From owner-freebsd-current@FreeBSD.ORG Mon Oct 18 19:12:11 2004 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id ABED016A4CE; Mon, 18 Oct 2004 19:12:11 +0000 (GMT) Received: from crumpet.united-ware.com (ddsl-66-42-172-210.fuse.net [66.42.172.210]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1840C43D5F; Mon, 18 Oct 2004 19:12:11 +0000 (GMT) (envelope-from mistry.7@osu.edu) Received: from [192.168.0.6] (adsl-69-211-137-113.dsl.wotnoh.ameritech.net [69.211.137.113]) (authenticated bits=0)i9IIsvUJ050498 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO); Mon, 18 Oct 2004 14:55:14 -0400 (EDT) (envelope-from mistry.7@osu.edu) From: Anish Mistry To: Poul-Henning Kamp Date: Mon, 18 Oct 2004 15:13:56 -0400 User-Agent: KMail/1.7 References: <48908.1096571186@critter.freebsd.dk> In-Reply-To: <48908.1096571186@critter.freebsd.dk> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart16894977.buHMIWeCEl"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200410181514.05861.mistry.7@osu.edu> X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=no version=2.64 X-Spam-Checker-Version: SpamAssassin 2.64 (2004-01-11) on crumpet.united-ware.com cc: freebsd-current@freebsd.org cc: Nate Lawson Subject: Re: RELENG_5 panic: mtx_lock() with ACPI X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 18 Oct 2004 19:12:11 -0000 --nextPart16894977.buHMIWeCEl Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Thursday 30 September 2004 03:06 pm, Poul-Henning Kamp wrote: > In message <415C4F5A.2080701@root.org>, Nate Lawson writes: > >I assume phk would be handling this since it's in the tty code. If not, > >please let us know so one of us can address this before the release. > > > >>>>struct tty * > >>>>ttymalloc(struct tty *tp) > >>>>{ > >>>> static int once; > >>>> > >>>> if (!once) { > >>>> mtx_init(&tty_list_mutex, "ttylist", NULL, MTX_DEF); > >>>> once++; > >>>> } > >>>> > >>>>This code is not MP safe as multiple processors could attempt to call > >>>>mtx_init() twice. > > We have no calls to ttymalloc() which are not protected by Giant, > so this theory doesn't explain the problem. Any progress, I'd hate to have to disable ACPI for the release. Is there a= ny=20 way I could provide more info? =2D-=20 Anish Mistry --nextPart16894977.buHMIWeCEl Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQBBdBX9xqA5ziudZT0RAt6HAJ0ZuKskQ+XyS+cT7+tBOjzWxp/RzwCdHYDh Z7pazBIxCsPfE0qIUN1sCUE= =50QH -----END PGP SIGNATURE----- --nextPart16894977.buHMIWeCEl--