From owner-freebsd-current@FreeBSD.ORG Sat Oct 1 18:07:45 2005 Return-Path: X-Original-To: current@freeBSD.org Delivered-To: freebsd-current@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9C78016A41F for ; Sat, 1 Oct 2005 18:07:45 +0000 (GMT) (envelope-from kris@obsecurity.org) Received: from elvis.mu.org (elvis.mu.org [192.203.228.196]) by mx1.FreeBSD.org (Postfix) with ESMTP id BD5C943D48 for ; Sat, 1 Oct 2005 18:07:44 +0000 (GMT) (envelope-from kris@obsecurity.org) Received: from obsecurity.dyndns.org (CPE0050040655c8-CM00111ae02aac.cpe.net.cable.rogers.com [70.30.70.180]) by elvis.mu.org (Postfix) with ESMTP id A79A21A3C1D for ; Sat, 1 Oct 2005 11:07:44 -0700 (PDT) Received: by obsecurity.dyndns.org (Postfix, from userid 1000) id 489FE5130A; Sat, 1 Oct 2005 13:36:25 -0400 (EDT) Date: Sat, 1 Oct 2005 13:36:25 -0400 From: Kris Kennaway To: current@freeBSD.org Message-ID: <20051001173625.GB96922@xor.obsecurity.org> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="98e8jtXdkpgskNou" Content-Disposition: inline User-Agent: Mutt/1.4.2.1i Cc: Subject: new lockmgr leak X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 01 Oct 2005 18:07:45 -0000 --98e8jtXdkpgskNou Content-Type: text/plain; charset=us-ascii Content-Disposition: inline This machine was running HEAD from a week or two ago. It does not use nullfs, which was a previous source of lockmgr leaks (now might be fixed, although I've seen indications they're not completely fixed). It only mounts ufs filesystems and nfs, and none of these are unmounted at runtime..so the source of the leak must be elsewhere. Unfortunately, the ddb backtrace appears to be corrupted: panic(c07125c0,2,0,0,0) at panic+0x60 userret(c61acaf0,f0530d38,9f,424,3) at userret+0xf3 syscall(3b,69a003b,bfbf003b,0,66efe00) at syscall+0x3c6 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (1024), eip = 0x28149a97, esp = 0xbfbfbd6c, ebp = 0xbfbfc288 --- syscall 1024? No such animal. 0xc07125c0: userret: Returning with %d locks held. The thread with the leak was: 41187 c621ea3c 4203 41186 41184 0004002 [CPU 0] md5 This was running md5 over some package files..about all I can think might have happened is something removed a package at the time it was being checksummed, but this shouldn't of course cause any problems. Unfortunately I can't even take a dump on this machine, since twe is broken. So this probably isn't a very useful bug report, but it's here in case it happens again to someone else. Kris --98e8jtXdkpgskNou Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (FreeBSD) iD8DBQFDPskYWry0BWjoQKURAs2HAJ9jNSgW/55OgjamWtWytgDEMMdVpgCeIPfg Zw0ZcaDh0Jy9YSwH7VPMFzs= =Q32e -----END PGP SIGNATURE----- --98e8jtXdkpgskNou--