Hi, I just cvsup'd and noticed the following: Starting sshd. lock order reversal 1st 0xc2ee3998 inp (inp) _at_ /usr/src/sys/netinet/udp_usrreq.c:1042 2nd 0xc094876c div (div) _at_ /usr/src/sys/netinet/ip_divert.c:225 Stack backtrace: backtrace(c08643de,c094876c,c087b2de,c087b2de,c086b1c6) at backtrace+0x17 witness_lock(c094876c,8,c086b1c6,e1,0) at witness_lock+0x672 _mtx_lock_flags(c094876c,0,c086b1c6,e1,c16db200) at _mtx_lock_flags+0xba divert_packet(c16db200,0,21dc,32,c06832f3) at divert_packet+0x133 ip_output(c16db200,0,c2ee3924,0,0) at ip_output+0x851 udp_output(c2ee38e8,c16db200,0,0,c16cc4c0) at udp_output+0x403 udp_send(c2f1c000,0,c16db200,0,0) at udp_send+0xb7 sosend(c2f1c000,0,cdd10c48,c16db200,0) at sosend+0x44d kern_sendit(c16cc4c0,4,cdd10cc0,0,0) at kern_sendit+0x17c sendit(c16cc4c0,4,cdd10cc0,0,bfbfd2f8) at sendit+0x16e sendto(c16cc4c0,cdd10d10,c087d03a,3ed,6) at sendto+0x5b syscall(2f,2f,2f,8106000,28) at syscall+0x2c0 Xint0x80_syscall() at Xint0x80_syscall+0x1d --- syscall (133), eip = 0x282a810f, esp = 0xbfbfcf9c, ebp = 0xbfbfcfc8 --- Initial i386 initialization:. -- Craig Rodrigues http://crodrigues.org rodrigc_at_crodrigues.orgReceived on Fri Oct 17 2003 - 17:19:28 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:25 UTC