Hi all, after booting a 8.0-SNAPSHOT200812 DVD on my T61p and entering the fixit ``live'' mode, I've encountered the following messages about reversed locks: DEBUG: ioctl(3, TIOCCONS, NULL) = 0 (success) DEBUG: MADT: Found CPU APIC ID 0 enabled DEBUG: MADT: Found CPU APIC ID 1 enabled lock order reversal: 1st 0xc6e43164 isofs (isofs) _at_ /usr/src/sys/kern/vfs_subr.c:2079 2nd 0xda8e7960 bufwait (bufwait) _at_ /usr/src/sys/kern/vfs_bio.c:2443 3rd 0xc6ed0488 isofs (isofs) _at_ /usr/src/sys/fs/cd9660/cd9660_vfsops.c:676 KDB: stack backtrace: db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26 kdb_backtrace(...) at kdb_backtrace+0x29 _witness_debugger(...) at _witness_debugger+0x25 witness_checkorder(...) at witness_checkorder+0x839 __lockmgr_args(...) at __lockmgr_args+0x797 cd9660_vget_internal(...) at cd9660_vget_internal+0x118 cd9660_lookup(...) at cd9660_lookup+0x73f VOP_CACHEDLOOKUP_APV(...) at VOP_CACHED_LOOKUP+0xa5 vfs_cache_lookup(...) at vfs_cache_lookup+0xcc VOP_LOOKUP_APV(...) at VOP_LOOKUP_APV+0xa5 lookup(...) at lookup+0x0x57e namei(...) at namei+0x04db kern_accessat(...) at kern_accessat+0x94 kern_access(...) at kern_access+0x36 access(...) at access+0x29 syscall(c67d1d38) at syscall+0x2a3 Xint0x80_syscall() at Xint0x80_syscall+0x20 --- syscall (33, FreeBSD ELF32, access), eip = 0x81d6ed7, esp = 0xbfbfe02c, ebp = 0xbfbfe048 --- DEBUG: CD Volume 1 initialized! lock order reversal: 1st 0xc696ae44 user map (user map) _at_ /usr/src/sys/vm/vm_map.c:3115 2nd 0xc6ed0270 isofs (isofs) _at_ /usr/src/sys/kern/vfs_subr.c:2079 KDB: stack backtrace: db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26 kdb_backtrace(...) at kdb_backtrace+0x29 _witness_debugger(...) at _witness_debugger+0x25 witness_checkorder(...) at witness_checkorder+0x839 __lockmgr_args(...) at __lockmgr_args+0x797 vop_stdlock(...) at vop_stdlock+0x62 VOP_LOCK1_APV(...) at VOP_LOCK1_APV+0xa5 _vn_lock(...) at _vn_lock+0x5e vget(...) at vget+0xc9 vnode_pager_lock(...) at vnode_pager_lock+0x1e0 vm_fault(...) at vm_fault+0x1df trap_pfault(...) at trap_pfault+0x118 trap(...) at trap+0x289 calltrap(...) at calltrap+0x6 Because the machine is not enabled for remote debugging, I've hand typed those messages. I function parameters are needed, I can hopefully recover them from screenshots taken by my cell phone :) PetrReceived on Mon Jan 05 2009 - 09:22:02 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:40 UTC