I don't know if anyone is interested, but I got this LOR this morning on a box running 6.0 from sources CVS'ed Tuesday, 22 Mar 2005. It looks (to me) similar to reversal 061 on the list at: http://sources.zabbadoz.net/freebsd/lor.html This occurred during a 'portupgrade -Rr -a', probably during a download for a source tarball. Kevin ----- lock order reversal 1st 0xc1d6d798 rtentry (rtentry) _at_ /usr/src/sys/netinet/if_ether.c:445 2nd 0xc1a7b3c0 em0 (network driver) _at_ /usr/src/sys/dev/em/if_em.c:637 KDB: stack backtrace: kdb_backtrace(0,ffffffff,c0909c90,c09089d0,c08945c8) at kdb_backtrace+0x29 witness_checkorder(c1a7b3c0,9,c080fd0f,27d) at witness_checkorder+0x54c _mtx_lock_flags(c1a7b3c0,0,c080fd0f,27d,c1a7b000) at _mtx_lock_flags+0x5b em_start(c1a7b000) at em_start+0x22 if_start(c1a7b000) at if_start+0x7b ether_output_frame(c1a7b000,c1ca8c00,1,ffffffff,0) at ether_output_frame+0x1d9 ether_output(c1a7b000,c1ca8c00,de53fa48,0,2) at ether_output+0x384 arprequest(c1a7b000,c293f0c8,de53fb18,c19714ab) at arprequest+0xd8 arpresolve(c1a7b000,c1d6d738,c1ca8a00,de53fb14,de53fab8) at arpresolve+0x29c ether_output(c1a7b000,c1ca8a00,de53fb14,c1d6d738,c293f000) at ether_output+0x66 ip_output(c1ca8a00,0,de53fb10,0,0) at ip_output+0x6fc udp_output(c1d6b21c,c1ca8a00,0,0,c1d78170) at udp_output+0x4ad udp_send(c1d6a67c,0,c1ca8a00,0,0) at udp_send+0x1a sosend(c1d6a67c,0,de53fc4c,c1ca8a00,0) at sosend+0x5e7 kern_sendit(c1d78170,4,de53fccc,0,0) at kern_sendit+0x104 sendit(c1d78170,4,de53fccc,0,807701e) at sendit+0x163 sendto(c1d78170,de53fd14,6,5,212) at sendto+0x4d syscall(2f,2f,2f,0,28262824) at syscall+0x213 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (133, FreeBSD ELF32, sendto), eip = 0x281e46db, esp = 0xbfbfd4ac, ebp = 0xbfbfd4d8 ---Received on Thu Mar 24 2005 - 14:15:28 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:30 UTC