From owner-freebsd-hackers Tue Nov 12 21:05:54 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id VAA25026 for hackers-outgoing; Tue, 12 Nov 1996 21:05:54 -0800 (PST) Received: from root.com (implode.root.com [198.145.90.17]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id VAA25017 for ; Tue, 12 Nov 1996 21:05:50 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by root.com (8.7.6/8.6.5) with SMTP id VAA07192; Tue, 12 Nov 1996 21:04:57 -0800 (PST) Message-Id: <199611130504.VAA07192@root.com> X-Authentication-Warning: implode.root.com: Host localhost [127.0.0.1] didn't use HELO protocol To: Michael Hancock cc: Thomas David Rivers , FreeBSD Hackers Subject: Re: Even more info on daily panics... In-reply-to: Your message of "Wed, 13 Nov 1996 13:52:14 +0900." From: David Greenman Reply-To: dg@root.com Date: Tue, 12 Nov 1996 21:04:57 -0800 Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk >IMHO, it's not good to speculate. You need to confirm with absolute >certainty that the patch is what actually fixed it. > >You might want to do either of the following: > >1) Remove the patch and see if what happens. > >2) Put in print statements and see if the relevent section of code ever >gets executed. See other #ifdef DIAGNOSTICS for examples of how to do >this. I think vrele() had one. I would also like to hear an explaination of how it is possible, after the patch to vrele to prevent it from going negative, for a vnode with a non-zero v_usecount can be on the freelist in the first place. -DG David Greenman Core-team/Principal Architect, The FreeBSD Project