On Mon, 2006-06-12 at 18:33 +0200, Paolo Pisati wrote: > Whenever i mount a samba share, i get this in my logs: > > lockmgr: thread 0xc4a14d80 unlocking unheld lock > KDB: stack backtrace: > kdb_backtrace(c06a0a0b,c4a14d80,c6c026f0,e4f4cb5c,c04eec25) at kdb_backtrace+0x2 > f > lockmgr(c6c04e08,6,c6c04e2c,c4a14d80,e4f4cb98) at lockmgr+0x604 > smb_co_unlock(c6c04e00,0,c4a14d80,c4a14d80,e4f4cbb8) at smb_co_unlock+0x2c > smb_sm_init(e4f4cbb8,c04f1f78,c6741a6c,c6c0283f,c6741a40) at smb_sm_init+0x4a > nsmb_dev_load(c6741a40,0,0,0,102) at nsmb_dev_load+0x1d > module_register_init(c6c042c4,c06a0666,e4f4cbfc,e4f4cc00,0) at module_register_i > nit+0x82 > linker_file_sysinit(c5920d00,c5e4d460,e4f4cc24,1,c5920d00) at linker_file_sysini > t+0x8e > linker_load_file(c5e4d460,e4f4cc48,0,c106ca00,0) at linker_load_file+0xed > linker_load_module(0,c4bc3c00,0,0,e4f4cc74) at linker_load_module+0xb1 > kldload(c4a14d80,e4f4cd04,4,280d5000,4) at kldload+0x139 > syscall(3b,3b,3b,bfbfead0,bfbfeab8) at syscall+0x386 > Xint0x80_syscall() at Xint0x80_syscall+0x1f > --- syscall (304, FreeBSD ELF32, kldload), eip = 0x280d54ef, esp = 0xbfbfe4cc, e > bp = 0xbfbfea88 --- > netsmb_dev: loaded > lockmgr: thread 0xc5298bd0 unlocking unheld lock > KDB: stack backtrace: > kdb_backtrace(c06a0a0b,c5298bd0,c4a5781c,c6741840,c6742880) at kdb_backtrace+0x2 > f > lockmgr(c5a49408,6,c5a4942c,c5298bd0,e7257ba0) at lockmgr+0x604 > smb_co_unlock(c5a49400,0,c5298bd0,e7257bfc,c6bef43a) at smb_co_unlock+0x2c > smb_vc_unlock(c5a49400,0,c5298bd0,e7257bc0,c51e7800) at smb_vc_unlock+0x1f > nsmb_dev_ioctl(c5913d00,82fc6e6a,c4a57800,3,c5298bd0) at nsmb_dev_ioctl+0x3d4 > giant_ioctl(c5913d00,82fc6e6a,c4a57800,3,c5298bd0) at giant_ioctl+0x79 > devfs_ioctl_f(c4c365a0,82fc6e6a,c4a57800,c58b4d00,c5298bd0) at devfs_ioctl_f+0xd > c > ioctl(c5298bd0,e7257d04,c,2817f000,6) at ioctl+0x537 > syscall(3b,3b,3b,bfbfe6c0,bfbfe1a0) at syscall+0x386 > Xint0x80_syscall() at Xint0x80_syscall+0x1f > --- syscall (54, FreeBSD ELF32, ioctl), eip = 0x2816a277, esp = 0xbfbfe18c, ebp > = 0xbfbfe4b8 --- > lockmgr: thread 0xc5298bd0 unlocking unheld lock > KDB: stack backtrace: > kdb_backtrace(c06a0a0b,c5298bd0,c4a5781c,c6741840,c6742880) at kdb_backtrace+0x2 > f > lockmgr(c576e308,6,c576e32c,c5298bd0,e7257ba0) at lockmgr+0x604 > smb_co_unlock(c576e300,0,c5298bd0,e7257bfc,c6bef46c) at smb_co_unlock+0x2c > smb_share_unlock(c576e300,0,c5298bd0,e7257bc0,c51e7800) at smb_share_unlock+0x1f > nsmb_dev_ioctl(c5913d00,82fc6e6a,c4a57800,3,c5298bd0) at nsmb_dev_ioctl+0x406 > giant_ioctl(c5913d00,82fc6e6a,c4a57800,3,c5298bd0) at giant_ioctl+0x79 > devfs_ioctl_f(c4c365a0,82fc6e6a,c4a57800,c58b4d00,c5298bd0) at devfs_ioctl_f+0xd > c > ioctl(c5298bd0,e7257d04,c,2817f000,6) at ioctl+0x537 > syscall(3b,3b,3b,bfbfe6c0,bfbfe1a0) at syscall+0x386 > Xint0x80_syscall() at Xint0x80_syscall+0x1f > --- syscall (54, FreeBSD ELF32, ioctl), eip = 0x2816a277, esp = 0xbfbfe18c, ebp > = 0xbfbfe4b8 --- > > is it a known problem? > this happens on UP and SMP systems, both running recent CURRENT. > > bye Same happens here on recent -CURRENT/amd64: lockmgr: thread 0xffffff0072b9c2b0 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_unlock() at smb_co_unlock+0x17 smb_sm_init() at smb_sm_init+0x3f nsmb_dev_load() at nsmb_dev_load+0x25 module_register_init() at module_register_init+0x58 linker_load_module() at linker_load_module+0x930 kldload() at kldload+0x109 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (304, FreeBSD ELF64, kldload), rip = 0x80089f1dc, rsp = 0x7fffffffe508, rbp = 0x4 --- netsmb_dev: loaded lockmgr: thread 0xffffff0072b9c2b0 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_put() at smb_co_put+0x98 smb_vc_put() at smb_vc_put+0x9 smb_sm_lookup() at smb_sm_lookup+0x140 smb_usr_lookup() at smb_usr_lookup+0xb7 nsmb_dev_ioctl() at nsmb_dev_ioctl+0x399 giant_ioctl() at giant_ioctl+0x71 devfs_ioctl_f() at devfs_ioctl_f+0x6f ioctl() at ioctl+0x143 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x80093178c, rsp = 0x7fffffffe1c8, rbp = 0x7fffffffe700 --- nve0: link state changed to UP lockmgr: thread 0xffffff004e627560 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_put() at smb_co_put+0x98 smb_vc_put() at smb_vc_put+0x9 smb_sm_lookup() at smb_sm_lookup+0x140 smb_usr_lookup() at smb_usr_lookup+0xb7 nsmb_dev_ioctl() at nsmb_dev_ioctl+0x399 giant_ioctl() at giant_ioctl+0x71 devfs_ioctl_f() at devfs_ioctl_f+0x6f ioctl() at ioctl+0x143 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x80093178c, rsp = 0x7fffffffe1c8, rbp = 0x7fffffffe700 --- lockmgr: thread 0xffffff0057500810 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_put() at smb_co_put+0x98 smb_vc_put() at smb_vc_put+0x9 smb_sm_lookup() at smb_sm_lookup+0x140 smb_usr_lookup() at smb_usr_lookup+0xb7 nsmb_dev_ioctl() at nsmb_dev_ioctl+0x399 giant_ioctl() at giant_ioctl+0x71 devfs_ioctl_f() at devfs_ioctl_f+0x6f ioctl() at ioctl+0x143 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x80093178c, rsp = 0x7fffffffe1c8, rbp = 0x7fffffffe700 --- lockmgr: thread 0xffffff005db66000 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_unlock() at smb_co_unlock+0x17 smb_vc_unlock() at smb_vc_unlock+0x9 nsmb_dev_ioctl() at nsmb_dev_ioctl+0x3c4 giant_ioctl() at giant_ioctl+0x71 devfs_ioctl_f() at devfs_ioctl_f+0x6f ioctl() at ioctl+0x143 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x80093178c, rsp = 0x7fffffffe1c8, rbp = 0x7fffffffe700 --- lockmgr: thread 0xffffff005db66000 unlocking unheld lock KDB: stack backtrace: lockmgr() at lockmgr+0x6de smb_co_unlock() at smb_co_unlock+0x17 smb_share_unlock() at smb_share_unlock+0x9 nsmb_dev_ioctl() at nsmb_dev_ioctl+0x3f2 giant_ioctl() at giant_ioctl+0x71 devfs_ioctl_f() at devfs_ioctl_f+0x6f ioctl() at ioctl+0x143 syscall() at syscall+0x6b2 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (54, FreeBSD ELF64, ioctl), rip = 0x80093178c, rsp = 0x7fffffffe1c8, rbp = 0x7fffffffe700 --- YuriReceived on Mon Jun 12 2006 - 15:28:55 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:57 UTC