From owner-freebsd-stable@FreeBSD.ORG Mon Nov 24 15:45:28 2014 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 373CA5AB for ; Mon, 24 Nov 2014 15:45:28 +0000 (UTC) Received: from brookie.cotcomsol.com (brookie.cotcomsol.com [69.144.98.236]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.cottonwoodcomputer.com", Issuer "Starfield Secure Certification Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id D6C806A0 for ; Mon, 24 Nov 2014 15:45:27 +0000 (UTC) Received: from [172.16.4.10] (timon [172.16.16.1]) (authenticated bits=0) by brookie.cotcomsol.com (8.14.7/8.14.7) with ESMTP id sAOFjHnT037980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Mon, 24 Nov 2014 08:45:18 -0700 (MST) (envelope-from brock@cottonwoodcomputer.com) Message-ID: <5473528D.4090003@cottonwoodcomputer.com> Date: Mon, 24 Nov 2014 08:45:17 -0700 From: Brock Williams Organization: Cottonwood Computer Solutions, Inc. User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0 MIME-Version: 1.0 To: freebsd-stable@freebsd.org Subject: nightly panic after upgrade to 10.1-RELEASE - avl_find() succeeded inside avl_add() Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="n3Ie0bQamHOQOL18q4MBm4OUp4MXEpCLf" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (brookie.cotcomsol.com [172.16.16.2]); Mon, 24 Nov 2014 08:45:18 -0700 (MST) X-Spam-Status: No, score=-1.0 required=8.0 tests=ALL_TRUSTED autolearn=disabled version=3.3.2 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on brookie.cotcomsol.com X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Nov 2014 15:45:28 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --n3Ie0bQamHOQOL18q4MBm4OUp4MXEpCLf Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable This has happened every night since we upgraded this server to 10.1-RELEASE. It's zfs only and has a bunch of backup jobs that run to it at night so I'm assuming it's related to higher disk load. panic: avl_find() succeeded inside avl_add() cpuid =3D 4 KDB: stack backtrace: #0 0xffffffff80963000 at kdb_backtrace+0x60 #1 0xffffffff80928125 at panic+0x155 #2 0xffffffff81956c04 at avl_add+0x84 #3 0xffffffff81a1f71b at trim_map_write_start+0x27b # Dump failed. Partition too small. Any ideas? I don't have a dedicated swap partition or an extra disk at the moment to get a dump, only swap on zvol. But I can probably arrange that if it would be helpful. Thanks, Brock --=20 Brock Williams brock@cottonwoodcomputer.com Cottonwood Computer Solutions, Inc. www.cottonwoodcomputer.com 406-896-4910 --n3Ie0bQamHOQOL18q4MBm4OUp4MXEpCLf Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJUc1KNAAoJEAej1IqUgufIriwH/A8lXP96+szr9g8E4qFuCekh ubL4+fKLq1QdxQ8WQ/XUkxRpOsDhZeEPrLM1FzXtMnRdZ0UvtziytxnLZ5br+dOf l956JjrN2ZFBkmbrSUidGwdPPncEsQuR+YZsyuu6jNUlSbp9QEyU/OTuLhqFUKm+ xEwKXinYVqks+r3S+tEe39q+ch7Yf2Bkfwn1wO/K4l1aLmFoqW7VT4H3gl84dP/K NQtta3uZOkaQCFjgvh1mWWHmvRtSmxMb3hFtUOE0KNQ9vRAiD2dqgQuMHqmCF8h6 WxGpmzJFwE1xxT2cGpA9bgGV5yhhx+LNenJeVpkOE+C/GYVpuOmCY1rsiIRlE4Y= =xRlR -----END PGP SIGNATURE----- --n3Ie0bQamHOQOL18q4MBm4OUp4MXEpCLf--