Date: Sun, 01 May 2005 20:05:53 -0300 From: Marcus Grando <marcus@corp.grupos.com.br> To: "freebsd-stable@freebsd.org" <freebsd-stable@freebsd.org> Subject: IPFILTER (LOR) and RELENG_5_4 Message-ID: <427560D1.1000704@corp.grupos.com.br>
next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format. --------------090207010107040903030100 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Ipfilter show many backtraces (LOR) in dmesg, it's critical? Attached traces. -- Marcus Grando Grupos Internet S/A marcus(at)corp.grupos.com.br --------------090207010107040903030100 Content-Type: text/plain; name="debug.orca" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="debug.orca" Starting apache2. em0: Link is up 1000 Mbps Full Duplex lock order reversal 1st 0xc28d49b4 inp (udpinp) @ /usr/src/sys/netinet/udp_usrreq.c:772 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(0,ffffffff,c074d3b0,c074bbf0,c071800c) at kdb_backtrace+0x29 witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544 _sx_slock(c073a7c0,c06ccc8f,453,0,c276b600) at _sx_slock+0x50 fr_check(c276b6c0,14,c23fe800,1,e74a7ad4) at fr_check+0x430 fr_check_wrapper(0,e74a7ad4,c23fe800,2,c28d4924) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e74a7b48,c23fe800,2,c28d4924) at pfil_run_hooks+0xbd ip_output(c276b600,0,e74a7b14,0,0) at ip_output+0x57e udp_output(c28d4924,c276b600,0,0,c2840780) at udp_output+0x493 udp_send(c28c9a20,0,c276b600,0,0) at udp_send+0x1a sosend(c28c9a20,0,e74a7c50,c276b600,0) at sosend+0x5e7 kern_sendit(c2840780,31,e74a7ccc,0,0) at kern_sendit+0x104 sendit(c2840780,31,e74a7ccc,0,82a1024) at sendit+0x161 sendto(c2840780,e74a7d14,6,7,202) at sendto+0x4d syscall(2f,2f,2f,8281000,3846de64) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (133, FreeBSD ELF32, sendto), eip = 0x383f6b9b, esp = 0xbfbfddcc, ebp = 0xbfbfddf8 --- lock order reversal 1st 0xc29cf144 inp (tcpinp) @ /usr/src/sys/netinet/tcp_usrreq.c:371 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(0,ffffffff,c074d360,c074bbf0,c071800c) at kdb_backtrace+0x29 witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544 _sx_slock(c073a7c0,c06ccc8f,453,0,c2977a00) at _sx_slock+0x50 fr_check(c2977a40,14,c23fe800,1,e74cbb38) at fr_check+0x430 fr_check_wrapper(0,e74cbb38,c23fe800,2,c29cf0b4) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e74cbbac,c23fe800,2,c29cf0b4) at pfil_run_hooks+0xbd ip_output(c2977a00,0,e74cbb78,0,0) at ip_output+0x57e tcp_output(c29d01bc,c28ca800,c28ca798,c2845a80,e74cbca8) at tcp_output+0x1144 tcp_usr_connect(c28ca798,c2574a50,c2845a80) at tcp_usr_connect+0xeb soconnect(c28ca798,c2574a50,c2845a80,0,c27fa660) at soconnect+0x7c kern_connect(c2845a80,b,c2574a50,c2574a50,0) at kern_connect+0x74 connect(c2845a80,e74cbd14,3,0,292) at connect+0x2f syscall(2f,2f,2f,84e1c00,2) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (98, FreeBSD ELF32, connect), eip = 0x3876eddb, esp = 0xbfabbba0, ebp = 0xbfabbbcc --- lock order reversal 1st 0xc0771fec tcp (tcp) @ /usr/src/sys/netinet/tcp_input.c:617 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(0,ffffffff,c074d388,c074bbf0,c071800c) at kdb_backtrace+0x29 witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544 _sx_slock(c073a7c0,c06ccc8f,453,0,c28dde00) at _sx_slock+0x50 fr_check(c291e810,14,c23fe800,1,e4f3fae8) at fr_check+0x430 fr_check_wrapper(0,e4f3fae8,c23fe800,2,0) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e4f3fb5c,c23fe800,2,0) at pfil_run_hooks+0xbd ip_output(c28dde00,0,e4f3fb28,0,0,0) at ip_output+0x57e tcp_respond(0,c291e810,c291e824,c28dde00,f3553cd2,0,14) at tcp_respond+0x3e1 tcp_input(c28dde00,14,5bb7cbc8,0,0) at tcp_input+0x313b ip_input(c28dde00) at ip_input+0x539 netisr_processqueue(c0771218) at netisr_processqueue+0x6e swi_net(0) at swi_net+0xbe ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124 fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 --- lock order reversal 1st 0xc077274c udp (udp) @ /usr/src/sys/netinet/udp_usrreq.c:246 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(0,ffffffff,c074d3d8,c074bbf0,c071800c) at kdb_backtrace+0x29 witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544 _sx_slock(c073a7c0,c06ccc8f,453,0,c276a400) at _sx_slock+0x50 fr_check(c276a4c8,14,c23fe800,1,e4f3fb0c) at fr_check+0x430 fr_check_wrapper(0,e4f3fb0c,c23fe800,2,0) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e4f3fb80,c23fe800,2,0) at pfil_run_hooks+0xbd ip_output(c276a400,0,e4f3fb4c,0,0) at ip_output+0x57e icmp_send(c276a400,0,c276a400) at icmp_send+0x55 icmp_reflect(c276a400,c291f010,c276a4c8,14) at icmp_reflect+0x2d6 icmp_error(c28ddd00,3,3,0,0) at icmp_error+0x212 udp_input(c28ddd00,14,51b7cbc8,0,0) at udp_input+0x4d0 ip_input(c28ddd00) at ip_input+0x539 netisr_processqueue(c0771218) at netisr_processqueue+0x6e swi_net(0) at swi_net+0xbe ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124 fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 --- Waiting on "ipf IP state rwlock" with the following non-sleepable locks held: exclusive sleep mutex inp (tcpinp) r = 0 (0xc3833bd0) locked @ /usr/src/sys/netinet/tcp_input.c:744 KDB: stack backtrace: kdb_backtrace(1,1,1,c23a6a80,c073a864) at kdb_backtrace+0x29 witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a cv_wait(c073a864,c0744cf4,0,0,92e2f6a1) at cv_wait+0xad _sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68 fr_checkstate(c2929540,e4f3f9e0,0,c2929500,0) at fr_checkstate+0x4b1 fr_check(c2929540,14,c23fe800,1,e4f3fa88) at fr_check+0x51c fr_check_wrapper(0,e4f3fa88,c23fe800,2,c3833b40) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e4f3fafc,c23fe800,2,c3833b40) at pfil_run_hooks+0xbd ip_output(c2929500,0,e4f3fac8,0,0) at ip_output+0x57e tcp_output(c29a9378) at tcp_output+0x1144 tcp_input(c2927100,14,61b7cbc8,0,0) at tcp_input+0x2ec7 ip_input(c2927100) at ip_input+0x539 netisr_processqueue(c0771218) at netisr_processqueue+0x6e swi_net(0) at swi_net+0xbe ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124 fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 --- Waiting on "ipf IP state rwlock" with the following non-sleepable locks held: exclusive sleep mutex inp (tcpinp) r = 0 (0xc37aaf54) locked @ /usr/src/sys/netinet/tcp_input.c:744 KDB: stack backtrace: kdb_backtrace(1,1,1,c23a6a80,c073a864) at kdb_backtrace+0x29 witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a cv_wait(c073a864,c0744cf4,0,0,6ce9de9a) at cv_wait+0xad _sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68 fr_checkstate(c34f7c40,e4f3f9e0,0,c34f7c00,0) at fr_checkstate+0x4b1 fr_check(c34f7c40,14,c23fe800,1,e4f3fa88) at fr_check+0x51c fr_check_wrapper(0,e4f3fa88,c23fe800,2,c37aaec4) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e4f3fafc,c23fe800,2,c37aaec4) at pfil_run_hooks+0xbd ip_output(c34f7c00,0,e4f3fac8,0,0) at ip_output+0x57e tcp_output(c35c8000) at tcp_output+0x1144 tcp_input(c3546600,14,61b7cbc8,0,0) at tcp_input+0x2ec7 ip_input(c3546600) at ip_input+0x539 netisr_processqueue(c0771218) at netisr_processqueue+0x6e swi_net(0) at swi_net+0xbe ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124 fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 --- Waiting on "ipf IP state rwlock" with the following non-sleepable locks held: exclusive sleep mutex inp (tcpinp) r = 0 (0xc4530144) locked @ /usr/src/sys/netinet/tcp_usrreq.c:602 KDB: stack backtrace: kdb_backtrace(1,1,1,c2b76a80,c073a864) at kdb_backtrace+0x29 witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a cv_wait(c073a864,c0744cf4,0,0,b970a161) at cv_wait+0xad _sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68 fr_checkstate(c2928540,e76499d8,0,c2928500,0) at fr_checkstate+0x4b1 fr_check(c2928540,14,c256e800,1,e7649a80) at fr_check+0x51c fr_check_wrapper(0,e7649a80,c256e800,2,c45300b4) at fr_check_wrapper+0x2a pfil_run_hooks(c0771b80,e7649af4,c256e800,2,c45300b4) at pfil_run_hooks+0xbd ip_output(c2928500,0,e7649ac0,0,0) at ip_output+0x57e tcp_output(c380f1bc) at tcp_output+0x1144 tcp_usr_rcvd(c655e510,0,c655e578,0,c06e66c3) at tcp_usr_rcvd+0x82 soreceive(c655e510,0,e7649c88,0,0) at soreceive+0xb79 soo_read(c3156374,e7649c88,c2f72980,0,c2b76a80) at soo_read+0x41 dofileread(c2b76a80,c3156374,9,80e2008,1000) at dofileread+0x95 read(c2b76a80,e7649d14,3,f,296) at read+0x3b syscall(2f,2f,2f,9,12c) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (3, FreeBSD ELF32, read), eip = 0x3829c5db, esp = 0xbfbfe7ec, ebp = 0xbfbfe818 --- --------------090207010107040903030100--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?427560D1.1000704>