Opened 14 years ago

Last modified 3 years ago

#5496 closed bug

PANIC: dec_vnode_ref_count: called on busy vnode 0x819517f8 — at Initial Version

Reported by: mvfranz Owned by: nobody
Priority: normal Milestone: R1/beta3
Component: File Systems/NFS Version: R1/Development
Keywords: nfs Cc: jessica.l.hamilton@…
Blocked By: Blocking:
Platform: All

Description

I have finally been able to figure out how to mount an nfs share from a linux server. When I was testing the write ability I opened a file on the share with vi and received a kernel panic. This is version hrev35621

nfs_getattr PANIC: dec_vnode_ref_count: called on busy vnode 0x819517f8

Welcome to Kernel Debugging Land... Thread 204 "vi" running on CPU 0 kdebug> bt stack trace for thread 204 "vi"

kernel stack: 0x80d19000 to 0x80d1d000

user stack: 0x7efef000 to 0x7ffef000

frame caller <image>:function + offset

0 80d1cb98 (+ 32) 8006eaa9 <kernel_x86> invoke_command_trampoline(void*: [34m0x80d1cc18[0m) + 0x0015 1 80d1cbb8 (+ 12) 800e195c <kernel_x86>:arch_debug_call_with_fault_handler + 0x001b 2 80d1cbc4 (+ 48) 8006c980 <kernel_x86>:debug_call_with_fault_handler + 0x0051 3 80d1cbf4 (+ 64) 8006ee26 <kernel_x86>:invoke_debugger_command + 0x00bb 4 80d1cc34 (+ 48) 8006ef43 <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: [34m0x80134622[0m, int32: [34m0[0m, char*: NULL) + 0x0083 5 80d1cc64 (+ 32) 8006f00b <kernel_x86>:invoke_debugger_command_pipe + 0x008b 6 80d1cc84 (+ 128) 80072d96 <kernel_x86> ExpressionParser<[32m0x80d1cd54[0m>::_ParseCommandPipe(int&: [34m0x80d1cd50[0m) + 0x0aae 7 80d1cd04 (+ 48) 8007555f <kernel_x86> ExpressionParser<[32m0x80d1cd54[0m>::EvaluateCommand(char const*: [34m0x80134620[0m [36m"bt"[0m, int&: [34m0x80d1cd50[0m) + 0x06df 8 80d1cd34 (+ 192) 800756d8 <kernel_x86>:evaluate_debug_command + 0x0084 9 80d1cdf4 (+ 64) 8006d625 <kernel_x86> kernel_debugger_loop(char const*: [34m0x0[0m [31m"<NULL>"[0m, char const*: [34m0x80129cf6[0m [36m"PANIC: "[0m, char*: [34m0x80d1ce64[0m, int32: [34m-2147035189[0m) + 0x026c

10 80d1ce34 (+ 48) 8006d7e9 <kernel_x86> kernel_debugger_internal(char const*: [34m0x0[0m [31m"<NULL>"[0m, char const*: [34m0x819516ac[0m [36m")ªÄ"[0m, char*: [34m0x80d1ce84[0m, int32: [34m-2147034695[0m) + 0x011c 11 80d1ce64 (+ 32) 8006d9cc <kernel_x86>:panic + 0x0023 12 80d1ce84 (+ 48) 800a9a0a <kernel_x86> dec_vnode_ref_count(vnode*: NULL, [34mtrue[0m, [34mtrue[0m) + 0x0086 13 80d1ceb4 (+ 16) 800aa3de <kernel_x86> file_free_fd(file_descriptor*: [34m0x81949fc8[0m) + 0x0050 14 80d1cec4 (+ 32) 8009ac6a <kernel_x86>:put_fd + 0x002d 15 80d1cee4 (+ 48) 8009adae <kernel_x86>:close_fd_index + 0x009b 16 80d1cf14 (+ 32) 8009ae0e <kernel_x86> common_close(int32: [34m-2146420752[0m, [34mfalse[0m) + 0x0033 17 80d1cf34 (+ 16) 8009ae3b <kernel_x86>:_user_close + 0x0013 18 80d1cf44 (+ 100) 800e1f32 <kernel_x86>:handle_syscall + 0x00af user iframe at 0x80d1cfa8 (end = 0x80d1d000)

eax 0x8c ebx 0x6538a8 ecx 0x7ffede9c edx 0xffff0114 esi 0x1803d100 edi 0x4 ebp 0x7ffedeb8 esp 0x80d1cfdc eip 0xffff0114 eflags 0x212 user esp 0x7ffede9c vector: 0x63, error code: 0x0

19 80d1cfa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004 20 7ffedeb8 (+3296) 00291e71 <_APP_>:ml_close_all (nearest) + 0x0486 21 7ffeeb98 (+ 64) 0029267f <_APP_>:ml_open_file + 0x0062 22 7ffeebd8 (+ 32) 0029275e <_APP_>:check_need_swap + 0x003c 23 7ffeebf8 (+ 512) 00275942 <_APP_>:readfile + 0x0785 24 7ffeedf8 (+ 112) 0022d1db <_APP_>:open_buffer + 0x0103 25 7ffeee68 (+ 256) 0028a10e <_APP_>:main + 0x181d 26 7ffeef68 (+ 52) 0022786d <_APP_>:_start + 0x0051 27 7ffeef9c (+ 64) 00105367 </boot/system/runtime_loader@0x00100000>:unknown + 0x5367 28 7ffeefdc (+ 0) 7ffeefec 2831:vi_main_stack@0x7efef000 + 0xffffec

Change History (0)

Note: See TracTickets for help on using tickets.