tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
5.99.30 sparc panic during startup
Hi,
Matthew Green sent me here with a -current issue on sparc which appears to
be something else than the ususal post-netbsd-4 SMP issues on the platform.
The full boot log is here
<http://la.causeuse.org/hauke/NetBSD/sparc-smp/PIZZA_UP_PF.5_99_30>, the
corresponding kernel configs are here
<http://la.causeuse.org/hauke/NetBSD/sparc-smp/PIZZA_UP_PF> and here
<http://la.causeuse.org/hauke/NetBSD/sparc-smp/PIZZA>.
The panic bit is
<snip>
[...]
Setting tty flags.
pfctl: DIOCADDRULE: Operation not supported by device
Setting sysctl variables:
net.inet.tcp.rfc1323: 1 -> 0
net.inet.tcp.mss_ifmtu: 0 -> 1
net.inet.ip.forwarding: 1 -> 1
net.inet.ip.redirect: 1 -> 0
net.inet.ip.do_loopback_cksum: 0 -> 1
net.inet.tcp.do_loopback_cksum: 0 -> 1
net.inet.udp.do_loopback_cksum: 0 -> 1
kern.logsigexit: 1 -> 1
kern.maxproc: 1044 -> 4096
Starting network.
Hostname: pizza.causeuse.org
NIS domainname: Forstquelle
Configuring network interfaces: hmeMutex error: lockdebug_wantlock: locking
against myself
lock address : 0x00000000f036b8c8 type : spin
initialized : 0x00000000f01da1a0
shared holds : 0 exclusive: 1
shares wanted: 0 exclusive: 1
current cpu : 0 last held: 0
current lwp : 0x00000000f36142c0 last held: 0x00000000f36142c0
last locked : 0x00000000f01d7464 unlocked : 0x00000000f01d7ff4
owner field : 0x000000000007ff00 wait/spin: 0/1
panic: LOCKDEBUG
Stopped in pid 177.1 (sh) at netbsd:cpu_Debugger+0x4: or %o7, %g0, %g1
db> t
cpu_Debugger(0xf0309988, 0x0, 0xf02d5fc8, 0xf0338c00, 0xf0388000, 0x104) at
netbsd:lockdebug_abort1+0xa4
lockdebug_abort1(0xf36b5908, 0xf00, 0xf02d5fc8, 0xf02f0028, 0x1, 0x1) at
netbsd:mutex_enter+0x280
mutex_enter(0xf036b8c8, 0x0, 0xf036b8c8, 0xf36142c0, 0xf0002000, 0x1) at
netbsd:config_alldevs_lock+0xc
config_alldevs_lock(0x0, 0x700, 0x0, 0x0, 0x0, 0xf416c660) at
netbsd:device_lookup+0x4
device_lookup(0xf0335ebc, 0x0, 0x37f, 0xf0307208, 0x0, 0x0) at
netbsd:device_lookup_private+0x8
device_lookup_private(0xf0335ebc, 0x0, 0x0, 0xf0307000, 0xffffffff,
0xf416c478) at netbsd:zshard+0x28
zshard(0x0, 0xf028fc0c, 0xf00, 0x408000e3, 0xf0002000, 0x0) at
netbsd:sparc_interrupt44c+0x1a4
sparc_interrupt44c(0xf036b8c8, 0xf01d803c, 0x0, 0x0, 0xf036b8c8, 0x0) at
netbsd:lockdebug_unlocked
lockdebug_unlocked(0xf036b8c8, 0xf0307e78, 0xf036b8c8, 0xf0307f80,
0xf416c7f4, 0x1) at netbsd:device_lookup+0x98
device_lookup(0xf4167270, 0x0, 0x1, 0xf36142c0, 0x0, 0x1) at
netbsd:device_lookup_private+0x8
device_lookup_private(0xf033607c, 0x0, 0x0, 0xf36142c0, 0xf0002000, 0x1) at
netbsd:sdstrategy+0x24
sdstrategy(0xf0d91f00, 0x700, 0x0, 0x0, 0x0, 0xf416c660) at
netbsd:bdev_strategy+0x20
bdev_strategy(0xf0d91f00, 0x0, 0x37f, 0xf0307208, 0x0, 0x0) at
netbsd:spec_strategy+0x60
spec_strategy(0x0, 0x1, 0x0, 0xf0307000, 0xffffffff, 0xf416c478) at
netbsd:VOP_STRATEGY+0x20
VOP_STRATEGY(0xf361dda8, 0xf0d91f00, 0x0, 0x0, 0x0, 0x0) at
netbsd:genfs_getpages+0x11ec
genfs_getpages(0xf416c6d0, 0x0, 0x1, 0xf42d1ad0, 0xf0d91f00, 0x0) at
netbsd:VOP_GETPAGES+0x4c
VOP_GETPAGES(0xf42d1ad0, 0x0, 0x0, 0xf416c7e8, 0xf416c7f4, 0x0) at
netbsd:uvn_get+0xdc
uvn_get(0xf42d1ad0, 0x1802, 0x0, 0xf416c7e8, 0xf416c7f4, 0x0) at
netbsd:ubc_fault+0x168
ubc_fault(0xf416c908, 0xf416c780, 0x0, 0xf416c908, 0x1, 0x8) at
netbsd:uvm_fault_internal+0x460
uvm_fault_internal(0x0, 0x1, 0xf3add000, 0x0, 0xf0389408, 0xf0312800) at
netbsd:mem_access_fault4m+0x23c
mem_access_fault4m(0x9, 0x326, 0xf3add000, 0xf416ca70, 0x0, 0x19) at 0xf00062d4
0xf00062d4(0xf3add001, 0xefffccb7, 0x0, 0xf416b000, 0xf0007dd8, 0xefffccb7)
at netbsd:copyout+0x28
copyout(0xf361ad20, 0xf3add000, 0xefffccb7, 0x1, 0xf036e880, 0xf036e880) at
netbsd:uiomove+0x9c
uiomove(0xf3add000, 0x1, 0xf416ce20, 0xf416cc1c, 0x0, 0x101) at
netbsd:ubc_uiomove+0xdc
ubc_uiomove(0x0, 0xf416ce20, 0x1, 0x0, 0x101, 0x7f) at netbsd:ffs_read+0x52c
ffs_read(0x0, 0x1, 0xf416cd3c, 0xf030c960, 0x0, 0x19) at netbsd:VOP_READ+0x28
VOP_READ(0xf42d1ad0, 0xf416ce20, 0x0, 0xf3607f18, 0x0, 0x19) at
netbsd:vn_read+0x80
vn_read(0xf4188ec0, 0xf4188ec0, 0xf416ce20, 0xf3607f18, 0x1, 0x33010) at
netbsd:dofileread+0x5c
dofileread(0x16, 0xf4188ec0, 0xefffccb7, 0x1, 0xf4188ec0, 0x1) at
netbsd:sys_read+0x54
sys_read(0xf36142c0, 0xf416cf20, 0xf416cf40, 0x0, 0x0, 0x36c0c) at
netbsd:syscall_plain+0xe0
syscall_plain(0x403, 0xf416cfb0, 0x400f4880, 0xf36142c0, 0x0, 0x19) at
0xf00066d8
db>
</snip>
An SMP kernel produced a fairly similar stack trace at a different point
during the boot (log at
<http://la.causeuse.org/hauke/NetBSD/sparc-smp/PIZZA_PF.5_99_30>).
Does the above ring a bell for anybody?
hauke
--
"It's never straight up and down" (DEVO)
Home |
Main Index |
Thread Index |
Old Index