From owner-freebsd-amd64@freebsd.org Tue Feb 9 09:27:40 2016 Return-Path: Delivered-To: freebsd-amd64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3C4B7AA248C for ; Tue, 9 Feb 2016 09:27:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 20150E83 for ; Tue, 9 Feb 2016 09:27:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u199Rd7J059771 for ; Tue, 9 Feb 2016 09:27:40 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-amd64@FreeBSD.org Subject: [Bug 207048] kernel panic at sleepq_add+0x1d0 Date: Tue, 09 Feb 2016 09:27:40 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: ekraju@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter cc Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Mailman-Approved-At: Tue, 09 Feb 2016 12:05:38 +0000 X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Feb 2016 09:27:40 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D207048 Bug ID: 207048 Summary: kernel panic at sleepq_add+0x1d0 Product: Base System Version: 11.0-CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: ekraju@gmail.com CC: freebsd-amd64@FreeBSD.org CC: freebsd-amd64@FreeBSD.org Stack trace: ---------- panic: sleepq_add: td 0xfffff8002adb24f0 to sleep on wchan 0xffffffff82541b= 08 with sleeping prohibited cpuid =3D 2 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2c/frame 0xfffffe0094a43= 120 kdb_backtrace() at kdb_backtrace+0x53/frame 0xfffffe0094a431f0 vpanic() at vpanic+0x249/frame 0xfffffe0094a432c0 kassert_panic() at kassert_panic+0xc7/frame 0xfffffe0094a43350 sleepq_add() at sleepq_add+0x1d0/frame 0xfffffe0094a433c0 _sx_slock_hard() at _sx_slock_hard+0x714/frame 0xfffffe0094a435a0 __sx_slock() at __sx_slock+0x76/frame 0xfffffe0094a43600 _sx_slock() at _sx_slock+0x14d/frame 0xfffffe0094a43660 vtprintf() at vtprintf+0x4b/frame 0xfffffe0094a43710 krping_printf() at krping_printf+0x54/frame 0xfffffe0094a43780 krping_cq_event_handler() at krping_cq_event_handler+0x390/frame 0xfffffe0094a43860 c4iw_ev_handler() at c4iw_ev_handler+0xa0/frame 0xfffffe0094a438e0 service_iq() at service_iq+0x3b6/frame 0xfffffe0094a43a30 t4_intr() at t4_intr+0x54/frame 0xfffffe0094a43a70 intr_event_execute_handlers() at intr_event_execute_handlers+0x252/frame 0xfffffe0094a43ac0 ithread_execute_handlers() at ithread_execute_handlers+0x47/frame 0xfffffe0094a43af0 ithread_loop() at ithread_loop+0x106/frame 0xfffffe0094a43b70 fork_exit() at fork_exit+0x145/frame 0xfffffe0094a43bf0 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe0094a43bf0 --- trap 0, rip =3D 0, rsp =3D 0, rbp =3D 0 --- KDB: enter: panic Location where the panic has hit: sleepq_add(void *wchan, struct lock_object *lock, const char *wmesg, int fl= ags, int queue) { struct sleepqueue_chain *sc; struct sleepqueue *sq; struct thread *td; td =3D curthread; sc =3D SC_LOOKUP(wchan); mtx_assert(&sc->sc_lock, MA_OWNED); MPASS(td->td_sleepqueue !=3D NULL); MPASS(wchan !=3D NULL); MPASS((queue >=3D 0) && (queue < NR_SLEEPQS)); /* If this thread is not allowed to sleep, die a horrible death. */ =3D=3D=3D> KASSERT(td->td_no_sleeping =3D=3D 0, ("%s: td %p to sleep on wchan %p with sleeping prohibited", __func__, td, wchan)); The panic is occuring when I am running krping kernel tool in a loop(and not through manual attempts) --=20 You are receiving this mail because: You are on the CC list for the bug.=