From owner-freebsd-hackers@FreeBSD.ORG Wed Sep 24 16:55:02 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C91AB1065680 for ; Wed, 24 Sep 2008 16:55:02 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from server.baldwin.cx (bigknife-pt.tunnel.tserv9.chi1.ipv6.he.net [IPv6:2001:470:1f10:75::2]) by mx1.freebsd.org (Postfix) with ESMTP id 69C828FC1C for ; Wed, 24 Sep 2008 16:55:02 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from localhost.corp.yahoo.com (john@localhost [IPv6:::1]) (authenticated bits=0) by server.baldwin.cx (8.14.2/8.14.2) with ESMTP id m8OGshJg084657; Wed, 24 Sep 2008 12:54:56 -0400 (EDT) (envelope-from jhb@freebsd.org) From: John Baldwin To: freebsd-hackers@freebsd.org Date: Wed, 24 Sep 2008 12:34:54 -0400 User-Agent: KMail/1.9.7 References: In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200809241234.55075.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-2.0.2 (server.baldwin.cx [IPv6:::1]); Wed, 24 Sep 2008 12:54:56 -0400 (EDT) X-Virus-Scanned: ClamAV 0.93.1/8324/Wed Sep 24 06:55:43 2008 on server.baldwin.cx X-Virus-Status: Clean X-Spam-Status: No, score=-2.6 required=4.2 tests=AWL,BAYES_00,NO_RELAYS autolearn=ham version=3.1.3 X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on server.baldwin.cx Cc: Jeff Wheelhouse Subject: Re: panic: lockmgr on FreeBSD 7.0-RELEASE-p4 amd64 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Sep 2008 16:55:02 -0000 On Wednesday 24 September 2008 12:17:56 pm Jeff Wheelhouse wrote: > > We got the same panic again, this time after switching to the ULE > scheduler: > > panic: lockmgr: thread 0xffffff0050858350, not exclusive lock holder > 0xffffff00074959f0 unlocking > cpuid = 0 > KDB: stack backtrace: > db_trace_self_wrapper() at db_trace_self_wrapper+0x2a > panic() at panic+0x17a > _lockmgr() at _lockmgr+0x872 > VOP_UNLOCK_APV() at VOP_UNLOCK_APV+0x46 > null_unlock() at null_unlock+0xff > VOP_UNLOCK_APV() at VOP_UNLOCK_APV+0x46 > nullfs_mount() at nullfs_mount+0x244 > vfs_donmount() at vfs_donmount+0xe4d > nmount() at nmount+0xa5 > syscall() at syscall+0x254 > Xfast_syscall() at Xfast_syscall+0xab > --- syscall (378, FreeBSD ELF64, nmount), rip = 0x206845ac, rsp = > 0x7fffffffdfc8, rbp = 0x7fffffffdfd0 --- Can you use gdb or the like to get the souce file/line for the nullfs_mount+0x244 frame? i.e. 'gdb /boot/kernel/kernel' (gdb) l *nullfs_mount+0x244 -- John Baldwin