new LOR to report...

From: John-Mark Gurney <gurney_j_at_resnet.uoregon.edu>
Date: Wed, 25 Jan 2006 19:37:40 -0800
Ok, just ran across a new LOR when trying to unload a module:
lock order reversal: (sleepable after non-sleepable)
 1st 0xc106c708 mt_zone (UMA zone) _at_ vm/uma_core.c:2448
 2nd 0xc3934044 user map (user map) _at_ vm/vm_map.c:2993
KDB: stack backtrace:
kdb_backtrace(0,ffffffff,c070fb58,c070fa68,c06d122c) at kdb_backtrace+0x29
witness_checkorder(c3934044,9,c06ab0ce,bb1) at witness_checkorder+0x586
_sx_xlock(c3934044,c06ab0c5,bb1) at _sx_xlock+0x50
_vm_map_lock_read(c3934000,c06ab0c5,bb1,1d5d9dc,c3aa86e0) at _vm_map_lock_read+0x33
vm_map_lookup(d1d5da68,0,1,d1d5da6c,d1d5da5c) at vm_map_lookup+0x28
vm_fault(c3934000,0,1,0,c39db6c0) at vm_fault+0x66
trap_pfault(d1d5db84,0,15) at trap_pfault+0xce
trap(8,28,28,0,c106c700) at trap+0x3a5
calltrap() at calltrap+0x5
--- trap 0xc, eip = 0xc060ecc4, esp = 0xd1d5dbc4, ebp = 0xd1d5dbd0 ---
uma_zfree_internal(c106a960,c3b99000,0,1,3) at uma_zfree_internal+0xd0
uma_zfree_arg(c106a960,c3b99000,0) at uma_zfree_arg+0x348
malloc_uninit(c3b79980) at malloc_uninit+0xdc
linker_file_sysuninit(c3ad1400,0,2,c3ad1400,c3aa8678) at linker_file_sysuninit+0x7d
linker_file_unload(c3ad1400,0,0,c39db6c0,d1d5dc80) at linker_file_unload+0x116
kern_kldunload(c39db6c0,b,0,d1d5dd30,c065dc92) at kern_kldunload+0x7c
kldunloadf(c39db6c0,d1d5dd04,c,c39db6c0,d1d5dd30) at kldunloadf+0x1e
syscall(3b,3b,3b,b,bfbfe9be) at syscall+0x27e
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (444, FreeBSD ELF32, kldunloadf), eip = 0x280ba223, esp = 0xbfbfe41c, ebp = 0xbfbfe888 ---


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x15
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0xc060ecc4
stack pointer           = 0x28:0xd1d5dbc4
frame pointer           = 0x28:0xd1d5dbd0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 790 (kldunload)
[thread pid 790 tid 100080 ]
Stopped at      uma_zfree_internal+0xd0:        movzbl  0x15(%ebx),%eax
db> tr
Tracing pid 790 tid 100080 td 0xc39db6c0
uma_zfree_internal(c106a960,c3b99000,0,1,3) at uma_zfree_internal+0xd0
uma_zfree_arg(c106a960,c3b99000,0) at uma_zfree_arg+0x348
malloc_uninit(c3b79980) at malloc_uninit+0xdc
linker_file_sysuninit(c3ad1400,0,2,c3ad1400,c3aa8678) at linker_file_sysuninit+0x7d
linker_file_unload(c3ad1400,0,0,c39db6c0,d1d5dc80) at linker_file_unload+0x116
kern_kldunload(c39db6c0,b,0,d1d5dd30,c065dc92) at kern_kldunload+0x7c
kldunloadf(c39db6c0,d1d5dd04,c,c39db6c0,d1d5dd30) at kldunloadf+0x1e
syscall(3b,3b,3b,b,bfbfe9be) at syscall+0x27e
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (444, FreeBSD ELF32, kldunloadf), eip = 0x280ba223, esp = 0xbfbfe41c, ebp = 0xbfbfe888 ---

I didn't see it on the list...

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."
Received on Thu Jan 26 2006 - 02:38:50 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:51 UTC