From owner-freebsd-usb@freebsd.org Fri Feb 1 22:21:08 2019 Return-Path: Delivered-To: freebsd-usb@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3939F14C2F8E for ; Fri, 1 Feb 2019 22:21:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id C13B685B41 for ; Fri, 1 Feb 2019 22:21:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 8129F14C2F8D; Fri, 1 Feb 2019 22:21:07 +0000 (UTC) Delivered-To: usb@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5ED0314C2F8C for ; Fri, 1 Feb 2019 22:21:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D5AC985B3B for ; Fri, 1 Feb 2019 22:21:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 1DCFF1F3E3 for ; Fri, 1 Feb 2019 22:21:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x11ML5cM063512 for ; Fri, 1 Feb 2019 22:21:05 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x11ML5Ox063511 for usb@FreeBSD.org; Fri, 1 Feb 2019 22:21:05 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: usb@FreeBSD.org Subject: [Bug 235257] snd_uaudio not getting loaded automatically after migration to devmatch Date: Fri, 01 Feb 2019 22:21:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: usb X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: needs-qa, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: maxsteciuk@gmail.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: usb@FreeBSD.org X-Bugzilla-Flags: mfc-stable12? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-usb@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: FreeBSD support for USB List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Feb 2019 22:21:08 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235257 --- Comment #24 from Max --- I am able to trace event through from sys/dev/usb/usb_hub.c:usb_notify_addq= to sys/kern/subrc_bus.c:devctl_queue_data_f where it is supposed to invoke pgsigio() but still I don't see devd triggering module loading... The devctl queue is not getting full as per printout. It is set to default hw.bus.devctl_queue =3D 1000 >>>Feb 1 16:57:06 kernel: usb_alloc_device: new dev (addr 5), udev=3D0xff= fff80006677000, >>>parent_hub=3D0xfffff800062df000 >>>Feb 1 16:57:06 kernel: ugen0.6: at usbus0 >>>Feb 1 16:57:06 kernel: usb_notify_addq: ++++ sending devctl_notify() a= bout type ATTACH ugen_name ugen0.6 >>>Feb 1 16:57:06 kernel: +++ devctl_notify_f() system USB, subsystem DEV= ICE, type ATTACH, data [ugen=3Dugen0.6 cdev=3Dugen0.6 vendor=3D0x413c produ= ct=3D0xa506 devclass=3D0x00 devsubclass=3D0x00 sernum=3D"" release=3D0xe001= mode=3Dhost port=3D2 parent=3Dugen0.3], flags 1 >>>+++ 1 devctl_queue_data_f() data [!system=3DUSB subsystem=3DDEVICE type= =3DATTACH ugen=3Dugen0.6 cdev=3Dugen0.6 vendor=3D0x413c product=3D0xa506 de= vclass=3D0x00 devsubclass=3D0x00 sernum=3D"" release=3D0xe001 mode=3Dhost p= ort=3D2 parent=3Dugen0.3 >>>Feb 1 16:57:06 kernel: ] flags 1, devctl_queue_length 1000 >>>Feb 1 16:57:06 kernel: +++ 2 devctl_queue_data_f() data [!system=3DUSB= subsystem=3DDEVICE >>>type=3DATTACH ugen=3Dugen0.6 cdev=3Dugen0.6 vendor= =3D0x413c product=3D0xa506 devclass=3D0x00 devsubclass=3D0x00 sernum=3D"" r= elease=3D0xe001 mode=3Dhost port=3D2 parent=3Dugen0.3 >>>Feb 1 16:57:06 kernel: ] flags 1, devctl_queue_length 1000, devsoftc.q= ueued 368 Hitting this point where the only condition of not sending request would be= if devsoft.async =3D=3D 0 or devsoftc.sigio is null. >>>printf("+++ 2 devctl_queue_data_f() data [%s] flags %d, devctl_queue_len= gth %d, devsoftc.queued >>>%d\n", data, flags, devctl_queue_length, devsoft= c.queued); >>> /* Leave at least one spot in the queue... */ >>> while (devsoftc.queued > devctl_queue_length - 1) { >>> n2 =3D TAILQ_FIRST(&devsoftc.devq); >>> TAILQ_REMOVE(&devsoftc.devq, n2, dei_link); >>> free(n2->dei_data, M_BUS); >>> free(n2, M_BUS); >>> devsoftc.queued--; >>> } >>> TAILQ_INSERT_TAIL(&devsoftc.devq, n1, dei_link); >>> devsoftc.queued++; >>> cv_broadcast(&devsoftc.cv); >>> KNOTE_LOCKED(&devsoftc.sel.si_note, 0); >>> mtx_unlock(&devsoftc.mtx); >>> selwakeup(&devsoftc.sel); >>> if (devsoftc.async && devsoftc.sigio !=3D NULL) >>> pgsigio(&devsoftc.sigio, SIGIO, 0); >>> return; Thanks, Max --=20 You are receiving this mail because: You are the assignee for the bug.=