In message <[EMAIL PROTECTED]>, Robe
rt Watson writes:
>
>While debugging the recent pthreads problem, I've started running into
>this:
>
>pid 663 (test), uid 1000: exited on signal 10 (core dumped)
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()

I can't remember how I triggered this, but I have personally
run with this patch for some time:

(NB: Cut&Paste)

Index: kern/subr_trap.c
===================================================================
RCS file: /home/ncvs/src/sys/kern/subr_trap.c,v
retrieving revision 1.239
diff -u -r1.239 subr_trap.c
--- kern/subr_trap.c    28 Dec 2002 01:23:07 -0000      1.239
+++ kern/subr_trap.c    28 Dec 2002 09:05:22 -0000
@@ -74,6 +74,7 @@
 {
        struct proc *p = td->td_proc;
        struct kse *ke = td->td_kse; 
+       static int enough;
 
        CTR3(KTR_SYSC, "userret: thread %p (pid %d, %s)", td, p->p_pid,
             p->p_comm);
@@ -84,7 +85,8 @@
        mtx_lock_spin(&sched_lock);
        if (SIGPENDING(p) && ((p->p_sflag & PS_NEEDSIGCHK) == 0 ||
            (td->td_kse->ke_flags & KEF_ASTPENDING) == 0))
-               printf("failed to set signal flags properly for ast()\n");
+               if (++enough < 10)
+                       printf("failed to set signal flags properly for ast()\n");
        mtx_unlock_spin(&sched_lock);
        PROC_UNLOCK(p);
        mtx_unlock(&Giant);
-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED]         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to