NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/50491: unkillable wait in usbd_transfer while using usmsc0 on raspberry pi 2



The following reply was made to PR kern/50491; it has been noted by GNATS.

From: Nick Hudson <nick.hudson%gmx.co.uk@localhost>
To: gnats-bugs%NetBSD.org@localhost, gnats-admin%netbsd.org@localhost, netbsd-bugs%netbsd.org@localhost,
 mfpnb%plass-family.net@localhost
Cc: 
Subject: Re: kern/50491: unkillable wait in usbd_transfer while using usmsc0
 on raspberry pi 2
Date: Thu, 3 Dec 2015 07:32:03 +0000

 On 12/3/2015 5:30 AM, Michael Plass wrote:
 > The following reply was made to PR kern/50491; it has been noted by GNATS.
 >
 > From: Michael Plass <mfpnb%plass-family.net@localhost>
 > To: gnats-bugs%NetBSD.org@localhost
 > Cc: Michael Plass <mfpnb%plass-family.net@localhost>
 > Subject: Re: kern/50491: unkillable wait in usbd_transfer while using usmsc0 on raspberry pi 2
 > Date: Wed, 2 Dec 2015 21:26:11 -0800
 >
 >   Nick,
 >   
 >   I saw one of the 'usbd_do_request: not in process context' messages go by
 >   (actually while still coming up to multiuser mode), but apparently DEBUG was
 >   not defined, so the ASSERT_SLEEPABLE() was a NOP. I've rebuilt with a call to
 >   assert_sleepable() instead, and I'll run with that.
 Oops. Any reason to not define DEBUG? assert_sleepable should do, but 
 they more checks the better.
 
 
 
 
 >   PID    LID S CPU     FLAGS       STRUCT LWP *               NAME WAIT
 >   230      1 3   0         0           bacfab60            cleanup tstile
 
 
 >   2583     1 3   3         0           ba46a0c0               sshd tstile
 
 >   0       31 3   3       200           bada4880          softclk/3 tstile
 
 
 >   0        5 3   0       200           baf05340          softclk/0 tstile
 
 >   0        3 3   0       200           baf058c0          softnet/0 tstile
 
 
 Backtraces from these might help, but see below...
 
 >   db{0}> bt/t 0t230
 >   trace: pid 230 lid 1 at 0xbaccdd4c
 >   0xbaccdd4c: netbsd:mi_switch+0x10
 >   0xbaccdd7c: netbsd:sleepq_block+0xb4
 >   0xbaccddbc: netbsd:turnstile_block+0x3e8
 >   0xbaccde1c: netbsd:mutex_enter+0x220
 >   0xbaccde3c: netbsd:sosetlock+0x58
 >   0xbaccde6c: netbsd:tcp_attach_wrapper+0x30
 >   0xbaccde9c: netbsd:socreate+0x158
 >   0xbaccdee4: netbsd:fsocreate+0xac
 >   0xbaccdf0c: netbsd:sys___socket30+0x30
 >   0xbaccdf7c: netbsd:syscall+0x88
 >   0xbaccdfac: netbsd:swi_handler+0x98
 
 Blocked on softnet_lock in sosetlock
 
 x/x softnet_lock should tell us who owns it. Get a backtrace from the 
 offending lwp.
 
 Nick
 


Home | Main Index | Thread Index | Old Index