On 25.1.2017. 7:32, Martin Pieuchot wrote:
> I just enabled the NET_LOCK() again and I'm looking for test reports.
> Please go build a kernel from sources or wait for the next snapshot,
> run it and report back.
> 
> If you're looking for some small coding tasks related to the NET_LOCK()
> just do:
> 
>       # sysctl kern.splassert=2
>       # sysctl kern.pool_debug=2
>       
> Then watch for the traces on your console.

Hi,

i'm sending traces from firewall updated few minutes:

on that firewall i have:

carp
pf
pfsync
isakmpd -K4
sasyncd
dhcpd
dhcpd sync
tcpdump -lnqttti pflog0
pflow ipfix


carp2: state transition: MASTER -> BACKUP
splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
pool_get() at pool_get+0x1ca
srp_v_gc_start() at srp_v_gc_start+0x55
rtable_mpath_reprio() at rtable_mpath_reprio+0x14c
rt_if_linkstate_change() at rt_if_linkstate_change+0x10d
rtable_walk_helper() at rtable_walk_helper+0x5e
art_walk_apply() at art_walk_apply+0x40
art_table_walk() at art_table_walk+0x117
art_table_walk() at art_table_walk+0x145
art_table_walk() at art_table_walk+0x145
art_table_walk() at art_table_walk+0x145
art_table_walk() at art_table_walk+0x145
art_table_walk() at art_table_walk+0x145
art_table_walk() at art_table_walk+0x145
art_walk() at art_walk+0xe4
rtable_walk() at rtable_walk+0x62
rt_if_track() at rt_if_track+0x6f
if_linkstate() at if_linkstate+0x67
if_linkstate_task() at if_linkstate_task+0x3d
taskq_thread() at taskq_thread+0x6c
end trace frame: 0x0, count: 237
End of stack trace.


splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
pool_get() at pool_get+0x1ca
m_get() at m_get+0x28
ip_ctloutput() at ip_ctloutput+0x4bf
sogetopt() at sogetopt+0x7e
sys_getsockopt() at sys_getsockopt+0xbf
syscall() at syscall+0x27b
--- syscall (number 118) ---
end of kernel
end trace frame: 0x3, count: 250
0x1b14ee7fed7a:
End of stack trace.


splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
malloc() at malloc+0x406
ifmedia_ioctl() at ifmedia_ioctl+0x178
bnx_ioctl() at bnx_ioctl+0x144
ifioctl() at ifioctl+0x3e2
soo_ioctl() at soo_ioctl+0x22d
sys_ioctl() at sys_ioctl+0x1b1
syscall() at syscall+0x27b
--- syscall (number 54) ---
end of kernel
end trace frame: 0x4eea5d6f100, count: 249
0x4ee3fdabd7a:
End of stack trace.



splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
malloc() at malloc+0x406
if_attach_common() at if_attach_common+0x15e
if_attach() at if_attach+0x2f
carp_clone_create() at carp_clone_create+0x14d
if_clone_create() at if_clone_create+0xab
ifioctl() at ifioctl+0x33c
soo_ioctl() at soo_ioctl+0x22d
sys_ioctl() at sys_ioctl+0x1b1
syscall() at syscall+0x27b
--- syscall (number 54) ---
end of kernel
end trace frame: 0x7f7fffffb5af, count: 247
0x9f0a5b1b05a:
End of stack trace.


splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
malloc() at malloc+0x406
counters_read() at counters_read+0x61
ip_sysctl_ipstat() at ip_sysctl_ipstat+0x43
net_sysctl() at net_sysctl+0xf2
sys_sysctl() at sys_sysctl+0x213
syscall() at syscall+0x27b
--- syscall (number 202) ---
end of kernel
end trace frame: 0x7f7ffffd9930, count: 250
0x334a33927fa:
End of stack trace.


splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
malloc() at malloc+0x406
esp_init() at esp_init+0x200
pfkeyv2_send() at pfkeyv2_send+0x170a
pfkey_output() at pfkey_output+0x87
raw_usrreq() at raw_usrreq+0x232
sosend() at sosend+0x2ec
dofilewritev() at dofilewritev+0x205
sys_write() at sys_write+0x89
syscall() at syscall+0x27b
--- syscall (number 4) ---
end of kernel
end trace frame: 0x1b0, count: 247
0x11850f016b1a:


splassert: yield: want 0 have 1
Starting stack trace...
yield() at yield+0xac
malloc() at malloc+0x406
import_identity() at import_identity+0x30
import_identities() at import_identities+0xd7
pfkeyv2_send() at pfkeyv2_send+0x1074
pfkey_output() at pfkey_output+0x87
raw_usrreq() at raw_usrreq+0x232
sosend() at sosend+0x2ec
dofilewritev() at dofilewritev+0x205
sys_write() at sys_write+0x89
syscall() at syscall+0x27b
--- syscall (number 4) ---
end of kernel
end trace frame: 0xe8, count: 246
0x11850f016b1a:
End of stack trace.

Reply via email to