From owner-freebsd-current Fri Mar 14 8:49: 1 2003 Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0831B37B404 for ; Fri, 14 Mar 2003 08:48:59 -0800 (PST) Received: from relay1.cris.net (relay1.cris.net [212.110.128.64]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7055D43FA3 for ; Fri, 14 Mar 2003 08:48:56 -0800 (PST) (envelope-from phantom@phantom.cris.net) Received: from phantom.cris.net (root@phantom.cris.net [212.110.130.74]) by relay1.cris.net (8.12.6/8.12.6) with ESMTP id h2EJ17mJ034643 for ; Fri, 14 Mar 2003 19:01:08 GMT Received: (from phantom@localhost) by phantom.cris.net (8.12.6/8.12.2) id h2EGtbxd016380; Fri, 14 Mar 2003 18:55:37 +0200 (EET) (envelope-from phantom) Date: Fri, 14 Mar 2003 18:55:37 +0200 From: Alexey Zelkin To: current@freebsd.org Subject: 2 tcp/ip witness warnings Message-ID: <20030314185537.A16365@phantom.cris.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i X-Operating-System: FreeBSD 4.7-STABLE i386 Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG hi, Expirementing today with netgraph sockets hit into these two cases: 1: lock order reversal 1st 0xc27658b4 inp (inp) @ /home/phantom/src5/sys/netinet/tcp_input.c:640 2nd 0xc031832c tcp (tcp) @ /home/phantom/src5/sys/netinet/tcp_usrreq.c:621 Stack backtrace: backtrace(c02e9301,c031832c,c02eef23,c02eef23,c02f0154) at backtrace+0x17 witness_lock(c031832c,8,c02f0154,26d,0) at witness_lock+0x66d _mtx_lock_flags(c031832c,0,c02f0154,26d,0) at _mtx_lock_flags+0xb1 tcp_usr_rcvd(c273a200,80,c02e8f74,c294db00,3b9aca00) at tcp_usr_rcvd+0x30 soreceive(c273a200,0,cd3259f0,cd3259e8,0) at soreceive+0x89a ng_ksocket_incoming2(c2960500,0,c273a200,4,c26975d8) at ng_ksocket_incoming2+0x2 65 ng_apply_item(c2960500,c26975c0,c294bcee,7d7,c02e8f74) at ng_apply_item+0x4af ng_snd_item(c26975c0,0,cd325adc,c2960500,c273a24c) at ng_snd_item+0x614 ng_send_fn(c2960500,0,c2549ac0,c273a200,4) at ng_send_fn+0x1b7 ng_ksocket_incoming(c273a200,c2960500,4,c0ee7168,0) at ng_ksocket_incoming+0x2f sowakeup(c273a200,c273a24c,c02ef894,822,5000) at sowakeup+0x97 tcp_input(c0ee7100,14,c01acbbd,c033b500,1) at tcp_input+0x22bb ip_input(c0ee7100,0,c02ee77d,e9,c0eb99c0) at ip_input+0x7d6 swi_net(0,0,c02e43b0,217,c0ec35f4) at swi_net+0x112 ithread_loop(c0ec2100,cd325d48,c02e4219,35f,5ed54) at ithread_loop+0x182 fork_exit(c01a3b40,c0ec2100,cd325d48) at fork_exit+0xc4 fork_trampoline() at fork_trampoline+0x1a 2: malloc() of "16" with the following non-sleepablelocks held: exclusive sleep mutex inp r = 0 (0xc2765194) locked @ /home/phantom/src5/sys/net inet/tcp_input.c:640 exclusive sleep mutex tcp r = 0 (0xc031832c) locked @ /home/phantom/src5/sys/net inet/tcp_usrreq.c:480 exclusive sleep mutex netisr lock r = 0 (0xc0360260) locked @ /home/phantom/src5 /sys/net/netisr.c:215 db> tr Debugger(c02d6d9c,cd32587c,3,cd32587c,c0313240) at Debugger+0x54 witness_warn(5,0,c02f6550,c02dc43f,246) at witness_warn+0x1a0 uma_zalloc_arg(c083aa20,0,102,1f6,c02f0154) at uma_zalloc_arg+0x53 malloc(10,c0313240,102,c2760720,cd325904) at malloc+0xd4 in_sockaddr(0,cd3258f4,c02f0154,1f6,0) at in_sockaddr+0x29 tcp_usr_accept(c273a100,cd32593c,cd32594c,c254a013,c273a100) at tcp_usr_accept+0x13a soaccept(c273a100,cd32593c,132,64,4) at soaccept+0x3f ng_ksocket_finish_accept(c2a9fd00,0,7fd,0,cd325988) at ng_ksocket_finish_accept+0x73 ng_ksocket_incoming2(c294d500,0,c273be00,4,c2943d58) at ng_ksocket_incoming2+0x1e0 ng_apply_item(c294d500,c2943d40,c2981cee,7d7,c02e8f74) at ng_apply_item+0x4af ng_snd_item(c2943d40,0,c02f0154,c294d500,c273be4c) at ng_snd_item+0x614 ng_send_fn(c294d500,0,c2549ac0,c273be00,4) at ng_send_fn+0x1b7 ng_ksocket_incoming(c273be00,c294d500,4,c273a100,c273be00) at ng_ksocket_incoming+0x2f sowakeup(c273be00,c273be4c,0,c298dbb0,cd325b74) at sowakeup+0x97 sonewconn(c273be00,2,c033c378,c0ec4c9c,d71d0300) at sonewconn+0x199 syncache_socket(c298dbb0,c273be00,c0ed2e00,c267b528,c27601c8) at syncache_socket+0x1f syncache_expand(cd325b74,c0ed2e68,cd325b70,c0ed2e00,5000) at syncache_expand+0x98 tcp_input(c0ed2e00,14,c01acbbd,c033b500,1) at tcp_input+0x676 ip_input(c0ed2e00,0,c02ee77d,e9,c0eb99c0) at ip_input+0x7d6 swi_net(0,0,c02e43b0,217,c0ec35f4) at swi_net+0x112 ithread_loop(c0ec2100,cd325d48,c02e4219,35f,5ed54) at ithread_loop+0x182 fork_exit(c01a3b40,c0ec2100,cd325d48) at fork_exit+0xc4 fork_trampoline() at fork_trampoline+0x1a --- trap 0x1, eip = 0, esp = 0xcd325d7c, ebp = 0 --- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message