount.c:1603 2nd 0xfffff80462911558 devfs (devfs) @ ufs/ffs/ffs_vfsops.c:1404 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9ba38 at lockmgr_lock_fast_path+0x178 #3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #4 0xffffffff80cb5cc5 at _vn_lock+0x65 #5 0xffffffff80edf703 at ffs_flushfiles+0xa3 #6 0xffffffff80ec1b3d at softdep_flushfiles+0xad #7 0xffffffff80ee1ec1 at ffs_unmount+0x71 #8 0xffffffff80c9a159 at dounmount+0x459 #9 0xffffffff80c99cae at sys_unmount+0x2ae #10 0xffffffff81064850 at amd64_syscall+0x2d0 #11 0xffffffff8103a6f0 at fast_syscall_common+0x101 mount leak: 1/65 20191123 15:57:31 all (40/682): beneath3.sh mount leak: 1/66 20191123 15:57:37 all (41/682): buildworld.sh 20191123 15:57:44 all (42/682): buildworld2.sh 20191123 15:57:50 all (43/682): datagram2.sh 20191123 15:57:56 all (44/682): datagram3.sh 20191123 15:58:03 all (45/682): datamove.sh freework leak: 17/42. newblk leak: 6/16. 20191123 15:58:10 all (46/682): datamove3.sh newblk leak: 1/17. 20191123 15:58:17 all (47/682): devfs2.sh 20191123 15:58:23 all (48/682): devfs5.sh 20191123 15:58:29 all (49/682): dtrace_fault.sh 20191123 15:58:36 all (50/682): dumpfs.sh newblk leak: 297/314. mount leak: 1/67 20191123 15:58:43 all (51/682): dup2.sh 20191123 15:58:49 all (52/682): execi386.sh 20191123 15:58:56 all (53/682): extattr_set_fd.sh mount leak: 1/68 20191123 15:59:02 all (54/682): extattrctl.sh 20191123 15:59:09 all (55/682): fifo.sh mount leak: 1/69 20191123 15:59:15 all (56/682): forkbomb.sh 20191123 15:59:22 all (57/682): getrandom.sh 20191123 15:59:28 all (58/682): isofs2.sh mount leak: 1/70 20191123 15:59:35 all (59/682): jail.sh 20191123 15:59:41 all (60/682): jail2.sh 20191123 15:59:48 all (61/682): jail3.sh 20191123 15:59:54 all (62/682): jail4.sh 20191123 16:00:00 all (63/682): kern_umtx_inf_loop.sh 20191123 16:00:07 all (64/682): kevent10.sh 20191123 16:00:14 all (65/682): ldt.sh kernel trap 9 with interrupts disabled kernel trap 9 with interrupts disabled kernel trap 9 with interrupts disabled kernel trap 9 with interrupts disabled kernel trap 9 with interrupts disabled 20191123 16:00:20 all (66/682): maxmemdom.sh 20191123 16:00:27 all (67/682): maxproc.sh 20191123 16:00:33 all (68/682): md6.sh 20191123 16:00:39 all (69/682): mdconfig.sh 20191123 16:00:46 all (70/682): memguard4.sh 20191123 16:00:52 all (71/682): mkfifo5.sh mount leak: 1/71 20191123 16:00:59 all (72/682): mkfifo7.sh mount leak: 17/88 20191123 16:01:05 all (73/682): mlockall5.sh 20191123 16:01:12 all (74/682): mmap.sh 20191123 16:01:18 all (75/682): mmap12.sh 20191123 16:01:25 all (76/682): mmap17.sh 20191123 16:01:31 all (77/682): mmap20.sh 20191123 16:01:38 all (78/682): mmap24.sh 20191123 16:01:45 all (79/682): mmap30.sh 20191123 16:01:51 all (80/682): mmap33.sh 20191123 16:01:58 all (81/682): mmap35.sh 20191123 16:02:04 all (82/682): mmap36.sh 20191123 16:02:10 all (83/682): mount.sh 20191123 16:02:17 all (84/682): mprotect.sh 20191123 16:02:23 all (85/682): msdos2.sh 20191123 16:02:30 all (86/682): msdos3.sh 20191123 16:02:36 all (87/682): msdos7.sh lock order reversal: 1st 0xfffff80462b7b068 msdosfs (msdosfs) @ kern/vfs_syscalls.c:3424 2nd 0xfffff8012b397558 devfs (devfs) @ fs/msdosfs/msdosfs_vnops.c:853 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9ba38 at lockmgr_lock_fast_path+0x178 #3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #4 0xffffffff80cb5cc5 at _vn_lock+0x65 #5 0xffffffff80a89529 at msdosfs_fsync+0x49 #6 0xffffffff810e074a at VOP_FSYNC_APV+0xaa #7 0xffffffff80cb17e9 at kern_fsync+0x199 #8 0xffffffff81064850 at amd64_syscall+0x2d0 #9 0xffffffff8103a6f0 at fast_syscall_common+0x101 20191123 16:02:43 all (88/682): msdos8.sh 20191123 16:02:50 all (89/682): msetdomain.sh 20191123 16:02:56 all (90/682): nanosleep.sh 20191123 16:03:03 all (91/682): nfsdelegation.sh 20191123 16:03:09 all (92/682): nfssillyrename.sh 20191123 16:03:16 all (93/682): nullfs10.sh 20191123 16:03:23 all (94/682): nullfs13.sh 20191123 16:03:29 all (95/682): nullfs14.sh 20191123 16:03:36 all (96/682): nullfs15.sh 20191123 16:03:42 all (97/682): nullfs21.sh 20191123 16:03:49 all (98/682): nullfs4.sh 20191123 16:03:55 all (99/682): nullfs6.sh 20191123 16:04:02 all (100/682): nullfs7.sh 20191123 16:04:09 all (101/682): nullfs9.sh 20191123 16:04:15 all (102/682): pmc4.sh hwpmc: SOFT/16/64/0x67 TSC/1/64/0x20 IAP/4/48/0x3ff IAF/3/48/0x67 20191123 16:04:22 all (103/682): pmc5.sh hwpmc: SOFT/16/64/0x67 TSC/1/64/0x20 IAP/4/48/0x3ff IAF/3/48/0x67 20191123 16:04:29 all (104/682): posix_fadvise.sh 20191123 16:04:35 all (105/682): posix_fadvise2.sh 20191123 16:04:42 all (106/682): procfs5.sh 20191123 16:04:48 all (107/682): ptrace.sh 20191123 16:04:55 all (108/682): ptrace3.sh 20191123 16:05:01 all (109/682): ptrace8.sh 20191123 16:05:09 all (110/682): pts2.sh 20191123 16:05:15 all (111/682): rdgsbase.sh 20191123 16:05:22 all (112/682): rename13.sh 20191123 16:05:28 all (113/682): rename4.sh 20191123 16:05:35 all (114/682): revoke.sh 20191123 16:05:42 all (115/682): rwlock_ronly.sh 20191123 16:05:48 all (116/682): seekdir.sh 20191123 16:05:55 all (117/682): segnp.sh 20191123 16:06:02 all (118/682): sendfile4.sh lock order reversal: 1st 0xfffff808480b3600 so_snd_sx (so_snd_sx) @ kern/uipc_sockbuf.c:390 2nd 0xfffff80462c2b2e0 ufs (ufs) @ kern/kern_sendfile.c:762 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9bbde at lockmgr_slock_hard+0x6e #3 0xffffffff80b9cd02 at __lockmgr_args+0x762 #4 0xffffffff80ee400c at ffs_lock+0x7c #5 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #6 0xffffffff80cb5cc5 at _vn_lock+0x65 #7 0xffffffff80bc5f5a at vn_sendfile+0x6ca #8 0xffffffff80bc7937 at sendfile+0x127 #9 0xffffffff81064850 at amd64_syscall+0x2d0 #10 0xffffffff8103a6f0 at fast_syscall_common+0x101 20191123 16:06:09 all (119/682): sendfile6.sh 20191123 16:06:16 all (120/682): setuid.sh mount leak: 1/89 20191123 16:06:22 all (121/682): sigreturn.sh 20191123 16:06:29 all (122/682): sigstop.sh 20191123 16:06:36 all (123/682): snap12.sh lock order reversal: 1st 0xfffff80842c55cc0 ufs (ufs) @ kern/vfs_mount.c:1603 2nd 0xfffff8005a7c3430 snaplk (snaplk) @ ufs/ffs/ffs_snapshot.c:2131 3rd 0xfffff80462af97d0 ufs (ufs) @ ufs/ffs/ffs_snapshot.c:2132 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9c01f at lockmgr_xlock_hard+0x6f #3 0xffffffff80b9cbad at __lockmgr_args+0x60d #4 0xffffffff80ec0295 at ffs_snapshot_unmount+0x135 #5 0xffffffff80edf6d9 at ffs_flushfiles+0x79 #6 0xffffffff80ec1b3d at softdep_flushfiles+0xad #7 0xffffffff80ee1ec1 at ffs_unmount+0x71 #8 0xffffffff80c9a159 at dounmount+0x459 #9 0xffffffff80c99cae at sys_unmount+0x2ae #10 0xffffffff81064850 at amd64_syscall+0x2d0 #11 0xffffffff8103a6f0 at fast_syscall_common+0x101 mount leak: 1/90 20191123 16:06:43 all (124/682): sndstat.sh 20191123 16:06:49 all (125/682): socketpair.sh 20191123 16:06:56 all (126/682): socketpair2.sh 20191123 16:07:02 all (127/682): suj2.sh mount leak: 1/91 20191123 16:07:09 all (128/682): suj35.sh Nov 23 16:07:13 t2 kernel: pid 79020 (mkdir), uid 0 inumber 255 on /mnt: out of inodes mount leak: 1/92 20191123 16:07:16 all (129/682): suj7.sh Failed to find journal. Use tunefs to create one Failed to start journal: 2 mount leak: 1/93 20191123 16:07:22 all (130/682): tmpfs15.sh mount leak: 1/94 20191123 16:07:29 all (131/682): tmpfs4.sh mount leak: 1/95 20191123 16:07:36 all (132/682): tmpfs6.sh mount leak: 1/96 20191123 16:07:43 all (133/682): tmpfs7.sh mount leak: 1/97 20191123 16:07:50 all (134/682): trim5.sh mount leak: 1/98 20191123 16:07:56 all (135/682): truncate4.sh mount leak: 2/100 20191123 16:08:03 all (136/682): truncate6.sh mount leak: 1/101 20191123 16:08:10 all (137/682): ufssuspend.sh 20191123 16:08:17 all (138/682): uma_zalloc_arg.sh 20191123 16:08:24 all (139/682): unlink.sh 20191123 16:08:30 all (140/682): unload.sh 20191123 16:08:37 all (141/682): unload2.sh 20191123 16:08:44 all (142/682): vfork.sh 20191123 16:08:50 all (143/682): vmio.sh 20191123 16:08:57 all (144/682): watchman.sh 20191123 16:09:03 all (145/682): datagram.sh 20191123 16:09:11 all (146/682): fsck3.sh 20191123 16:09:20 all (147/682): geomleak.sh 20191123 16:09:27 all (148/682): gnop5.sh GEOM_NOP: Device md10.nop created. GEOM_NOP: Device md10.nop removed. GEOM_NOP: Device md10.nop created. GEOM_NOP: Device md10.nop removed. GEOM_NOP: Device md10.nop created. GEOM_NOP: Device md10.nop removed. GEOM_NOP: Device md10.nop created. GEOM_NOP: Device md10.nop removed. GEOM_NOP: Device md10.nop created. GEOM_NOP: Device md10.nop removed. mount leak: 4/105 20191123 16:09:35 all (149/682): kevent3.sh 20191123 16:09:42 all (150/682): killpg.sh 20191123 16:09:50 all (151/682): lockf.sh 20191123 16:09:56 all (152/682): md5.sh 20191123 16:10:03 all (153/682): md9.sh mount leak: 1/106 20191123 16:10:11 all (154/682): mdconfig3.sh 20191123 16:10:18 all (155/682): mmap25.sh 20191123 16:10:26 all (156/682): mmap8.sh 20191123 16:10:33 all (157/682): mmap9.sh 20191123 16:10:41 all (158/682): mountro3.sh newblk leak: 1732/2046. mount leak: 1/107 20191123 16:10:49 all (159/682): nullfs12.sh mount leak: 1/108 20191123 16:10:56 all (160/682): nullfs16.sh mount leak: 1/109 20191123 16:11:04 all (161/682): openlock.sh 20191123 16:11:12 all (162/682): ptrace11.sh 20191123 16:11:19 all (163/682): sendfile.sh 20191123 16:11:27 all (164/682): snap10.sh lock order reversal: 1st 0xfffff80842bbf080 bufwait (bufwait) @ vm/vm_pager.c:386 2nd 0xfffff8005a7c3430 snaplk (snaplk) @ dev/md/md.c:990 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9c01f at lockmgr_xlock_hard+0x6f #3 0xffffffff80b9cbad at __lockmgr_args+0x60d #4 0xffffffff80ee400c at ffs_lock+0x7c #5 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #6 0xffffffff80cb5cc5 at _vn_lock+0x65 #7 0xffffffff806eb669 at mdstart_vnode+0x479 #8 0xffffffff806e936c at md_kthread+0x21c #9 0xffffffff80b86ef0 at fork_exit+0x80 #10 0xffffffff8103ae0e at fork_trampoline+0xe mount leak: 1/110 20191123 16:11:34 all (165/682): spin.sh mount leak: 1/111 20191123 16:11:42 all (166/682): suj32.sh mount leak: 1/112 20191123 16:11:49 all (167/682): suj8.sh Nov 23 16:11:53 t2 kernel: pid 15530 (dd), uid 0 inumber 4 on /mnt: filesystem full Nov 23 16:11:54 t2 kernel: pid 15546 (dd), uid 0 inumber 5 on /mnt: filesystem full mount leak: 2/114 20191123 16:11:57 all (168/682): trim2.sh mount leak: 1/115 20191123 16:12:05 all (169/682): umtx_suspend.sh 20191123 16:12:12 all (170/682): vm_fault_dontneed.sh 20191123 16:12:20 all (171/682): contigmalloc3.sh 20191123 16:12:27 all (172/682): ext2fs3.sh mount leak: 1/116 20191123 16:12:35 all (173/682): extattr3.sh mount leak: 1/117 20191123 16:12:44 all (174/682): fpclone2.sh 20191123 16:12:51 all (175/682): isofs.sh mount leak: 1/118 20191123 16:12:59 all (176/682): mmap23.sh 20191123 16:13:08 all (177/682): mmap26.sh 20191123 16:13:16 all (178/682): mmap28.sh Nov 23 16:13:24 t2 kernel: Failed to fully fault in a core file segment at VA 0x800e00000 with size 0x69d3000 to be written at offset 0x86b000 for process mmap28 20191123 16:13:27 all (179/682): mmap4.sh vnode_pager_putpages: I/O error 28 0xfffff80a586469e0: tag ufs, type VREG usecount 0, writecount 0, refcount 3203 flags (VI_ACTIVE|VI_DOINGINACT) v_object 0xfffff80acd63ce70 ref 0 pages 25608 cleanbuf 3200 dirtybuf 1 lock type ufs: EXCL by thread 0xfffff80086f6e6e0 (pid 28065, mmap4, tid 100879) #0 0xffffffff80b9c3ba at lockmgr_xlock_hard+0x40a #1 0xffffffff80b9cbad at __lockmgr_args+0x60d #2 0xffffffff80ee400c at ffs_lock+0x7c #3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #4 0xffffffff80cb5cc5 at _vn_lock+0x65 #5 0xffffffff80ca32d6 at vputx+0x1b6 #6 0xffffffff80f0b26d at vm_map_process_deferred+0xad #7 0xffffffff80f111fb at vm_map_remove+0xeb #8 0xffffffff80f0ab65 at vmspace_exit+0xd5 #9 0xffffffff80b81af2 at exit1+0x5a2 #10 0xffffffff80b8154d at sys_sys_exit+0xd #11 0xffffffff81064850 at amd64_syscall+0x2d0 #12 0xffffffff8103a6f0 at fast_syscall_common+0x101 nlink=1, effnlink=1, size=104857600, extsize 0 generation=cd526a86, uid=0, gid=0, flags=0x0 ino 4, on dev md10a vnode_pager_putpages: residual I/O 32768 at 9760 0xfffff80a586469e0: tag ufs, type VREG usecount 0, writecount 0, refcount 3203 flags (VI_ACTIVE|VI_DOINGINACT) v_object 0xfffff80acd63ce70 ref 0 pages 25608 cleanbuf 3200 dirtybuf 1 Nov 23 16:13:31 lock type ufs: EXCL by thread 0xfffff80086f6e6e0 (pid 28065, mmap4, tid 100879) t2 kernel: pid 2#0 0xffffffff80b9c3ba at lockmgr_xlock_hard+0x40a 8065 (mmap4), ui#1 0xffffffff80b9cbad at __lockmgr_args+0x60d d 0 inumber 4 on#2 0xffffffff80ee400c at ffs_lock+0x7c /mnt: filesyste#3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 m full #4 0xffffffff80cb5cc5 at _vn_lock+0x65 #5 0xffffffff80ca32d6 at vputx+0x1b6 #6 0xffffffff80f0b26d at vm_map_process_deferred+0xad #7 0xffffffff80f111fb at vm_map_remove+0xeb #8 0xffffffff80f0ab65 at vmspace_exit+0xd5 #9 0xffffffff80b81af2 at exit1+0x5a2 #10 0xffffffff80b8154d at sys_sys_exit+0xd #11 0xffffffff81064850 at amd64_syscall+0x2d0 #12 0xffffffff8103a6f0 at fast_syscall_common+0x101 nlink=1, effnlink=1, size=104857600, extsize 0 generation=cd526a86, uid=0, gid=0, flags=0x0 ino 4, on dev md10a vnode_pager_putpages: zero-length write at 40075264 resid 131072 0xfffff80a586469e0: tag ufs, type VREG usecount 1, writecount 0, refcount 3203 flags (VI_ACTIVE) v_object 0xfffff80acd63ce70 ref 0 pages 25608 cleanbuf 3201 dirtybuf 0 lock type ufs: EXCL by thread 0xfffff809b1882000 (pid 28071, sync, tid 100838) #0 0xffffffff80b9c3ba at lockmgr_xlock_hard+0x40a #1 0xffffffff80b9cbad at __lockmgr_args+0x60d #2 0xffffffff80ee400c at ffs_lock+0x7c Nov 23 16:13:32 #3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 t2 kernel: pid 2#4 0xffffffff80cb5cc5 at _vn_lock+0x65 8071 (sync), uid#5 0xffffffff80ca2929 at vget_finish+0x89 0 inumber 4 on #6 0xffffffff80ca4cc4 at vfs_msync+0x154 /mnt: filesystem#7 0xffffffff80caad65 at sys_sync+0xe5 full #8 0xffffffff81064850 at amd64_syscall+0x2d0 #9 0xffffffff8103a6f0 at fast_syscall_common+0x101 nlink=1, effnlink=1, size=104857600, extsize 0 generation=cd526a86, uid=0, gid=0, flags=0x0 ino 4, on dev md10a vnode_pager_putpages: zero-length write at 40075264 resid 131072 0xfffff80a586469e0: tag ufs, type VREG usecount 1, writecount 0, refcount 3203 flags (VI_ACTIVE) v_object 0xfffff80acd63ce70 ref 0 pages 25608 cleanbuf 3201 dirtybuf 0 lock type ufs: EXCL by thread 0xfffff809b1882000 (pid 28073, umount, tid 100838) #0 0xffffffff80b9c3ba at lockmgr_xlock_hard+0x40a #1 0xffffffff80b9cbad at __lockmgr_args+0x60d #2 0xffffffff80ee400c at ffs_lock+0x7c #3 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #4 0xffffffff80cb5cc5 at _vn_lock+0x65 #5 0xffffffff80ca2929 at vget_finish+0x89 #6 0xffffffff80ca4cc4 at vfs_msync+0x154 #7 0xffffffff80c9a0d9 at dounmount+0x3d9 #8 0xffffffff80c99cae at sys_unmount+0x2ae #9 0xffffffff81064850 at amd64_syscall+0x2d0 #10 0xffffffff8103a6f0 at fast_syscall_common+0x101 nlink=1, effnlink=1, size=104857600, extsize 0 generation=cd526a86, uid=0, gid=0, flags=0x0 ino 4, on dev md10a Nov 23 16:13:34 t2 kernel: pid 28073 (umount), uid 0 inumber 4 on /mnt: filesystem full mount leak: 1/119 20191123 16:13:37 all (180/682): mountro2.sh mount leak: 1/120 20191123 16:13:45 all (181/682): nullfs3.sh mount leak: 1/121 20191123 16:13:53 all (182/682): procfs2.sh 20191123 16:14:01 all (183/682): rename6.sh mount leak: 1/122 20191123 16:14:11 all (184/682): sendfile2.sh lock order reversal: 1st 0xfffff80007e2e040 filedesc structure (filedesc structure) @ kern/sys_generic.c:1516 2nd 0xfffff80734436558 ufs (ufs) @ kern/vfs_vnops.c:1551 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9c01f at lockmgr_xlock_hard+0x6f #3 0xffffffff80b9cbad at __lockmgr_args+0x60d #4 0xffffffff80ee400c at ffs_lock+0x7c #5 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #6 0xffffffff80cb5cc5 at _vn_lock+0x65 #7 0xffffffff80cb477a at vn_poll+0x3a #8 0xffffffff80c3c079 at kern_poll+0x419 #9 0xffffffff80c3bc50 at sys_poll+0x50 #10 0xffffffff81064850 at amd64_syscall+0x2d0 #11 0xffffffff8103a6f0 at fast_syscall_common+0x101 20191123 16:14:18 all (185/682): truncate5.sh mount leak: 1/123 20191123 16:14:27 all (186/682): unix_socket.sh 20191123 16:14:36 all (187/682): datamove4.sh mount leak: 1/124 20191123 16:14:45 all (188/682): extattr.sh mount leak: 1/125 20191123 16:14:54 all (189/682): fcntl.sh pts leak: 1/3 20191123 16:15:04 all (190/682): mkfifo6.sh mount leak: 1/126 20191123 16:15:13 all (191/682): mlockall7.sh 20191123 16:15:22 all (192/682): mountro4.sh mount leak: 3/129 20191123 16:15:32 all (193/682): msdos9.sh 20191123 16:15:42 all (194/682): newfs5.sh mount leak: 1/130 20191123 16:15:51 all (195/682): contigmalloc2.sh 20191123 16:15:58 all (196/682): kevent2.sh 20191123 16:16:08 all (197/682): kevent8.sh mount leak: 1/131 20191123 16:16:19 all (198/682): quota9.sh lock order reversal: 1st 0xfffff80007c3d488 FFS (FFS Lock) @ ufs/ufs/ufs_quota.c:759 2nd 0xfffff80842f36000 struct mount mtx (struct mount mtx) @ ufs/ufs/ufs_quota.c:765 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80ba7904 at __mtx_lock_flags+0x94 #3 0xffffffff80eef77d at quotaoff_inchange+0xbd #4 0xffffffff80edf78d at ffs_flushfiles+0x12d #5 0xffffffff80ec1b3d at softdep_flushfiles+0xad #6 0xffffffff80ee1ec1 at ffs_unmount+0x71 #7 0xffffffff80c9a159 at dounmount+0x459 #8 0xffffffff80c99cae at sys_unmount+0x2ae #9 0xffffffff81064850 at amd64_syscall+0x2d0 #10 0xffffffff8103a6f0 at fast_syscall_common+0x101 mount leak: 1/132 20191123 16:16:29 all (199/682): tmpfs5.sh mount leak: 1/133 20191123 16:16:40 all (200/682): devfd.sh mount leak: 1/134 20191123 16:16:53 all (201/682): dup.sh 20191123 16:17:05 all (202/682): fork.sh 20191123 16:17:17 all (203/682): mlockall4.sh mount leak: 1/135 20191123 16:17:29 all (204/682): mmap13.sh 20191123 16:17:41 all (205/682): nfs15lockd3.sh 20191123 16:17:47 all (206/682): nfs8.sh 20191123 16:17:53 all (207/682): ptrace2.sh 20191123 16:18:06 all (208/682): ptrace9.sh 20191123 16:18:17 all (209/682): snap2-1.sh mount leak: 1/136 20191123 16:18:29 all (210/682): symlink2.sh mount leak: 2/138 20191123 16:18:42 all (211/682): tmpfs10.sh mount leak: 1/139 20191123 16:18:54 all (212/682): truncate7.sh mount leak: 1/140 20191123 16:19:09 all (213/682): pshared.sh 20191123 16:19:25 all (214/682): pthread.sh 20191123 16:19:35 all (215/682): rename11.sh mount leak: 1/141 20191123 16:19:48 all (216/682): symlink4.sh mount leak: 1/142 20191123 16:20:03 all (217/682): truncate3.sh mount leak: 1/143 20191123 16:20:18 all (218/682): linger2.sh Nov 23 16:20:26 t2 kernel: pid 89247 (linger2), uid 1004 inumber 887 on /mnt: filesystem full mount leak: 1/144 20191123 16:20:32 all (219/682): proccontrol.sh 20191123 16:20:46 all (220/682): execve.sh 20191123 16:20:55 all (221/682): linger3.sh mount leak: 1/145 20191123 16:21:12 all (222/682): pmc7.sh hwpmc: SOFT/16/64/0x67 TSC/1/64/0x20 IAP/4/48/0x3ff IAF/3/48/0x67 lock order reversal: 1st 0xffffffff81802480 proctree (proctree) @ /var/tmp/object_concurrency/freebsd/sys/dev/hwpmc/hwpmc_mod.c:2031 2nd 0xfffff80007a50068 ufs (ufs) @ kern/vfs_subr.c:3010 stack backtrace: #0 0xffffffff80c35bb1 at witness_debugger+0x71 #1 0xffffffff80c35921 at witness_checkorder+0xab1 #2 0xffffffff80b9c01f at lockmgr_xlock_hard+0x6f #3 0xffffffff80b9cbad at __lockmgr_args+0x60d #4 0xffffffff80ee400c at ffs_lock+0x7c #5 0xffffffff810e19f2 at VOP_LOCK1_APV+0x92 #6 0xffffffff80cb5cc5 at _vn_lock+0x65 #7 0xffffffff80ca32d6 at vputx+0x1b6 #8 0xffffffff80c8b7c0 at vn_vptocnp+0x250 #9 0xffffffff80c8b127 at vn_fullpath1+0xb7 #10 0xffffffff80c8b480 at vn_fullpath+0xb0 #11 0xffffffff8234071e at pmc_log_process_mappings+0x23e #12 0xffffffff8233ea43 at pmc_syscall_handler+0x1673 #13 0xffffffff81064850 at amd64_syscall+0x2d0 #14 0xffffffff8103a6f0 at fast_syscall_common+0x101 20191123 16:21:27 all (223/682): procfs.sh 20191123 16:21:42 all (224/682): sparse.sh mount leak: 1/146 20191123 16:22:02 all (225/682): thr.sh witness_lock_list_get: witness exhausted 20191123 16:22:17 all (226/682): growfs.sh g_access(997): provider ufsid/5dd94eadb279ce35 has error 6 set g_access(997): provider ufsid/5dd94eadb279ce35 has error 6 set g_access(997): provider ufsid/5dd94eadb279ce35 has error 6 set g_access(997): provider gptid/0b3b545c-0e05-11ea-a930-001e6756b69b has error 6 set g_access(997): provider gptid/0b3b545c-0e05-11ea-a930-001e6756b69b has error 6 set g_access(997): provider gptid/0b3b545c-0e05-11ea-a930-001e6756b69b has error 6 set g_dev_taste: make_dev_p() failed (gp->name=gptid/0b3b545c-0e05-11ea-a930-001e6756b69b, error=17) g_dev_taste: make_dev_p() failed (gp->name=gptid/0b3b545c-0e05-11ea-a930-001e6756b69b, error=17) g_dev_taste: make_dev_p() failed (gp->name=ufsid/5dd94eadb279ce35, error=17) g_dev_taste: make_dev_p() failed (gp->name=gptid/0b3b545c-0e05-11ea-a930-001e6756b69b, error=17) g_dev_taste: make_dev_p() failed (gp->name=ufsid/5dd94eadb279ce35, error=17) g_dev_taste: make_dev_p() failed (gp->name=gptid/0b3b545c-0e05-11ea-a930-001e6756b69b, error=17) g_dev_taste: make_dev_p() failed (gp->name=ufsid/5dd94eadb279ce35, error=17) mount leak: 1/147 GEOM leak: 14/174 20191123 16:22:34 all (227/682): linger4.sh Nov 23 16:22:45 t2 kernel: pid 27395 (linger4), uid 1004 inumber 56480 on /mnt: out of inodes mount leak: 1/148 20191123 16:22:52 all (228/682): shm_open.sh 20191123 16:23:17 all (229/682): sysctl.sh 20191123 16:23:34 all (230/682): tmpfs14.sh mount leak: 1/149 20191123 16:23:51 all (231/682): pipe2.sh 20191123 16:24:09 all (232/682): umountf11.sh mount leak: 1/150 20191123 16:24:28 all (233/682): umountf12.sh mount leak: 1/151 20191123 16:24:46 all (234/682): open.sh 20191123 16:24:52 all (235/682): quota11.sh mount leak: 1/152 20191123 16:25:12 all (236/682): compare.sh 20191123 16:25:32 all (237/682): datamove5.sh mount leak: 1/153 20191123 16:25:47 all (238/682): scp.sh 20191123 16:25:56 all (239/682): sendfile12.sh mount leak: 1/154 20191123 16:26:12 all (240/682): pdfork.sh 20191123 16:26:36 all (241/682): posix_fadvise3.sh 20191123 16:27:01 all (242/682): mountu.sh mount leak: 3/157 20191123 16:27:23 all (243/682): mprotect2.sh 20191123 16:27:51 all (244/682): multicast2.sh Nov 23 16:27:55 t2 mDNSResponder[79382]: mDNSResponder (Engineering Build) (Nov 5 2019 03:51:04) starting Nov 23 16:27:55 t2 mDNSResponder[79382]: mDNS_AddDNSServer: Lock not held! mDNS_busy (0) mDNS_reentrancy (0) if_delmulti_locked: detaching ifnet instance 0xfffff800045d6800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 Expensive timeout(9) function: 0xffffffff80c5ba40(0) 0.012729630 s if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff805a230c800 if_delmulti_locked: detaching ifnet instance 0xfffff800045d6800 Nov 23 16:28:06 t2 mDNSResponder[79382]: mDNSResponder (Engineering Build) (Nov 5 2019 03:51:04) stopping if_delmulti_locked: detaching ifnet instance 0xfffff800045d6800 20191123 16:28:11 all (245/682): procfs3.sh 20191123 16:28:24 all (246/682): rename8.sh mount leak: 1/158 20191123 16:28:49 all (247/682): fsck5.sh mount leak: 1/159 20191123 16:29:17 all (248/682): mountro6.sh mount leak: 1/160 20191123 16:29:43 all (249/682): rename9.sh mount leak: 1/161 20191123 16:30:12 all (250/682): sem.sh 20191123 16:30:39 all (251/682): core4.sh Nov 23 16:30:44 t2 kernel: Failed to write core file for process core4 (error 5) mount leak: 1/162 20191123 16:31:06 all (252/682): ping.sh 20191123 16:31:12 all (253/682): ffs_blkfree.sh newblk leak: 26650/28696. mount leak: 11/173 Nov 23 16:31:03 t2 syslogd: last message repeated 59 times 20191123 16:31:41 all (254/682): snap.sh mount leak: 2/175 20191123 16:32:11 all (255/682): recursiveflushes.sh mount leak: 1/176 20191123 16:32:41 all (256/682): multicast.sh 20191123 16:33:13 all (257/682): credleak.sh mount leak: 162/338 20191123 16:33:55 all (258/682): rdwr.sh 20191123 16:34:30 all (259/682): pread.sh mount leak: 3/341 20191123 16:35:05 all (260/682): sendfile11.sh GEOM_ELI: Device md10.eli created. GEOM_ELI: Encryption: AES-XTS 128 GEOM_ELI: Crypto: software GEOM_ELI: md10 has been killed. GEOM_ELI: Device md10.eli destroyed. mount leak: 1/342 20191123 16:36:03 all (261/682): mmap37.sh mount leak: 1/343 20191123 16:36:44 all (262/682): pthread5.sh 20191123 16:37:24 all (263/682): tcp4.sh Expensive timeout(9) function: 0xffffffff80e04770(0xfffff809b1e23000) 0.014134721 s Expensive timeout(9) function: 0xffffffff80e03830(0xfffff805a2428b70) 0.022812984 s Expensive timeout(9) function: 0xffffffff80e04770(0xfffff8059e7b73d0) 0.095579350 s Expensive timeout(9) function: 0xffffffff80e04770(0xfffff80ba8052000) 0.319604771 s 20191123 16:38:01 all (264/682): fsck4.sh mount leak: 1/344 20191123 16:38:44 all (265/682): umountf.sh mount leak: 1/345 20191123 16:39:24 all (266/682): rename7.sh mount leak: 1/346 20191123 16:40:04 all (267/682): tmpfs2.sh 20191123 16:40:42 all (268/682): nfs12.sh 20191123 16:40:48 all (269/682): sendfile5.sh newblk leak: 4098/32794. mount leak: 3/349 20191123 16:41:35 all (270/682): suj14.sh Nov 23 16:42:10 t2 kernel: pid 50870 (cp), uid 0 inumber 39924 on /mnt: filesystem full Nov 23 16:42:10 t2 kernel: pid 50888 (cp), uid 0 inumber 171132 on /mnt: filesystem full Nov 23 16:42:11 t2 kernel: pid 50912 (cp), uid 0 inumber 171132 on /mnt: filesystem full Nov 23 16:42:13 t2 kernel: pid 50936 (cp), uid 0 inumber 171132 on /mnt: filesystem full Nov 23 16:42:14 t2 kernel: pid 50960 (cp), uid 0 inumber 171132 on /mnt: filesystem full mount leak: 1/350 20191123 16:42:18 all (271/682): mkfifo3.sh 20191123 16:43:05 all (272/682): mmap18.sh 20191123 16:44:52 all (273/682): radix.sh Nov 23 16:45:03 t2 kernel: pid 87800 (radix), jid 0, uid 0, was killed: out of swap space 20191123 16:45:28 all (274/682): swap4.sh Nov 23 16:46:33 t2 kernel: pid 90303 (swap4), jid 0, uid 0, was killed: out of swap space Nov 23 17:01:09 t2 su[91141]: pho to root on /dev/pts/2 FreeBSD/amd64 (t2.osted.lan) (ttyu1) login: root Password: Nov 23 17:03:24 t2 login[2642]: ROOT LOGIN (root) ON ttyu1 Last login: Sat Nov 23 08:56:30 on ttyu1 FreeBSD 13.0-CURRENT (PHO) #0 c7f72f27d67-c264590(schedlock): Sat Nov 23 15:02:07 CET 2019 Welcome to FreeBSD! Release Notes, Errata: https://www.FreeBSD.org/releases/ Security Advisories: https://www.FreeBSD.org/security/ FreeBSD Handbook: https://www.FreeBSD.org/handbook/ FreeBSD FAQ: https://www.FreeBSD.org/faq/ Questions List: https://lists.FreeBSD.org/mailman/listinfo/freebsd-questions/ FreeBSD Forums: https://forums.FreeBSD.org/ Documents installed with the system are in the /usr/local/share/doc/freebsd/ directory, or can be installed later with: pkg install en-freebsd-doc For other languages, replace "en" with a language code like de or fr. Show the version of FreeBSD installed: freebsd-version ; uname -a Please include that output and any error messages when posting questions. Introduction to manual pages: man man FreeBSD directory layout: man hier Edit /etc/motd.template to change this login announcement. You have new mail. 78root@t2:~ # pgrep swap4 | xargs ps -lp UID PID PPID CPU PRI NI VSZ RSS MWCHAN STAT TT TIME COMMAND 0 90300 89101 0 30 0 10752 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90302 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90303 90300 0 20 -20 0 0 - Z<+ 0 0:06.62 0 90304 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90305 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90306 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90307 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90308 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90309 90300 0 52 0 7356932 0 - WW+ 0 0:00.00 /tmp/swap4 17969739 0 90310 90300 0 37 0 7356936 7343984 nanslp S+ 0 0:34.80 /tmp/swap4 17969739 0 90311 90300 0 37 0 7356936 7343408 nanslp S+ 0 0:41.64 /tmp/swap4 17969739 root@t2:~ # procstat -k 90300 PID TID COMNMI/cpu0 ... going to debugger M TDNAME KSTACK timeout stopping cpus K[K DDBtB:: KhssDrttBeaa:adcc kksp b tiabadcac kckk1tt 1rrb aaatcecci:ekd:t r1 0 a00d0cb3de_ b:t _r : : 8wp,r7 pf0+uf0excdf0 rpi190frs00 ea+dlftx 3 f06 a 20g==1r2ft xfx595s_hb0+1 ofl rxe02wfra0ot0n8a0rem0 ,g dx 1e2asae tbbpe1rpkdfs0jpmc 39d si0/5/Copyright(c) 2009 - 2012 Intel Corporation.All rights reserved. Version 2.00.1201.Copyright(c) 2010 - 2012 American Megatrends,Inc. Installed BIOS: SE5C600.86B.01.08.0003 Platform ID: W2600CR $ svnlite diff -x -p /var/tmp/object_concurrency/freebsd/sys commit c7f72f27d67aab9f61923f59a772b948f8530e49 (HEAD -> schedlock) Author: Peter Holm Date: Sat Nov 23 09:59:19 2019 +0100 Revert "Experimental object reference changes" This reverts commit 25f72e9d23cdd3677d8612c7ff5f1ff8f839c367. diff --git a/sys/sys/refcount.h b/sys/sys/refcount.h index 4781648fa15..3aec15e178c 100644 --- a/sys/sys/refcount.h +++ b/sys/sys/refcount.h @@ -72,7 +72,7 @@ refcount_init(volatile u_int *count, u_int value) *count = value; } -- Test scenario: misc/swap4.sh