Hi, I've also ran into this.
Reported here [1] (a new email with some more stack traces should be
landing soon).


BR,
Pedro Caetano

[1] https://marc.info/?l=openbsd-bugs&m=148581520804370&w=2

On Mon, Jan 30, 2017 at 11:12 PM, Hrvoje Popovski <hrv...@srce.hr> wrote:

> On 25.1.2017. 7:32, Martin Pieuchot wrote:
> > I just enabled the NET_LOCK() again and I'm looking for test reports.
> > Please go build a kernel from sources or wait for the next snapshot,
> > run it and report back.
> >
> > If you're looking for some small coding tasks related to the NET_LOCK()
> > just do:
> >
> >       # sysctl kern.splassert=2
> >       # sysctl kern.pool_debug=2
> >
> > Then watch for the traces on your console.
>
>
>
> source is fetched half an hour ago and i think that this one is new
>
>
> splassert: yield: want 0 have 1
> Starting stack trace...
> yield() at yield+0xac
> pool_get() at pool_get+0x1ca
> pf_osfp_add() at pf_osfp_add+0x145
> pfioctl() at pfioctl+0x13f8
> VOP_IOCTL() at VOP_IOCTL+0x44
> vn_ioctl() at vn_ioctl+0x77
> sys_ioctl() at sys_ioctl+0x1b1
> syscall() at syscall+0x27b
> --- syscall (number 54) ---
> end of kernel
> end trace frame: 0x2, count: 249
> 0xd71fb72f43a:
> End of stack trace.
>
>

Reply via email to