ip_divert.c lock order reversal

From: Craig Rodrigues <rodrigc_at_crodrigues.org>
Date: Fri, 17 Oct 2003 22:20:48 -0400
Hi,

I just cvsup'd and noticed the following:


Starting sshd.
lock order reversal
 1st 0xc2ee3998 inp (inp) _at_ /usr/src/sys/netinet/udp_usrreq.c:1042
 2nd 0xc094876c div (div) _at_ /usr/src/sys/netinet/ip_divert.c:225
Stack backtrace:
backtrace(c08643de,c094876c,c087b2de,c087b2de,c086b1c6) at backtrace+0x17
witness_lock(c094876c,8,c086b1c6,e1,0) at witness_lock+0x672
_mtx_lock_flags(c094876c,0,c086b1c6,e1,c16db200) at _mtx_lock_flags+0xba
divert_packet(c16db200,0,21dc,32,c06832f3) at divert_packet+0x133
ip_output(c16db200,0,c2ee3924,0,0) at ip_output+0x851
udp_output(c2ee38e8,c16db200,0,0,c16cc4c0) at udp_output+0x403
udp_send(c2f1c000,0,c16db200,0,0) at udp_send+0xb7
sosend(c2f1c000,0,cdd10c48,c16db200,0) at sosend+0x44d
kern_sendit(c16cc4c0,4,cdd10cc0,0,0) at kern_sendit+0x17c
sendit(c16cc4c0,4,cdd10cc0,0,bfbfd2f8) at sendit+0x16e
sendto(c16cc4c0,cdd10d10,c087d03a,3ed,6) at sendto+0x5b
syscall(2f,2f,2f,8106000,28) at syscall+0x2c0
Xint0x80_syscall() at Xint0x80_syscall+0x1d
--- syscall (133), eip = 0x282a810f, esp = 0xbfbfcf9c, ebp = 0xbfbfcfc8 ---
Initial i386 initialization:.

-- 
Craig Rodrigues        
http://crodrigues.org
rodrigc_at_crodrigues.org
Received on Fri Oct 17 2003 - 17:19:28 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:25 UTC