I was doing "sudo mount_smbfs //user_at_server/share /mnt" when the following msg appeared. smbfs.ko was not loaded. lockmgr: thread 0xc21e2780 unlocking unheld lock KDB: stack backtrace: kdb_backtrace(c0b14ac8,c21e2780,c21e2780,c0bc8284,7a,...) at kdb_backtrace+0x30 lockmgr(c2449d88,6,c2449dac,c21e2780,ccff3b58,...) at lockmgr+0x6ab smb_co_unlock(c2449d80,0,c21e2780,ccff3b78,c2435380,...) at smb_co_unlock+0x2c smb_sm_init(c0c0c6e8,c21e2780,4,c209e940,0,...) at smb_sm_init+0x41 nsmb_dev_load(c209e940,0,0,0,0,...) at nsmb_dev_load+0x25 module_register_init(c2449150,4,c21e2780,ccff3bd0,0,...) at module_register_init+0xe1 linker_file_sysinit(c23f2500,c23f1020,ccff3bf8,c21743b0,0,...) at linker_file_sysinit+0x134 linker_load_file(c23f1020,ccff3c24,0,4,ccff3c28,...) at linker_load_file+0xde linker_load_module(0,c1ff2800,0,0,ccff3c4c,...) at linker_load_module+0xd9 kern_kldload(c21e2780,c1ff2800,ccff3c70,0,c21e2780,...) at kern_kldload+0xe3 kldload(c21e2780,ccff3cf4,4,c0a99ed8,c21e2780,...) at kldload+0x7f syscall(3b,3b,3b,28050a1a,bfbfe940,...) at syscall+0x456 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (304, FreeBSD ELF32, kldload), eip = 0x280d1daf, esp = 0xbfbfe7bc, ebp = 0xbfbfed88 --- netsmb_dev: loaded lockmgr: thread 0xc21e2780 unlocking unheld lock KDB: stack backtrace: kdb_backtrace(c0b14ac8,c21e2780,c21e2780,120,c1ffa454,...) at kdb_backtrace+0x30 lockmgr(c2419e08,6,c2419e2c,c21e2780,ccff3b90,...) at lockmgr+0x6ab smb_co_unlock(c2419e00,0,c21e2780,ccff3b54,0,...) at smb_co_unlock+0x2c nsmb_dev_ioctl(c23f2700,82fc6e6a,c1ffa400,3,c21e2780,...) at nsmb_dev_ioctl+0x3b1 giant_ioctl(c23f2700,82fc6e6a,c1ffa400,3,c21e2780,...) at giant_ioctl+0x88 devfs_ioctl_f(c21f9750,82fc6e6a,c1ffa400,c2411600,c21e2780,...) at devfs_ioctl_f+0x102 fo_ioctl(c21f9750,82fc6e6a,c1ffa400,c2411600,c21e2780,...) at fo_ioctl+0x33 kern_ioctl(c21e2780,4,82fc6e6a,c1ffa400,c083df78,...) at kern_ioctl+0x518 ioctl(c21e2780,ccff3cf4,c,c0a99ed8,c21e2780,...) at ioctl+0x12b syscall(bfbf003b,bfbf003b,bfbf003b,bfbfe9d0,bfbfe4a0,...) at syscall+0x456 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (54, FreeBSD ELF32, ioctl), eip = 0x2815af93, esp = 0xbfbfe48c, ebp = 0xbfbfe7b8 --- lockmgr: thread 0xc21e2780 unlocking unheld lock KDB: stack backtrace: kdb_backtrace(c0b14ac8,c21e2780,c21e2780,120,c1ffa454,...) at kdb_backtrace+0x30 lockmgr(c21ee308,6,c21ee32c,c21e2780,ccff3b90,...) at lockmgr+0x6ab smb_co_unlock(c21ee300,0,c21e2780,ccff3b54,0,...) at smb_co_unlock+0x2c nsmb_dev_ioctl(c23f2700,82fc6e6a,c1ffa400,3,c21e2780,...) at nsmb_dev_ioctl+0x264 giant_ioctl(c23f2700,82fc6e6a,c1ffa400,3,c21e2780,...) at giant_ioctl+0x88 devfs_ioctl_f(c21f9750,82fc6e6a,c1ffa400,c2411600,c21e2780,...) at devfs_ioctl_f+0x102 fo_ioctl(c21f9750,82fc6e6a,c1ffa400,c2411600,c21e2780,...) at fo_ioctl+0x33 kern_ioctl(c21e2780,4,82fc6e6a,c1ffa400,c083df78,...) at kern_ioctl+0x518 ioctl(c21e2780,ccff3cf4,c,c0a99ed8,c21e2780,...) at ioctl+0x12b syscall(bfbf003b,bfbf003b,bfbf003b,bfbfe9d0,bfbfe4a0,...) at syscall+0x456 Xint0x80_syscall() at Xint0x80_syscall+0x1f -- "Without the userland, the kernel is useless." --inspired by The Tao of ProgrammingReceived on Tue Jul 11 2006 - 11:29:19 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:58 UTC