[Bug 188933] [lor] lock order reversal: backtrace while writing to SD/eMMC
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sat Apr 18 21:33:48 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=188933
Sverre Eldøy <skeldoy at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |skeldoy at gmail.com
--- Comment #3 from Sverre Eldøy <skeldoy at gmail.com> ---
Got the same when using the copy-to-emmc.sh script that is supplied with the
freebsd-image of 10.1-RELEASE for BBB:
Copying the system from SD to eMMC
lock order reversal:
1st 0xcd139da0 bufwait (bufwait) @ /usr/src/sys/kern/vfs_bio.c:3097
2nd 0xc2f39800 dirhash (dirhash) @ /usr/src/sys/ufs/ufs/ufs_dirhash.c:285
KDB: stack backtrace:
db_trace_self() at db_trace_self
pc = 0xc05d62e0 lr = 0xc0233ff4 (db_trace_self_wrapper+0x30)
sp = 0xde6eb7f0 fp = 0xde6eb908
r10 = 0xc062db9b
db_trace_self_wrapper() at db_trace_self_wrapper+0x30
pc = 0xc0233ff4 lr = 0xc03cdbd4 (witness_checkorder+0xf4c)
sp = 0xde6eb910 fp = 0xde6eb960
r4 = 0xc06649a9 r5 = 0xc2f39800
r6 = 0xc06645f7 r7 = 0xc06645f4
witness_checkorder() at witness_checkorder+0xf4c
pc = 0xc03cdbd4 lr = 0xc037a5bc (_sx_xlock+0x80)
sp = 0xde6eb968 fp = 0xde6eb998
r4 = 0x0000011d r5 = 0xc06645f4
r6 = 0xc2f39810 r7 = 0xc2f39800
r8 = 0x00000000 r9 = 0x0000000c
r10 = 0xde6eba60
_sx_xlock() at _sx_xlock+0x80
pc = 0xc037a5bc lr = 0xc058fea8 (ufsdirhash_add+0x3c)
sp = 0xde6eb9a0 fp = 0xde6eb9c0
r4 = 0xc2f39800 r5 = 0x00000028
r6 = 0xc2faf880 r7 = 0x00000010
r8 = 0xde6eba60 r10 = 0xde6eba60
ufsdirhash_add() at ufsdirhash_add+0x3c
pc = 0xc058fea8 lr = 0xc0592b1c (ufs_direnter+0x46c)
sp = 0xde6eb9c8 fp = 0xde6eba30
r4 = 0xc2faf880 r5 = 0xc2faac60
r6 = 0xcd774028 r7 = 0x00000010
r8 = 0x00000000 r9 = 0x0000000c
r10 = 0xde6eba60
ufs_direnter() at ufs_direnter+0x46c
pc = 0xc0592b1c lr = 0xc059bab4 (ufs_mkdir+0x734)
sp = 0xde6eba38 fp = 0xde6ebbc0
r4 = 0xde6eba60 r5 = 0xc2faac60
r6 = 0xde6ebd48 r7 = 0x00000000
r8 = 0xc2fb0380 r9 = 0xc2faf880
r10 = 0xde6ebc80
ufs_mkdir() at ufs_mkdir+0x734
pc = 0xc059bab4 lr = 0xc0602c20 (VOP_MKDIR_APV+0x12c)
sp = 0xde6ebbc8 fp = 0xde6ebbe0
r4 = 0xde6ebd48 r5 = 0xc0722db4
r6 = 0x00000000 r7 = 0x20c0c3a0
r8 = 0x00000000 r9 = 0x00000000
r10 = 0xde6ebc88
VOP_MKDIR_APV() at VOP_MKDIR_APV+0x12c
pc = 0xc0602c20 lr = 0xc042cee4 (kern_mkdirat+0x194)
sp = 0xde6ebbe8 fp = 0xde6ebd80
r4 = 0xde6ebc18 r5 = 0xde6ebcb0
r6 = 0xde6ebd44 r10 = 0xde6ebc88
kern_mkdirat() at kern_mkdirat+0x194
pc = 0xc042cee4 lr = 0xc042cd48 (sys_mkdir+0x24)
sp = 0xde6ebd88 fp = 0xde6ebd90
r4 = 0xc2fe0cc0 r5 = 0x00000000
r6 = 0xc07b5840 r7 = 0x00000000
r8 = 0xde6ebdf8 r9 = 0xc2fbb000
r10 = 0x20c14200
sys_mkdir() at sys_mkdir+0x24
pc = 0xc042cd48 lr = 0xc05ea080 (swi_handler+0x2e4)
sp = 0xde6ebd98 fp = 0xde6ebe48
swi_handler() at swi_handler+0x2e4
pc = 0xc05ea080 lr = 0xc05d7990 (swi_exit)
sp = 0xde6ebe50 fp = 0xbffffa30
r4 = 0x20c14200 r5 = 0x000001ed
r6 = 0x20c14364 r7 = 0x00000088
r8 = 0x00000001 r9 = 0xffffffe2
r10 = 0x20c14200
swi_exit() at swi_exit
pc = 0xc05d7990 lr = 0xc05d7990 (swi_exit)
sp = 0xde6ebe50 fp = 0xbffffa30
lock order reversal:
1st 0xc2faac94 ufs (ufs) @ /usr/src/sys/kern/vfs_lookup.c:509
2nd 0xcd139da0 bufwait (bufwait) @ /usr/src/sys/ufs/ffs/ffs_vnops.c:263
3rd 0xc316e394 ufs (ufs) @ /usr/src/sys/kern/vfs_subr.c:2176
KDB: stack backtrace:
db_trace_self() at db_trace_self
pc = 0xc05d62e0 lr = 0xc0233ff4 (db_trace_self_wrapper+0x30)
sp = 0xde6eb408 fp = 0xde6eb520
r10 = 0xc062db9b
db_trace_self_wrapper() at db_trace_self_wrapper+0x30
pc = 0xc0233ff4 lr = 0xc03cdbd4 (witness_checkorder+0xf4c)
sp = 0xde6eb528 fp = 0xde6eb578
r4 = 0xc06344ca r5 = 0xc316e394
r6 = 0xc064e6c8 r7 = 0xc062db9b
witness_checkorder() at witness_checkorder+0xf4c
pc = 0xc03cdbd4 lr = 0xc0354628 (__lockmgr_args+0x838)
sp = 0xde6eb580 fp = 0xde6eb5e8
r4 = 0xc064e6c5 r5 = 0xc06344ca
r6 = 0xc316e394 r7 = 0x00000100
r8 = 0xc316e3b4 r9 = 0x00080100
r10 = 0x00080000
__lockmgr_args() at __lockmgr_args+0x838
pc = 0xc0354628 lr = 0xc058a648 (ffs_lock+0x80)
sp = 0xde6eb5f0 fp = 0xde6eb620
r4 = 0xde6eb648 r5 = 0x00080100
r6 = 0xc316e360 r7 = 0xc316e394
r8 = 0xc316e3b4 r9 = 0x00000000
r10 = 0x00000008
ffs_lock() at ffs_lock+0x80
pc = 0xc058a648 lr = 0xc060374c (VOP_LOCK1_APV+0x128)
sp = 0xde6eb628 fp = 0xde6eb640
r4 = 0xde6eb648 r5 = 0xc0722850
r6 = 0x00000000 r7 = 0x00080100
r8 = 0xde6eb648 r9 = 0x00000000
r10 = 0x00000880
VOP_LOCK1_APV() at VOP_LOCK1_APV+0x128
pc = 0xc060374c lr = 0xc0430044 (_vn_lock+0x48)
sp = 0xde6eb648 fp = 0xde6eb678
r4 = 0xc316e360 r5 = 0x0003ac80
r6 = 0xc064e6c5 r10 = 0x00000880
_vn_lock() at _vn_lock+0x48
pc = 0xc0430044 lr = 0xc0420bf4 (vget+0x60)
sp = 0xde6eb680 fp = 0xde6eb6a0
r4 = 0xc316e360 r5 = 0x0003ac80
r6 = 0x00080100 r7 = 0xc07ab29c
r8 = 0xc2fe0cc0 r9 = 0x00000000
r10 = 0xc07ab280
vget() at vget+0x60
pc = 0xc0420bf4 lr = 0xc0414cd4 (vfs_hash_get+0xe0)
sp = 0xde6eb6a8 fp = 0xde6eb6d8
r4 = 0xc064d903 r5 = 0x0003ac80
r6 = 0xc2d5a2b0 r7 = 0xc07ab29c
r8 = 0xc316e360 r10 = 0xc07ab280
vfs_hash_get() at vfs_hash_get+0xe0
pc = 0xc0414cd4 lr = 0xc058581c (ffs_vgetf+0x38)
sp = 0xde6eb6e0 fp = 0xde6eb730
r4 = 0x0003ac80 r5 = 0x00080000
r6 = 0xc2d5a2b0 r7 = 0x0003ac80
r8 = 0xc2fce900 r9 = 0xc30c81b0
r10 = 0xde6eb790
ffs_vgetf() at ffs_vgetf+0x38
pc = 0xc058581c lr = 0xc057c408 (softdep_sync_buf+0x32c)
sp = 0xde6eb738 fp = 0xde6eb7b0
r4 = 0x0003ac80 r5 = 0xc2d65900
r6 = 0xc2fce900 r7 = 0xc2d65900
r8 = 0xc2fce900 r9 = 0xc30c81b0
r10 = 0xc06602f8
softdep_sync_buf() at softdep_sync_buf+0x32c
pc = 0xc057c408 lr = 0xc058b334 (ffs_syncvnode+0x2f4)
sp = 0xde6eb7b8 fp = 0xde6eb808
r4 = 0xc06640d1 r5 = 0xc2faac60
r6 = 0x00000000 r7 = 0x00000001
r8 = 0xcd139da0 r9 = 0xcd139d50
r10 = 0x00000010
ffs_syncvnode() at ffs_syncvnode+0x2f4
pc = 0xc058b334 lr = 0xc055ff7c (ffs_truncate+0x754)
sp = 0xde6eb810 fp = 0xde6eb9c0
r4 = 0xc2faac60 r5 = 0x00000400
r6 = 0xc2faf880 r7 = 0x00000000
r8 = 0xc2faf8d8 r9 = 0x00000000
r10 = 0xc309b000
ffs_truncate() at ffs_truncate+0x754
pc = 0xc055ff7c lr = 0xc0592edc (ufs_direnter+0x82c)
sp = 0xde6eb9c8 fp = 0xde6eba30
r4 = 0xc2faac60 r5 = 0xc2faac60
r6 = 0xc2faf880 r7 = 0xc316e360
r8 = 0x00000000 r9 = 0x0000000c
r10 = 0xde6eba60
ufs_direnter() at ufs_direnter+0x82c
pc = 0xc0592edc lr = 0xc059bab4 (ufs_mkdir+0x734)
sp = 0xde6eba38 fp = 0xde6ebbc0
r4 = 0xde6eba60 r5 = 0xc2faac60
r6 = 0xde6ebd48 r7 = 0x00000000
r8 = 0xc2fb0380 r9 = 0xc2faf880
r10 = 0xde6ebc80
ufs_mkdir() at ufs_mkdir+0x734
pc = 0xc059bab4 lr = 0xc0602c20 (VOP_MKDIR_APV+0x12c)
sp = 0xde6ebbc8 fp = 0xde6ebbe0
r4 = 0xde6ebd48 r5 = 0xc0722db4
r6 = 0x00000000 r7 = 0x20c0c3a0
r8 = 0x00000000 r9 = 0x00000000
r10 = 0xde6ebc88
VOP_MKDIR_APV() at VOP_MKDIR_APV+0x12c
pc = 0xc0602c20 lr = 0xc042cee4 (kern_mkdirat+0x194)
sp = 0xde6ebbe8 fp = 0xde6ebd80
r4 = 0xde6ebc18 r5 = 0xde6ebcb0
r6 = 0xde6ebd44 r10 = 0xde6ebc88
kern_mkdirat() at kern_mkdirat+0x194
pc = 0xc042cee4 lr = 0xc042cd48 (sys_mkdir+0x24)
sp = 0xde6ebd88 fp = 0xde6ebd90
r4 = 0xc2fe0cc0 r5 = 0x00000000
r6 = 0xc07b5840 r7 = 0x00000000
r8 = 0xde6ebdf8 r9 = 0xc2fbb000
r10 = 0x20c14200
sys_mkdir() at sys_mkdir+0x24
pc = 0xc042cd48 lr = 0xc05ea080 (swi_handler+0x2e4)
sp = 0xde6ebd98 fp = 0xde6ebe48
swi_handler() at swi_handler+0x2e4
pc = 0xc05ea080 lr = 0xc05d7990 (swi_exit)
sp = 0xde6ebe50 fp = 0xbffffa30
r4 = 0x20c14200 r5 = 0x000001ed
r6 = 0x20c14364 r7 = 0x00000088
r8 = 0x00000001 r9 = 0xffffffe2
r10 = 0x20c14200
swi_exit() at swi_exit
pc = 0xc05d7990 lr = 0xc05d7990 (swi_exit)
sp = 0xde6ebe50 fp = 0xbffffa30
aintc0: Spurious interrupt detected (0xffffffff)
Cleaning up the copied system
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-arm
mailing list