8.0-SNAPSHOT200812 reversed locks

From: Petr Holub <hopet_at_ics.muni.cz>
Date: Mon, 5 Jan 2009 10:51:51 +0100
Hi all,

after booting a 8.0-SNAPSHOT200812 DVD on my T61p and entering
the fixit ``live'' mode, I've encountered the following
messages about reversed locks:

DEBUG: ioctl(3, TIOCCONS, NULL) = 0 (success)
DEBUG: MADT: Found CPU APIC ID 0 enabled
DEBUG: MADT: Found CPU APIC ID 1 enabled
lock order reversal:
 1st 0xc6e43164 isofs (isofs) _at_ /usr/src/sys/kern/vfs_subr.c:2079
 2nd 0xda8e7960 bufwait (bufwait) _at_ /usr/src/sys/kern/vfs_bio.c:2443
 3rd 0xc6ed0488 isofs (isofs) _at_ /usr/src/sys/fs/cd9660/cd9660_vfsops.c:676
KDB: stack backtrace:
db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26
kdb_backtrace(...) at kdb_backtrace+0x29
_witness_debugger(...) at _witness_debugger+0x25
witness_checkorder(...) at witness_checkorder+0x839
__lockmgr_args(...) at __lockmgr_args+0x797
cd9660_vget_internal(...) at cd9660_vget_internal+0x118
cd9660_lookup(...) at cd9660_lookup+0x73f
VOP_CACHEDLOOKUP_APV(...) at VOP_CACHED_LOOKUP+0xa5
vfs_cache_lookup(...) at vfs_cache_lookup+0xcc
VOP_LOOKUP_APV(...) at VOP_LOOKUP_APV+0xa5
lookup(...) at lookup+0x0x57e
namei(...) at namei+0x04db
kern_accessat(...) at kern_accessat+0x94
kern_access(...) at kern_access+0x36
access(...) at access+0x29
syscall(c67d1d38) at syscall+0x2a3
Xint0x80_syscall() at Xint0x80_syscall+0x20
--- syscall (33, FreeBSD ELF32, access), eip = 0x81d6ed7, esp = 0xbfbfe02c, ebp = 0xbfbfe048 ---
DEBUG: CD Volume 1 initialized!
lock order reversal:
 1st 0xc696ae44 user map (user map) _at_ /usr/src/sys/vm/vm_map.c:3115
 2nd 0xc6ed0270 isofs (isofs) _at_ /usr/src/sys/kern/vfs_subr.c:2079
KDB: stack backtrace:
db_trace_self_wrapper(...) at db_trace_self_wrapper+0x26
kdb_backtrace(...) at kdb_backtrace+0x29
_witness_debugger(...) at _witness_debugger+0x25
witness_checkorder(...) at witness_checkorder+0x839
__lockmgr_args(...) at __lockmgr_args+0x797
vop_stdlock(...) at vop_stdlock+0x62
VOP_LOCK1_APV(...) at VOP_LOCK1_APV+0xa5
_vn_lock(...) at _vn_lock+0x5e
vget(...) at vget+0xc9
vnode_pager_lock(...) at vnode_pager_lock+0x1e0
vm_fault(...) at vm_fault+0x1df
trap_pfault(...) at trap_pfault+0x118
trap(...) at trap+0x289
calltrap(...) at calltrap+0x6

Because the machine is not enabled for remote debugging, I've
hand typed those messages. I function parameters are needed, I can
hopefully recover them from screenshots taken by my cell phone :)

Petr
Received on Mon Jan 05 2009 - 09:22:02 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:40 UTC