From owner-freebsd-fs@FreeBSD.ORG Fri Jul 4 19:47:53 2014 Return-Path: Delivered-To: freebsd-fs@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D6EC34E1 for ; Fri, 4 Jul 2014 19:47:53 +0000 (UTC) Received: from venus.codepro.be (venus.codepro.be [IPv6:2a01:4f8:162:1127::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.codepro.be", Issuer "Gandi Standard SSL CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9C9F82B70 for ; Fri, 4 Jul 2014 19:47:52 +0000 (UTC) Received: from vega.codepro.be (unknown [172.16.1.3]) by venus.codepro.be (Postfix) with ESMTP id 7CFE91A421 for ; Fri, 4 Jul 2014 21:47:50 +0200 (CEST) Received: by vega.codepro.be (Postfix, from userid 1001) id 5BC402DAC; Fri, 4 Jul 2014 21:47:50 +0200 (CEST) Date: Fri, 4 Jul 2014 21:47:50 +0200 From: Kristof Provost To: freebsd-fs@freebsd.org Subject: ZFS panic on zvol resize Message-ID: <20140704194750.GU75721@vega.codepro.be> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline X-PGP-Fingerprint: E114 D9EA 909E D469 8F57 17A5 7D15 91C6 9EFA F286 X-Checked-By-NSA: Probably User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Jul 2014 19:47:53 -0000 Hi, On current r268263 (and also on stable-10 r268263) I can reliably panic the machine by simply attempting to resize a zvol: # zfs create tank/zvol # zfs set mountpoint=none tank/zvol # zfs create -V100G tank/zvol/disk0 # zfs set volsize=200G tank/zvol/disk0 It produces the following panic: panic: solaris assert: !rrw_held(&dp->dp_config_rwlock, RW_READER), file: /usr/src/sys/modules/zfs/../../cddl/contrib/opensolaris/uts/common/fs/zfs/dsl_pool.c, line: 1120 cpuid = 1 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01217d54b0 kdb_backtrace() at kdb_backtrace+0x39/frame 0xfffffe01217d5560 vpanic() at vpanic+0x126/frame 0xfffffe01217d55a0 panic() at panic+0x43/frame 0xfffffe01217d5600 assfail() at assfail+0x1d/frame 0xfffffe01217d5610 dsl_pool_hold() at dsl_pool_hold+0x67/frame 0xfffffe01217d5650 dmu_objset_hold() at dmu_objset_hold+0x21/frame 0xfffffe01217d5690 dsl_prop_get_integer() at dsl_prop_get_integer+0x28/frame 0xfffffe01217d56d0 zvol_set_volsize() at zvol_set_volsize+0x126/frame 0xfffffe01217d5760 zfs_prop_set_special() at zfs_prop_set_special+0x2e2/frame 0xfffffe01217d57f0 zfs_set_prop_nvlist() at zfs_set_prop_nvlist+0x23f/frame 0xfffffe01217d5880 zfs_ioc_set_prop() at zfs_ioc_set_prop+0x106/frame 0xfffffe01217d58e0 zfsdev_ioctl() at zfsdev_ioctl+0x6ee/frame 0xfffffe01217d5990 devfs_ioctl_f() at devfs_ioctl_f+0xfb/frame 0xfffffe01217d59f0 kern_ioctl() at kern_ioctl+0x22b/frame 0xfffffe01217d5a50 sys_ioctl() at sys_ioctl+0x13c/frame 0xfffffe01217d5aa0 amd64_syscall() at amd64_syscall+0x25a/frame 0xfffffe01217d5bb0 Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe01217d5bb0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8019e89ba, rsp = 0x7fffffffb8c8, rbp = 0x7fffffffb940 --- Uptime: 2m18s Automatic reboot in 15 seconds - press a key on the console to abort Please let me know if there's any other information which could be helpful, or any patch I could test. Regards, Kristof