From owner-freebsd-current@FreeBSD.ORG Mon Mar 3 21:37:14 2014 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DE902ED8; Mon, 3 Mar 2014 21:37:14 +0000 (UTC) Received: from bigwig.baldwin.cx (bigwig.baldwin.cx [IPv6:2001:470:1f11:75::1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id B6E08398; Mon, 3 Mar 2014 21:37:14 +0000 (UTC) Received: from jhbbsd.localnet (unknown [209.249.190.124]) by bigwig.baldwin.cx (Postfix) with ESMTPSA id BCF73B9BB; Mon, 3 Mar 2014 16:37:13 -0500 (EST) From: John Baldwin To: Bryan Drewery Subject: Re: panic: lockmgr still held [tmpfs] [vm_map_remove()->vdropl()] (r262186: Thu Feb 20) Date: Mon, 3 Mar 2014 13:06:59 -0500 User-Agent: KMail/1.13.5 (FreeBSD/8.4-CBSD-20130906; KDE/4.5.5; amd64; ; ) References: <53109ACB.20102@FreeBSD.org> <201402281618.57291.jhb@freebsd.org> <53135535.30707@FreeBSD.org> In-Reply-To: <53135535.30707@FreeBSD.org> MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-15" Content-Transfer-Encoding: 7bit Message-Id: <201403031306.59405.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (bigwig.baldwin.cx); Mon, 03 Mar 2014 16:37:13 -0500 (EST) Cc: freebsd-current@freebsd.org X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Mar 2014 21:37:14 -0000 On Sunday, March 02, 2014 10:58:45 am Bryan Drewery wrote: > On 2/28/2014 3:18 PM, John Baldwin wrote: > > On Friday, February 28, 2014 9:18:51 am Bryan Drewery wrote: > >> While using poudriere: > >> > >>> Unread portion of the kernel message buffer: > >>> panic: lockmgr still held > >>> cpuid = 12 > >>> KDB: stack backtrace: > >>> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe124804f7a0 > >>> kdb_backtrace() at kdb_backtrace+0x39/frame 0xfffffe124804f850 > >>> vpanic() at vpanic+0x126/frame 0xfffffe124804f890 > >>> kassert_panic() at kassert_panic+0x139/frame 0xfffffe124804f900 > >>> lockdestroy() at lockdestroy+0x3b/frame 0xfffffe124804f920 > >>> vdropl() at vdropl+0x1c8/frame 0xfffffe124804f960 > >>> vm_object_deallocate() at vm_object_deallocate+0x10b/frame 0xfffffe124804f9c0 > >>> vm_map_process_deferred() at vm_map_process_deferred+0x89/frame 0xfffffe124804f9f0 > >>> vm_map_remove() at vm_map_remove+0xc8/frame 0xfffffe124804fa20 > >>> vmspace_exit() at vmspace_exit+0xc9/frame 0xfffffe124804fa60 > >>> exit1() at exit1+0x541/frame 0xfffffe124804fad0 > >>> sys_sys_exit() at sys_sys_exit+0xe/frame 0xfffffe124804fae0 > >>> ia32_syscall() at ia32_syscall+0x270/frame 0xfffffe124804fbf0 > >>> Xint0x80_syscall() at Xint0x80_syscall+0x95/frame 0xfffffe124804fbf0 > >>> --- syscall (1, FreeBSD ELF32, sys_sys_exit), rip = 0x281014df, rsp = 0xffffc45c, rbp = 0xffffc468 --- > >> > >>> #4 0xffffffff808c00db in lockdestroy (lk=0xfffff80a88a285f0) at /usr/src/sys/kern/kern_lock.c:440 > >>> 440 KASSERT(lk->lk_lock == LK_UNLOCKED, ("lockmgr still held")); > >>> (kgdb) print *lk > >>> $1 = {lock_object = {lo_name = 0xffffffff8201a1bd "tmpfs", lo_flags = 116588552, lo_data = 0, lo_witness = 0xfffffe00006fec00}, lk_lock = > > 18446735288132049184, lk_exslpfail = 0, > >>> lk_timo = 51, lk_pri = 96} > > > > Can you please grab people.freebsd.org/~jhb/gdb/* > > > > and then do 'cd /path/to/files', 'source gdb6', 'frame 4', 'lockmgr_owner lk'? > > > > (kgdb) lockmgr_owner lk > td: 0xfffff80272c61920 > pid: 55040, p_comm: testprog Can you get a stack trace of that program? ('proc 55040', 'bt') -- John Baldwin