From owner-freebsd-hackers@FreeBSD.ORG Wed Apr 7 12:20:08 2010 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 094AE106566B for ; Wed, 7 Apr 2010 12:20:08 +0000 (UTC) (envelope-from Petr.Salinger@seznam.cz) Received: from relay.felk.cvut.cz (relay.felk.cvut.cz [147.32.80.7]) by mx1.freebsd.org (Postfix) with ESMTP id B5DB48FC13 for ; Wed, 7 Apr 2010 12:20:06 +0000 (UTC) Received: from sci.felk.cvut.cz (sci.felk.cvut.cz [147.32.83.100]) by relay.felk.cvut.cz (8.14.3/8.14.3) with ESMTP id o37CJsdk077264 for ; Wed, 7 Apr 2010 14:19:54 +0200 (CEST) (envelope-from Petr.Salinger@seznam.cz) Date: Wed, 7 Apr 2010 16:25:52 +0200 (CEST) From: Petr Salinger X-X-Sender: salinger@sci.felk.cvut.cz To: freebsd-hackers@freebsd.org In-Reply-To: <20100407095928.GG2415@deviant.kiev.zoral.com.ua> Message-ID: References: <20100405185924.GS2415@deviant.kiev.zoral.com.ua> <20100406092429.GV2415@deviant.kiev.zoral.com.ua> <20100406140308.GY2415@deviant.kiev.zoral.com.ua> <20100406140852.GZ2415@deviant.kiev.zoral.com.ua> <20100406144402.GB2415@deviant.kiev.zoral.com.ua> <20100406210321.GE2415@deviant.kiev.zoral.com.ua> <20100407095928.GG2415@deviant.kiev.zoral.com.ua> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-FELK-MailScanner-Information: X-MailScanner-ID: o37CJsdk077264 X-FELK-MailScanner: Found to be clean X-FELK-MailScanner-SpamCheck: not spam, SpamAssassin (not cached, score=-1.121, required 5, BAYES_00 -1.90, SPF_NEUTRAL 0.78) X-FELK-MailScanner-From: petr.salinger@seznam.cz X-FELK-MailScanner-To: freebsd-hackers@freebsd.org X-FELK-MailScanner-Watermark: 1271247595.83839@zKFczPdhRcAvUiMq8/ucKQ X-Spam-Status: No Subject: Re: leak of the vnodes X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Apr 2010 12:20:08 -0000 >> I used the attached diff, with hackish snooping >> on allocated/freed memory for vnodes. When the vp pointer have been >> logged as active1/active2, it is (much) later shown with >> dead_vnodeops in DUMP_VP(). > Is there a lot of such /dev/ttyp* vnodes ? This indeed might be > suspicious. See below for description of how to check that the > vnodes are leaked or not. In VP_DUMP, there have been 90% nodes of this type: 40285 active 0xffffff00164855a0 tag devfs type 8 flags 00000080 use count 1 hold count 1 19410 active 0xffffff0024522d20 tag devfs type 8 flags 00000080 use count 1 hold count 1 258526 active 0xffffff000a93b960 tag devfs type 8 flags 00000080 use count 1 hold count 1 257411 active 0xffffff00245d8b40 tag devfs type 8 flags 00000080 use count 1 hold count 1 247494 active 0xffffff0016c7d780 tag devfs type 8 flags 00000080 use count 1 hold count 1 None of other line have VI_DOOMED set. The tag in my output is devfs, due to commented out vp->v_tag = "none"; I do not know, what the previous name (like ptyp*) have been. Petr