In message <[EMAIL PROTECTED]>, Robe
rt Watson writes:
>
>While debugging the recent pthreads problem, I've started running into
>this:
>
>pid 663 (test), uid 1000: exited on signal 10 (core dumped)
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
>failed to set signal flags properly for ast()
I can't remember how I triggered this, but I have personally
run with this patch for some time:
(NB: Cut&Paste)
Index: kern/subr_trap.c
===================================================================
RCS file: /home/ncvs/src/sys/kern/subr_trap.c,v
retrieving revision 1.239
diff -u -r1.239 subr_trap.c
--- kern/subr_trap.c 28 Dec 2002 01:23:07 -0000 1.239
+++ kern/subr_trap.c 28 Dec 2002 09:05:22 -0000
@@ -74,6 +74,7 @@
{
struct proc *p = td->td_proc;
struct kse *ke = td->td_kse;
+ static int enough;
CTR3(KTR_SYSC, "userret: thread %p (pid %d, %s)", td, p->p_pid,
p->p_comm);
@@ -84,7 +85,8 @@
mtx_lock_spin(&sched_lock);
if (SIGPENDING(p) && ((p->p_sflag & PS_NEEDSIGCHK) == 0 ||
(td->td_kse->ke_flags & KEF_ASTPENDING) == 0))
- printf("failed to set signal flags properly for ast()\n");
+ if (++enough < 10)
+ printf("failed to set signal flags properly for ast()\n");
mtx_unlock_spin(&sched_lock);
PROC_UNLOCK(p);
mtx_unlock(&Giant);
--
Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD committer | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message