sparc64/104428: nullfs panics on E4500 (but not E420)
Matthew.Jacob at ns1.feral.com
Matthew.Jacob at ns1.feral.com
Sat Oct 14 22:20:19 PDT 2006
>Number: 104428
>Category: sparc64
>Synopsis: nullfs panics on E4500 (but not E420)
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: freebsd-sparc64
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Sun Oct 15 05:20:16 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator: Matthew Jacob
>Release: FreeBSD 7.0-CURRENT sparc64
>Organization:
Feral Software
>Environment:
System: FreeBSD e4500.in1.lcl 7.0-CURRENT FreeBSD 7.0-CURRENT #0: Sat Oct 14 10:54:43 PDT 2006 mjacob at borgward.in1.lcl:/home/FreeBSD/FreeBSD-current/src/sys/sparc64/compile/GENERIC sparc64
>Description:
Tried to mount a local ufs directory as a nullfs on top of
NFS. Works fine every where else. Panics here:
login: panic: blockable sleep lock (sleep mutex) system map @ vm/vm_map.c:3073
cpuid = 3
KDB: enter: panic
[thread pid 776 tid 100135 ]
Stopped at kdb_enter+0x3c: ta %xcc, 1
db> bt
Tracing pid 776 tid 100135 td 0xfffff80029d17020
panic() at panic+0x164
witness_checkorder() at witness_checkorder+0xc8
_mtx_lock_flags() at _mtx_lock_flags+0xa0
_vm_map_lock_read() at _vm_map_lock_read+0x1c
vm_map_lookup() at vm_map_lookup+0x1c
vm_fault() at vm_fault+0x68
trap_pfault() at trap_pfault+0x1a8
trap() at trap+0x2b8
-- fast data access mmu miss tar=0x424000 %o7=0xc01ef544 --
malloc_type_zone_allocated() at malloc_type_zone_allocated+0xc
malloc() at malloc+0x10c
hashinit() at hashinit+0x44
nullfs_init() at nullfs_init+0x18
vfs_register() at vfs_register+0x284
vfs_modevent() at vfs_modevent+0x30
module_register_init() at module_register_init+0x78
linker_file_sysinit() at linker_file_sysinit+0x104
linker_load_file() at linker_load_file+0x10c
linker_load_module() at linker_load_module+0xcc
kern_kldload() at kern_kldload+0x88
vfs_byname_kld() at vfs_byname_kld+0x20
vfs_domount() at vfs_domount+0x118
vfs_donmount() at vfs_donmount+0x44c
nmount() at nmount+0xac
syscall() at syscall+0x2a0
-- syscall (378, FreeBSD ELF64, nmount) %o7=0x100ee8 --
userland() at 0x403a4b68
user trace: trap %o7=0x100ee8
pc 0x403a4b68, sp 0x7fdffffd571
pc 0x100b58, sp 0x7fdffffdea1
pc 0x4020bcb4, sp 0x7fdffffdf61
done
>How-To-Repeat:
See above
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-sparc64
mailing list