Subject: port-sparc/12303: crash in genfs_vnops.c [file system got full]
To: None <gnats-bugs@gnats.netbsd.org>
From: None <Christos.Zoulas@Blink.com>
List: netbsd-bugs
Date: 02/28/2001 14:45:10
>Number:         12303
>Category:       port-sparc
>Synopsis:       crash in genfs_vnops.c [file system got full]
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    port-sparc-maintainer
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Feb 28 11:46:00 PST 2001
>Closed-Date:
>Last-Modified:
>Originator:     Christos Zoulas
>Release:        2001-02-21
>Organization:
	chaos
>Environment:
Architecture: sparc
Machine: sparc
>Description:
	Disk filled up and kernel assertion failed at line 0x3d3 genfs_vnops.c
Traceback:
db> t
__assert(0xf01fe960, 0xf01fe888, 0x3d3, 0xf01fe9b0, 0x0, 0x0) at __assert+0x18
genfs_putpages(0xf67aa760, 0xf0076eac, 0x0, 0x1000, 0x0, 0x0) at genfs_putpages+
0x130
VOP_PUTPAGES(0xf659c440, 0xf67aa760, 0x1, 0x21, 0x0, 0x1000) at VOP_PUTPAGES+0x3
4
uvn_put(0xf659c440, 0xf67aa760, 0x1, 0x21, 0xf019280c, 0x1000) at uvn_put+0x14
uvm_pager_put(0xf659c440, 0xf0691478, 0xf67aa75c, 0xf67aa758, 0x21, 0xf67aa760) a
t uvm_pager_put+0x98
uvn_flush(0x0, 0x0, 0xf0691478, 0x0, 0x3, 0x1) at uvn_flush+0x508
ufs_balloc_range(0x1c, 0xf67aabe0, 0x0, 0x1000, 0xf0210c00, 0xf0210c00) at ufs_b
alloc_range+0x54c
ffs_write(0x0, 0xf67aae28, 0xf0721800, 0xf661db70, 0xf67aad30, 0x0) at ffs_write
+0x264
VOP_WRITE(0xf659c440, 0xf67aae28, 0x13, 0xf07c3380, 0x0, 0x1000) at VOP_WRITE+0x
30
vn_write(0xe, 0xf64c0b58, 0xf67aae28, 0xf07c3380, 0x1, 0xf00729d8) at vn_write+0
xc4
dofilewrite(0xf6659030, 0x4, 0xf64c0b38, 0xf35, 0xf35, 0xf64c0b58) at dofilewrit
e+0x8c
sys_write(0xf6659030, 0xf67aaf28, 0xf67aaf20, 0xf004f604, 0x8a000, 0x1) at sys_w
rite+0x90
syscall(0x4, 0xf67aafb0, 0x0, 0x1d16, 0x84800, 0x670c0) at syscall+0x1f4
_syscall(0x4, 0x8a000, 0xf35, 0x1, 0x84800, 0x1b05) at _syscall+0xb8
db> show registers
psr         0x410000c4
pc          0xf01d8558  cpu_Debugger+0x4
npc         0xf01d855c  cpu_Debugger+0x8
y           0x4d800000
wim         0xf026e400  sched_slpque+0x380
g0                   0
g1           0x8000000
g2                 0x5
g3                 0x1
g4           0x3ffa001
g5          0xffffffff  end+0xfd7575f
g6          0xf67a9000  end+0x651e760
g7                   0
o0                 0x1
o1          0xf0241c00  db_history_curr
o2          0xf026e400  sched_slpque+0x380
o3              0x1000
o4          0xfffffc00  end+0xfd75360
o5          0xf67aa558  end+0x651fcb8
o6          0xf67aa400  end+0x651fb60
o7          0xf004d39c  panic+0x88
l0          0xf0243c00  defcorenamelen
l1          0xf0721800  end+0x496f60
l2                   0
l3              0x1000
l4                   0
l5                0x40
l6          0xf023a71c  wmask
l7          0xfc000000  end+0xbd75760
i0          0xf02224f0  svr4_syscallnames+0x1a70
i1                 0x1
i2               0x100
i3          0xf01fe888  openstr.86+0xa8
i4               0x3d3
i5          0xf06db300  end+0x450a60
i6          0xf67aa468  end+0x651fbc8
i7          0xf01f1600  __assert+0x18
cpu_Debugger+0x4:       jmpl            [%o7 + 0x8], %g0
	
>How-To-Repeat:
	Fill up the disk.
>Fix:
	n/a
>Release-Note:
>Audit-Trail:
>Unformatted: