Re: patchset-10 release (Re: [unionfs][patch] improvements of the unionfs - Problem Report, kern/91010)

2006-04-05 Thread Kris Kennaway
On Wed, Apr 05, 2006 at 10:46:59PM +0900, Daichi GOTO wrote:
> It is my pleasure and honor to announce the availability of
> the unionfs patchset-10.
> 
> Patchset-10:
>For 7-current
>  http://people.freebsd.org/~daichi/unionfs/unionfs-p10.diff
> 
>For 6.x
>  http://people.freebsd.org/~daichi/unionfs/unionfs6-p10.diff

Thanks for your continued work!

I get this panic with mount_unionfs -b:

kdb_backtrace(ebf369e8,c056b59a,c06c905a,c06e297e,c72d7000) at 
kdb_backtrace+0x29
vfs_badlock(c06c905a,c06e297e,c72d7000) at vfs_badlock+0x11
assert_vop_locked(c72d7000,c06e297e,c72d7000,c06e297e) at assert_vop_locked+0x4a
VOP_OPEN_APV(c0710da0,ebf36a28) at VOP_OPEN_APV+0x8e
union_open(ebf36a78,ebf36b20,c74e0930,ebf36ae4,c04f884b) at union_open+0xe2
VOP_OPEN_APV(c06f83a0,ebf36a78) at VOP_OPEN_APV+0x9b
exec_check_permissions(ebf36b90,9,1,0,0) at exec_check_permissions+0xeb
do_execve(c6658bd0,ebf36c60,0,ebf36c60,c6658bd0) at do_execve+0x18a
kern_execve(c6658bd0,ebf36c60,0) at kern_execve+0x7c
execve(c6658bd0,ebf36d04,c6bb5d38,c,c6658bd0) at execve+0x2f
syscall(3b,3b,3b,bfbfe90c,0) at syscall+0x27e
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (59, FreeBSD ELF32, execve), eip = 0x280d3dfb, esp = 0xbfbfe35c, 
ebp = 0xbfbfe808 ---
VOP_OPEN: 0xc72d7000 is not locked but should be

Kris


pgpT06o7pznR0.pgp
Description: PGP signature


Re: patchset-10 release (Re: [unionfs][patch] improvements of the unionfs - Problem Report, kern/91010)

2006-04-06 Thread Daichi GOTO
Kris Kennaway wrote:
> I get this panic with mount_unionfs -b:

We cannot get the same kernel panic error. Please give us
a how-to-repeat-the-same-problem in simple way.

> kdb_backtrace(ebf369e8,c056b59a,c06c905a,c06e297e,c72d7000) at 
> kdb_backtrace+0x29
> vfs_badlock(c06c905a,c06e297e,c72d7000) at vfs_badlock+0x11
> assert_vop_locked(c72d7000,c06e297e,c72d7000,c06e297e) at 
> assert_vop_locked+0x4a
> VOP_OPEN_APV(c0710da0,ebf36a28) at VOP_OPEN_APV+0x8e
> union_open(ebf36a78,ebf36b20,c74e0930,ebf36ae4,c04f884b) at union_open+0xe2
> VOP_OPEN_APV(c06f83a0,ebf36a78) at VOP_OPEN_APV+0x9b
> exec_check_permissions(ebf36b90,9,1,0,0) at exec_check_permissions+0xeb
> do_execve(c6658bd0,ebf36c60,0,ebf36c60,c6658bd0) at do_execve+0x18a
> kern_execve(c6658bd0,ebf36c60,0) at kern_execve+0x7c
> execve(c6658bd0,ebf36d04,c6bb5d38,c,c6658bd0) at execve+0x2f
> syscall(3b,3b,3b,bfbfe90c,0) at syscall+0x27e
> Xint0x80_syscall() at Xint0x80_syscall+0x1f
> --- syscall (59, FreeBSD ELF32, execve), eip = 0x280d3dfb, esp = 0xbfbfe35c, 
> ebp = 0xbfbfe808 ---
> VOP_OPEN: 0xc72d7000 is not locked but should be
> 
> Kris

-- 
  Daichi GOTO, http://people.freebsd.org/~daichi
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"