From owner-freebsd-hackers Wed Jun 2 12:39:54 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from etinc.com (et-gw.etinc.com [207.252.1.2]) by hub.freebsd.org (Postfix) with ESMTP id 1E185158E1 for ; Wed, 2 Jun 1999 12:39:42 -0700 (PDT) (envelope-from dennis@etinc.com) Received: from dbsys (dbsys.etinc.com [207.252.1.18]) by etinc.com (8.9.3/8.9.3) with SMTP id PAA28984; Wed, 2 Jun 1999 15:40:41 -0400 (EDT) Message-Id: <199906021940.PAA28984@etinc.com> X-Sender: dennis@etinc.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Wed, 02 Jun 1999 14:36:11 -0400 To: "David E. Cross" , freebsd-hackers@FreeBSD.ORG From: Dennis Subject: Re: 3.2-STABLE, 11th panic Cc: schimken@cs.rpi.edu, crossd@cs.rpi.edu In-Reply-To: <199906021540.LAA15728@cs.rpi.edu> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG JFYI: We are seeing panics with gated running with a big table...seems to be getting memory allocation failure, even though there seems to be plenty of buffers. I dont have any real good info on it yet. Dennis At 11:40 AM 6/2/99 -0400, David E. Cross wrote: >Here is a backtrace from our latest. Does anyone have any ideas to try. Is >there any way to loock at who has the other lock on the file? (Yes, I know >it is the kernel who has it, but it is requested on behalf of a NFSd, no?) > >(kgdb) bt >#0 boot (howto=256) at ../../kern/kern_shutdown.c:285 >#1 0xc014baa4 in at_shutdown ( > function=0xc02354bb <__set_sysuninit_set_sym_M_KTRACE_uninit_sys_uninit+179>, arg=0xc74e9080, queue=65538) at ../../kern/kern_shutdown.c:446 >#2 0xc0147794 in debuglockmgr (lkp=0xc1528400, flags=16842754, > interlkp=0xc74e90f0, p=0xc743eb20, name=0xc0237d57 "vop_stdlock", > file=0xc023804b "../../kern/vfs_subr.c", line=1274) > at ../../kern/kern_lock.c:326 >#3 0xc016d6c1 in vop_stdlock (ap=0xc7482a5c) at ../../kern/vfs_default.c:211 >#4 0xc01e5bfd in ufs_vnoperate (ap=0xc7482a5c) > at ../../ufs/ufs/ufs_vnops.c:2299 >#5 0xc0176635 in debug_vn_lock (vp=0xc74e9080, flags=65538, p=0xc743eb20, > filename=0xc023804b "../../kern/vfs_subr.c", line=1274) at vnode_if.h:811 >#6 0xc01700d1 in vget (vp=0xc74e9080, flags=2, p=0xc743eb20) > at ../../kern/vfs_subr.c:1274 >#7 0xc016c1b3 in vfs_cache_lookup (ap=0xc7482b24) > at ../../kern/vfs_cache.c:439 >#8 0xc01e5bfd in ufs_vnoperate (ap=0xc7482b24) > at ../../ufs/ufs/ufs_vnops.c:2299 >#9 0xc016e7c1 in lookup (ndp=0xc7482d94) at vnode_if.h:31 >#10 0xc01b8260 in nfs_namei (ndp=0xc7482d94, fhp=0xc7482d0c, len=3, > slp=0xc0f7e400, nam=0xc0f541a0, mdp=0xc7482c48, dposp=0xc7482c44, > retdirp=0xc7482c2c, p=0xc743eb20, kerbflag=0, pubflag=0) > at ../../nfs/nfs_subs.c:1642 >#11 0xc01a123f in nfsrv_lookup (nfsd=0xc13d3400, slp=0xc0f7e400, > procp=0xc743eb20, mrq=0xc7482e34) at ../../nfs/nfs_serv.c:396 >#12 0xc01b9cba in nfssvc_nfsd (nsd=0xc7482e94, argp=0x8071af4 "", p=0xc743eb20) > at ../../nfs/nfs_syscalls.c:656 >#13 0xc01b95d5 in nfssvc (p=0xc743eb20, uap=0xc7482f94) > at ../../nfs/nfs_syscalls.c:342 >#14 0xc020d02f in syscall (frame={tf_es = 39, tf_ds = 39, tf_edi = 8, > tf_esi = 0, tf_ebp = -1077944892, tf_isp = -951570460, tf_ebx = 0, > tf_edx = -1077945288, tf_ecx = 0, tf_eax = 155, tf_trapno = 12, > tf_err = 2, tf_eip = 134518940, tf_cs = 31, tf_eflags = 642, > tf_esp = -1077945280, tf_ss = 39}) at ../../i386/i386/trap.c:1100 >#15 0xc0203e5c in Xint0x80_syscall () >#16 0x80480e9 in ?? () > >-- >David Cross | email: crossd@cs.rpi.edu >Systems Administrator/Research Programmer | Web: http://www.cs.rpi.edu/~crossd >Rensselaer Polytechnic Institute, | Ph: 518.276.2860 >Department of Computer Science | Fax: 518.276.4033 >I speak only for myself. | WinNT:Linux::Linux:FreeBSD > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-hackers" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message