From owner-freebsd-current@FreeBSD.ORG Mon Jan 5 10:22:02 2009 Return-Path: Delivered-To: current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id EE720106566B for ; Mon, 5 Jan 2009 10:22:02 +0000 (UTC) (envelope-from hopet@ics.muni.cz) Received: from tirith.ics.muni.cz (tirith.ics.muni.cz [147.251.4.36]) by mx1.freebsd.org (Postfix) with ESMTP id 821598FC0C for ; Mon, 5 Jan 2009 10:22:02 +0000 (UTC) (envelope-from hopet@ics.muni.cz) Received: from KLOBOUCEK (dhcp3-89.ics.muni.cz [147.251.3.89]) (authenticated user=hopet@ICS.MUNI.CZ bits=0) by tirith.ics.muni.cz (8.13.8/8.13.8/SuSE Linux 0.8) with ESMTP id n059ptOe024082 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Mon, 5 Jan 2009 10:51:55 +0100 From: "Petr Holub" To: Date: Mon, 5 Jan 2009 10:51:51 +0100 Message-ID: <03a001c96f1b$3fa09b20$bee1d160$@muni.cz> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AclvGzmhLvyQjTigSriSHbIDJzqaKg== Content-Language: cs X-Muni-Spam-TestIP: 147.251.3.89 X-Muni-Envelope-From: hopet@ics.muni.cz X-Muni-Virus-Test: Clean X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-3.0 (tirith.ics.muni.cz [147.251.4.36]); Mon, 05 Jan 2009 10:51:56 +0100 (CET) Cc: Subject: 8.0-SNAPSHOT200812 reversed locks X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Jan 2009 10:22:03 -0000 Hi all, after booting a 8.0-SNAPSHOT200812 DVD on my T61p and entering the fixit ``live'' mode, I've encountered the following messages about reversed locks: DEBUG: ioctl(3, TIOCCONS, NULL) = 0 (success) DEBUG: MADT: Found CPU APIC ID 0 enabled DEBUG: MADT: Found CPU APIC ID 1 enabled lock order reversal: 1st 0xc6e43164 isofs (isofs) @ /usr/src/sys/kern/vfs_subr.c:2079 2nd 0xda8e7960 bufwait (bufwait) @ /usr/src/sys/kern/vfs_bio.c:2443 3rd 0xc6ed0488 isofs (isofs) @ /usr/src/sys/fs/cd9660/cd9660_vfsops.c:676 KDB: stack backtrace: db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26 kdb_backtrace(...) at kdb_backtrace+0x29 _witness_debugger(...) at _witness_debugger+0x25 witness_checkorder(...) at witness_checkorder+0x839 __lockmgr_args(...) at __lockmgr_args+0x797 cd9660_vget_internal(...) at cd9660_vget_internal+0x118 cd9660_lookup(...) at cd9660_lookup+0x73f VOP_CACHEDLOOKUP_APV(...) at VOP_CACHED_LOOKUP+0xa5 vfs_cache_lookup(...) at vfs_cache_lookup+0xcc VOP_LOOKUP_APV(...) at VOP_LOOKUP_APV+0xa5 lookup(...) at lookup+0x0x57e namei(...) at namei+0x04db kern_accessat(...) at kern_accessat+0x94 kern_access(...) at kern_access+0x36 access(...) at access+0x29 syscall(c67d1d38) at syscall+0x2a3 Xint0x80_syscall() at Xint0x80_syscall+0x20 --- syscall (33, FreeBSD ELF32, access), eip = 0x81d6ed7, esp = 0xbfbfe02c, ebp = 0xbfbfe048 --- DEBUG: CD Volume 1 initialized! lock order reversal: 1st 0xc696ae44 user map (user map) @ /usr/src/sys/vm/vm_map.c:3115 2nd 0xc6ed0270 isofs (isofs) @ /usr/src/sys/kern/vfs_subr.c:2079 KDB: stack backtrace: db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26 kdb_backtrace(...) at kdb_backtrace+0x29 _witness_debugger(...) at _witness_debugger+0x25 witness_checkorder(...) at witness_checkorder+0x839 __lockmgr_args(...) at __lockmgr_args+0x797 vop_stdlock(...) at vop_stdlock+0x62 VOP_LOCK1_APV(...) at VOP_LOCK1_APV+0xa5 _vn_lock(...) at _vn_lock+0x5e vget(...) at vget+0xc9 vnode_pager_lock(...) at vnode_pager_lock+0x1e0 vm_fault(...) at vm_fault+0x1df trap_pfault(...) at trap_pfault+0x118 trap(...) at trap+0x289 calltrap(...) at calltrap+0x6 Because the machine is not enabled for remote debugging, I've hand typed those messages. I function parameters are needed, I can hopefully recover them from screenshots taken by my cell phone :) Petr