On 25.1.2017. 7:32, Martin Pieuchot wrote: > I just enabled the NET_LOCK() again and I'm looking for test reports. > Please go build a kernel from sources or wait for the next snapshot, > run it and report back. > > If you're looking for some small coding tasks related to the NET_LOCK() > just do: > > # sysctl kern.splassert=2 > # sysctl kern.pool_debug=2 > > Then watch for the traces on your console.
Hi, i'm sending traces from firewall updated few minutes: on that firewall i have: carp pf pfsync isakmpd -K4 sasyncd dhcpd dhcpd sync tcpdump -lnqttti pflog0 pflow ipfix carp2: state transition: MASTER -> BACKUP splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac pool_get() at pool_get+0x1ca srp_v_gc_start() at srp_v_gc_start+0x55 rtable_mpath_reprio() at rtable_mpath_reprio+0x14c rt_if_linkstate_change() at rt_if_linkstate_change+0x10d rtable_walk_helper() at rtable_walk_helper+0x5e art_walk_apply() at art_walk_apply+0x40 art_table_walk() at art_table_walk+0x117 art_table_walk() at art_table_walk+0x145 art_table_walk() at art_table_walk+0x145 art_table_walk() at art_table_walk+0x145 art_table_walk() at art_table_walk+0x145 art_table_walk() at art_table_walk+0x145 art_table_walk() at art_table_walk+0x145 art_walk() at art_walk+0xe4 rtable_walk() at rtable_walk+0x62 rt_if_track() at rt_if_track+0x6f if_linkstate() at if_linkstate+0x67 if_linkstate_task() at if_linkstate_task+0x3d taskq_thread() at taskq_thread+0x6c end trace frame: 0x0, count: 237 End of stack trace. splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac pool_get() at pool_get+0x1ca m_get() at m_get+0x28 ip_ctloutput() at ip_ctloutput+0x4bf sogetopt() at sogetopt+0x7e sys_getsockopt() at sys_getsockopt+0xbf syscall() at syscall+0x27b --- syscall (number 118) --- end of kernel end trace frame: 0x3, count: 250 0x1b14ee7fed7a: End of stack trace. splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac malloc() at malloc+0x406 ifmedia_ioctl() at ifmedia_ioctl+0x178 bnx_ioctl() at bnx_ioctl+0x144 ifioctl() at ifioctl+0x3e2 soo_ioctl() at soo_ioctl+0x22d sys_ioctl() at sys_ioctl+0x1b1 syscall() at syscall+0x27b --- syscall (number 54) --- end of kernel end trace frame: 0x4eea5d6f100, count: 249 0x4ee3fdabd7a: End of stack trace. splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac malloc() at malloc+0x406 if_attach_common() at if_attach_common+0x15e if_attach() at if_attach+0x2f carp_clone_create() at carp_clone_create+0x14d if_clone_create() at if_clone_create+0xab ifioctl() at ifioctl+0x33c soo_ioctl() at soo_ioctl+0x22d sys_ioctl() at sys_ioctl+0x1b1 syscall() at syscall+0x27b --- syscall (number 54) --- end of kernel end trace frame: 0x7f7fffffb5af, count: 247 0x9f0a5b1b05a: End of stack trace. splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac malloc() at malloc+0x406 counters_read() at counters_read+0x61 ip_sysctl_ipstat() at ip_sysctl_ipstat+0x43 net_sysctl() at net_sysctl+0xf2 sys_sysctl() at sys_sysctl+0x213 syscall() at syscall+0x27b --- syscall (number 202) --- end of kernel end trace frame: 0x7f7ffffd9930, count: 250 0x334a33927fa: End of stack trace. splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac malloc() at malloc+0x406 esp_init() at esp_init+0x200 pfkeyv2_send() at pfkeyv2_send+0x170a pfkey_output() at pfkey_output+0x87 raw_usrreq() at raw_usrreq+0x232 sosend() at sosend+0x2ec dofilewritev() at dofilewritev+0x205 sys_write() at sys_write+0x89 syscall() at syscall+0x27b --- syscall (number 4) --- end of kernel end trace frame: 0x1b0, count: 247 0x11850f016b1a: splassert: yield: want 0 have 1 Starting stack trace... yield() at yield+0xac malloc() at malloc+0x406 import_identity() at import_identity+0x30 import_identities() at import_identities+0xd7 pfkeyv2_send() at pfkeyv2_send+0x1074 pfkey_output() at pfkey_output+0x87 raw_usrreq() at raw_usrreq+0x232 sosend() at sosend+0x2ec dofilewritev() at dofilewritev+0x205 sys_write() at sys_write+0x89 syscall() at syscall+0x27b --- syscall (number 4) --- end of kernel end trace frame: 0xe8, count: 246 0x11850f016b1a: End of stack trace.