From owner-freebsd-current@FreeBSD.ORG Wed Jun 29 21:11:54 2005 Return-Path: X-Original-To: freebsd-current@FreeBSD.org Delivered-To: freebsd-current@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 11A3A16A41C; Wed, 29 Jun 2005 21:11:54 +0000 (GMT) (envelope-from toa@pop.agri.ch) Received: from smtp.messaging.ch (exsmtp01.agrinet.ch [81.221.250.200]) by mx1.FreeBSD.org (Postfix) with ESMTP id 938EF43D4C; Wed, 29 Jun 2005 21:11:53 +0000 (GMT) (envelope-from toa@pop.agri.ch) Received: from [192.168.225.5] ([80.218.0.93]) by smtp.messaging.ch with Microsoft SMTPSVC(6.0.3790.211); Wed, 29 Jun 2005 23:11:51 +0200 Message-ID: <42C30E90.3030405@pop.agri.ch> Date: Wed, 29 Jun 2005 23:11:44 +0200 From: Andreas Tobler User-Agent: Mozilla Thunderbird 1.0.2 (Macintosh/20050317) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Suleiman Souhlal References: <7mhdg4q983.wl%kuriyama@imgsrc.co.jp> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 29 Jun 2005 21:11:51.0552 (UTC) FILETIME=[2B4E8000:01C57CEF] Cc: Current Subject: Re: Acquiring lockmgr lock "ufs" with non-sleepable locks X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jun 2005 21:11:54 -0000 Suleiman Souhlal wrote: > This was introduced by my commit to take out the various kqueue > operations outside of ufs. It is because we are trying to lock the > vnode while holding the knlist mutex. I'll work on a fix on wednesday, > as I'll unfortunately be a bit busy until then. I hope this won't cause > you any inconvenience. Is the below the same ? I simply ask because I see this on ppc. Doing a tail -f /var/log/messages produces a continues kdb message flow: Jun 28 23:14:51 albook kernel: Acquiring lockmgr lock "ufs" with the following non-sleepable locks held: Jun 28 23:14:52 albook kernel: exclusive sleep mutex vnode pollinfo r = 0 (0x34be1000) locked @ /home/andreast/devel/src/sys/kern/kern_event.c:881 Jun 28 23:14:53 albook kernel: KDB: stack backtrace: Jun 28 23:14:53 albook kernel: 0xe117b910: at witness_warn+0x274 Jun 28 23:14:53 albook kernel: 0xe117b9c0: at lockmgr+0xf8 Jun 28 23:14:53 albook kernel: 0xe117ba00: at vop_stdlock+0x2c Jun 28 23:14:53 albook kernel: 0xe117ba10: at VOP_LOCK_APV+0xe8 Jun 28 23:14:53 albook kernel: 0xe117ba30: at ffs_lock+0x20 Jun 28 23:14:53 albook kernel: 0xe117ba40: at VOP_LOCK_APV+0xe8 Jun 28 23:14:53 albook kernel: 0xe117ba60: at vn_lock+0xd4 Jun 28 23:14:53 albook kernel: 0xe117bab0: at filt_vfsread+0x58 Jun 28 23:14:53 albook kernel: 0xe117bb60: at kqueue_register+0x6f8 Jun 28 23:14:53 albook kernel: 0xe117bba0: at kern_kevent+0x100 Jun 28 23:14:53 albook kernel: 0xe117bca0: at kevent+0x7c Jun 28 23:14:53 albook kernel: 0xe117bce0: at syscall+0x29c Jun 28 23:14:53 albook kernel: 0xe117bd60: at trap+0x168 Jun 28 23:14:53 albook kernel: 0xe117bda0: at powerpc_interrupt+0xc0 Jun 28 23:14:53 albook kernel: 0xe117bdd0: user SC trap by 0x2189aed8: srr1=0xd032 Jun 28 23:14:53 albook kernel: r1=0x7fffdb50 cr=0x24000022 xer=0 ctr=0x2189aed0 Jun 28 23:14:53 albook kernel: Acquiring lockmgr lock "ufs" with the following non-sleepable locks held: Jun 28 23:14:53 albook kernel: exclusive sleep mutex kqueue r = 0 (0x2cbcfb00) locked @ /home/andreast/devel/src/sys/kern/kern_event.c:1524 Jun 28 23:14:53 albook kernel: exclusive sleep mutex vnode pollinfo r = 0 (0x34be1000) locked @ /home/andreast/devel/src/sys/kern/kern_event.c:1512 Jun 28 23:14:53 albook kernel: KDB: stack backtrace: Jun 28 23:14:53 albook kernel: 0xdede58a0: at witness_warn+0x274 Jun 28 23:14:53 albook kernel: 0xdede5950: at lockmgr+0xf8 Jun 28 23:14:53 albook kernel: 0xdede5990: at vop_stdlock+0x2c Jun 28 23:14:53 albook kernel: 0xdede59a0: at VOP_LOCK_APV+0xe8 Jun 28 23:14:53 albook kernel: 0xdede59c0: at ffs_lock+0x20 Jun 28 23:14:53 albook kernel: 0xdede59d0: at VOP_LOCK_APV+0xe8 Jun 28 23:14:53 albook kernel: 0xdede59f0: at vn_lock+0xd4 Jun 28 23:14:53 albook kernel: 0xdede5a40: at filt_vfsread+0x58 Jun 28 23:14:53 albook kernel: 0xdede5af0: at knote+0xd4 Jun 28 23:14:53 albook kernel: 0xdede5b20: at VOP_WRITE_APV+0x20c Jun 28 23:14:53 albook kernel: 0xdede5bf0: at vn_write+0x280 Jun 28 23:14:53 albook kernel: 0xdede5c90: at kern_writev+0xc0 Jun 28 23:14:53 albook kernel: 0xdede5cc0: at writev+0x54 Jun 28 23:14:53 albook kernel: 0xdede5ce0: at syscall+0x29c Jun 28 23:14:53 albook kernel: 0xdede5d60: at trap+0x168 Jun 28 23:14:53 albook kernel: 0xdede5da0: at powerpc_interrupt+0xc0 Jun 28 23:14:53 albook kernel: 0xdede5dd0: user SC trap by 0x218be914: srr1=0xd032 Jun 28 23:14:53 albook kernel: r1=0x7fffba10 cr=0x40022042 xer=0x20000000 ctr=0x218be90c etc.... No, I did not try the follow-up patch yet. Thanks, Andreas