From owner-freebsd-hackers Mon Sep 24 12:34:26 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11]) by hub.freebsd.org (Postfix) with ESMTP id 012C437B421 for ; Mon, 24 Sep 2001 12:34:09 -0700 (PDT) Received: from laptop.baldwin.cx ([147.11.46.209]) by mail.wrs.com (8.9.3/8.9.1) with ESMTP id MAA02126; Mon, 24 Sep 2001 12:34:00 -0700 (PDT) Message-ID: X-Mailer: XFMail 1.4.0 on FreeBSD X-Priority: 3 (Normal) Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 8bit MIME-Version: 1.0 In-Reply-To: <200109231559.f8NFxeC13760@csa.bu.edu> Date: Mon, 24 Sep 2001 12:33:43 -0700 (PDT) From: John Baldwin To: Evan Sarmiento Subject: RE: panic on mount Cc: freebsd-hackers@FreeBSD.org Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On 23-Sep-01 Evan Sarmiento wrote: > Hello, > > After compiling a new kernel, installing it, when my laptop > tries to mount its drive, it panics with this message: > > panic: lock (sleep mutex) vnode interlock not locked @ > ../../../kern/vfs_default.c:460 > > which is: > > if (ap->a_flags & LK_INTERLOCK) > mtx_unlock(&ap->a_vp->v_interlock); > > within the function vop_nolock. Can you get a stack trace to see where vop_nolock is being called from? -- John Baldwin -- http://www.FreeBSD.org/~jhb/ PGP Key: http://www.baldwin.cx/~john/pgpkey.asc "Power Users Use the Power to Serve!" - http://www.FreeBSD.org/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message