From owner-freebsd-hackers@FreeBSD.ORG Sat Apr 3 16:52:43 2010 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3422C106564A for ; Sat, 3 Apr 2010 16:52:43 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from mail.zoral.com.ua (mx0.zoral.com.ua [91.193.166.200]) by mx1.freebsd.org (Postfix) with ESMTP id 959268FC0C for ; Sat, 3 Apr 2010 16:52:42 +0000 (UTC) Received: from deviant.kiev.zoral.com.ua (root@deviant.kiev.zoral.com.ua [10.1.1.148]) by mail.zoral.com.ua (8.14.2/8.14.2) with ESMTP id o33Gqcov084619 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 3 Apr 2010 19:52:38 +0300 (EEST) (envelope-from kostikbel@gmail.com) Received: from deviant.kiev.zoral.com.ua (kostik@localhost [127.0.0.1]) by deviant.kiev.zoral.com.ua (8.14.4/8.14.4) with ESMTP id o33Gqc4p043589; Sat, 3 Apr 2010 19:52:38 +0300 (EEST) (envelope-from kostikbel@gmail.com) Received: (from kostik@localhost) by deviant.kiev.zoral.com.ua (8.14.4/8.14.4/Submit) id o33Gqcff043588; Sat, 3 Apr 2010 19:52:38 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: deviant.kiev.zoral.com.ua: kostik set sender to kostikbel@gmail.com using -f Date: Sat, 3 Apr 2010 19:52:38 +0300 From: Kostik Belousov To: Petr Salinger Message-ID: <20100403165238.GO2415@deviant.kiev.zoral.com.ua> References: <20100402190239.GL2415@deviant.kiev.zoral.com.ua> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="6o5AAeie4QQ7Mfd3" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i X-Virus-Scanned: clamav-milter 0.95.2 at skuns.kiev.zoral.com.ua X-Virus-Status: Clean X-Spam-Status: No, score=-3.8 required=5.0 tests=ALL_TRUSTED,AWL,BAYES_00, DNS_FROM_OPENWHOIS autolearn=no version=3.2.5 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on skuns.kiev.zoral.com.ua Cc: freebsd-hackers@freebsd.org Subject: Re: leak of the vnodes X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Apr 2010 16:52:43 -0000 --6o5AAeie4QQ7Mfd3 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Apr 03, 2010 at 09:16:54AM +0200, Petr Salinger wrote: > >>Another possible workaround, if you do not need path resolutions in /pr= oc > >>or lsof(1), is to set sysctl vfs.vlru_allow_cache_src=3D1. > > > >I will test this. >=20 > Does not help. >=20 > kern.maxvnodes: 100000 > kern.minvnodes: 25000 > vfs.vlru_allow_cache_src: 1 > vfs.freevnodes: 199 > vfs.wantfreevnodes: 25000 > vfs.numvnodes: 100038 > debug.vnlru_nowhere: 647 Can you go into single-user mode, and then start unmounting filesystems one by one, looking at the vfs.numvnodes ? The goal is to determine which fs caused exhaustion of the vnodes limit. Then, after you determined the problematic mp, reboot the machine, redo the procedure causing leak. From ddb prompt, you can do "show mount", find the mp, then do "show mount ". The later command shall produce really large output, listing all mp vnodes, so serial console or firewire can be useful. Put output somewhere. Thanks. --6o5AAeie4QQ7Mfd3 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iEYEARECAAYFAku3clUACgkQC3+MBN1Mb4gpngCgjSc4XPijCIW0eCxSsFiegN+8 wg4AnjRsTwd77kkjCQOMAZv7zzKkkO9k =q69I -----END PGP SIGNATURE----- --6o5AAeie4QQ7Mfd3--