Re: mutex Giant not owned at /usr/src/sys/kern/vfs_vnops.c:120

From: Bjoern A. Zeeb <bzeeb-lists_at_lists.zabbadoz.net>
Date: Sun, 29 Aug 2004 15:22:48 +0000 (UTC)
On Sun, 29 Aug 2004, Gleb Smirnoff wrote:

Hi,

> #21 0xc055ecc0 in kdb_enter (msg=0x0) at cpufunc.h:56
> #22 0xc0542dd5 in panic (fmt=0xc06dd9db "mutex %s not owned at %s:%d")
>     at /usr/src/sys/kern/kern_shutdown.c:536
> #23 0xc053914c in _mtx_assert (m=0xc07402a0, what=0,
>     file=0xc06e6fbd "/usr/src/sys/kern/vfs_vnops.c", line=120)
>     at /usr/src/sys/kern/kern_mutex.c:736
> #24 0xc05b165c in vn_open_cred (ndp=0xd0aafaa0, flagp=0xd0aaf97c, cmode=0,
>     cred=0xc1ad1300, fdidx=0) at /usr/src/sys/kern/vfs_vnops.c:120
> #25 0xc05b1613 in vn_open (ndp=0x0, flagp=0x0, cmode=0, fdidx=0)
>     at /usr/src/sys/kern/vfs_vnops.c:91
> #26 0xc05343a0 in linker_hints_lookup (
>     path=0xc0714020 "/boot/kernel;/boot/modules", pathlen=12,
>     modname=0xd0aafb74 "ng_tee", modnamelen=6, verinfo=0x0)
>     at /usr/src/sys/kern/kern_linker.c:1473
> #27 0xc0534947 in linker_search_module (modname=0xd0aafb74 "ng_tee",
>     modnamelen=6, verinfo=0x0) at /usr/src/sys/kern/kern_linker.c:1593
> #28 0xc0534b19 in linker_load_module (kldname=0x0,
>     modname=0xd0aafb74 "ng_tee", parent=0x0, verinfo=0x0, lfpp=0xd0aafb70)
>     at /usr/src/sys/kern/kern_linker.c:1682
> *** these "??" should be:
> 	ngc_send() in /usr/src/sys/netgraph/ng_socket.c
> #29 0xc1b71d17 in ?? ()
> #30 0x00000000 in ?? ()
> #31 0xd0aafb74 in ?? ()
> #32 0x00000000 in ?? ()
> #33 0x00000000 in ?? ()
> #34 0xd0aafb70 in ?? ()
> #35 0xc1ae6c38 in ?? ()
> #36 0x00000000 in ?? ()
> #37 0xc1789080 in ?? ()
> #38 0xc06dd88c in ?? ()
> #39 0x745f676e in ?? ()
> #40 0xc1006565 in ?? ()
> #41 0xd0aafc48 in ?? ()
> #42 0xd0aafcbc in ?? ()
> #43 0xc0548b25 in uiomove (cp=0xc17a8654, n=0, uio=0xc1692140)
>     at /usr/src/sys/kern/kern_subr.c:164
> #44 0xc0585621 in sosend (so=0xc17a8654, addr=0xc156a5d0, uio=0xd0aafc48,
>     top=0xc1609300, control=0x0, flags=0, td=0xc173d840)
>     at /usr/src/sys/kern/uipc_socket.c:799
> #45 0xc058c0ac in kern_sendit (td=0xc173d840, s=3, mp=0xd0aafcc4, flags=0,
>     control=0x0) at /usr/src/sys/kern/uipc_syscalls.c:738
> #46 0xc058bf3b in sendit (td=0x0, s=0, mp=0xd0aafcc4, flags=0)
>     at /usr/src/sys/kern/uipc_syscalls.c:682
> #47 0xc058c22b in sendto (td=0x0, uap=0x0)
>     at /usr/src/sys/kern/uipc_syscalls.c:795
> #48 0xc0697c50 in syscall (frame=
>       {tf_fs = 47, tf_es = 47, tf_ds = 47, tf_edi = -1077946376, tf_esi = -1077946382, tf_ebp = -1077945832, tf_isp = -794100364, tf_ebx = 671649088, tf_edx = -1077946384, tf_ecx = 5, tf_eax = 133, tf_trapno = 12, tf_err = 2, tf_eip = 671984639, tf_cs = 31, tf_eflags = 514, tf_esp = -1077946452, tf_ss = 47})
>     at /usr/src/sys/i386/i386/trap.c:1004
> #49 0xc06851bf in Xint0x80_syscall () at /usr/src/sys/i386/i386/exception.s:201


this does happen when for you ?

sth similar I have seen on an HEAD from some hours ago
At this time ng_l2tp should have gotten autoloaded:

/u1/src/src/HEAD/compile-20040829-0954/sys/kern/vfs_vnops.c:120^M
cpuid = 0^M
KDB: enter: panic^M
K[thread 100127]^M
Stopped at      kdb_enter+0x2b: nop^M
db> where^M
kdb_enter(c06b3845) at kdb_enter+0x2b^M
panic(c06b2c1a,c06c5201,c06bcadc,78,eb3cea94) at panic+0x127^M
_mtx_assert(c074b080,1,c06bcadc,78) at _mtx_assert+0x5c^M
vn_open_cred(eb3cea94,eb3ce970,0,c2858500,ffffffff) at
vn_open_cred+0x2b^M
vn_open(eb3cea94,eb3ce970,0,ffffffff) at vn_open+0x1e^M
linker_hints_lookup(c06f8540,c,eb3ceb78,7,0) at
linker_hints_lookup+0x109^M
linker_search_module(eb3ceb78,7,0,eb3ceb80,eb3ceb78) at
linker_search_module+0x43^M
linker_load_module(0,eb3ceb78,0,0,eb3ceb74) at
linker_load_module+0x80^M
ngc_send(c284a288,0,c258b600,c22457f0,0) at ngc_send+0x128^M
sosend(c284a288,c22457f0,eb3cec50,c258b600,0) at sosend+0x5e7^M
kern_sendit(c2865840,3,eb3ceccc,0,0) at kern_sendit+0xfa^M
sendit(c2865840,3,eb3ceccc,0,80bf498) at sendit+0x159^M
sendto(c2865840,eb3ced14,6,0,202) at sendto+0x4d^M
syscall(2f,2f,2f,bfa6d48c,bfa6d48a) at syscall+0x217^M
Xint0x80_syscall() at Xint0x80_syscall+0x1f^M
--- syscall (133, FreeBSD ELF32, sendto), eip = 0x28118c8f, esp = 0xbfa6d444, ebp = 0xbfa6d6b0 ---^M


-- 
Bjoern A. Zeeb				bzeeb at Zabbadoz dot NeT
Received on Sun Aug 29 2004 - 13:25:10 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:09 UTC