IPFILTER (LOR) and RELENG_5_4

Marcus Grando marcus at corp.grupos.com.br
Sun May 1 16:05:51 PDT 2005


Ipfilter show many backtraces (LOR) in dmesg, it's critical?

Attached traces.

-- 
Marcus Grando
Grupos Internet S/A
marcus(at)corp.grupos.com.br
-------------- next part --------------
Starting apache2.
em0: Link is up 1000 Mbps Full Duplex
lock order reversal
 1st 0xc28d49b4 inp (udpinp) @ /usr/src/sys/netinet/udp_usrreq.c:772
 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107
KDB: stack backtrace:
kdb_backtrace(0,ffffffff,c074d3b0,c074bbf0,c071800c) at kdb_backtrace+0x29
witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544
_sx_slock(c073a7c0,c06ccc8f,453,0,c276b600) at _sx_slock+0x50
fr_check(c276b6c0,14,c23fe800,1,e74a7ad4) at fr_check+0x430
fr_check_wrapper(0,e74a7ad4,c23fe800,2,c28d4924) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e74a7b48,c23fe800,2,c28d4924) at pfil_run_hooks+0xbd
ip_output(c276b600,0,e74a7b14,0,0) at ip_output+0x57e
udp_output(c28d4924,c276b600,0,0,c2840780) at udp_output+0x493
udp_send(c28c9a20,0,c276b600,0,0) at udp_send+0x1a
sosend(c28c9a20,0,e74a7c50,c276b600,0) at sosend+0x5e7
kern_sendit(c2840780,31,e74a7ccc,0,0) at kern_sendit+0x104
sendit(c2840780,31,e74a7ccc,0,82a1024) at sendit+0x161
sendto(c2840780,e74a7d14,6,7,202) at sendto+0x4d
syscall(2f,2f,2f,8281000,3846de64) at syscall+0x227
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (133, FreeBSD ELF32, sendto), eip = 0x383f6b9b, esp = 0xbfbfddcc, ebp = 0xbfbfddf8 ---
lock order reversal
 1st 0xc29cf144 inp (tcpinp) @ /usr/src/sys/netinet/tcp_usrreq.c:371
 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107
KDB: stack backtrace:
kdb_backtrace(0,ffffffff,c074d360,c074bbf0,c071800c) at kdb_backtrace+0x29
witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544
_sx_slock(c073a7c0,c06ccc8f,453,0,c2977a00) at _sx_slock+0x50
fr_check(c2977a40,14,c23fe800,1,e74cbb38) at fr_check+0x430
fr_check_wrapper(0,e74cbb38,c23fe800,2,c29cf0b4) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e74cbbac,c23fe800,2,c29cf0b4) at pfil_run_hooks+0xbd
ip_output(c2977a00,0,e74cbb78,0,0) at ip_output+0x57e
tcp_output(c29d01bc,c28ca800,c28ca798,c2845a80,e74cbca8) at tcp_output+0x1144
tcp_usr_connect(c28ca798,c2574a50,c2845a80) at tcp_usr_connect+0xeb
soconnect(c28ca798,c2574a50,c2845a80,0,c27fa660) at soconnect+0x7c
kern_connect(c2845a80,b,c2574a50,c2574a50,0) at kern_connect+0x74
connect(c2845a80,e74cbd14,3,0,292) at connect+0x2f
syscall(2f,2f,2f,84e1c00,2) at syscall+0x227
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (98, FreeBSD ELF32, connect), eip = 0x3876eddb, esp = 0xbfabbba0, ebp = 0xbfabbbcc ---

lock order reversal
 1st 0xc0771fec tcp (tcp) @ /usr/src/sys/netinet/tcp_input.c:617
 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107
KDB: stack backtrace:
kdb_backtrace(0,ffffffff,c074d388,c074bbf0,c071800c) at kdb_backtrace+0x29
witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544
_sx_slock(c073a7c0,c06ccc8f,453,0,c28dde00) at _sx_slock+0x50
fr_check(c291e810,14,c23fe800,1,e4f3fae8) at fr_check+0x430
fr_check_wrapper(0,e4f3fae8,c23fe800,2,0) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e4f3fb5c,c23fe800,2,0) at pfil_run_hooks+0xbd
ip_output(c28dde00,0,e4f3fb28,0,0,0) at ip_output+0x57e
tcp_respond(0,c291e810,c291e824,c28dde00,f3553cd2,0,14) at tcp_respond+0x3e1
tcp_input(c28dde00,14,5bb7cbc8,0,0) at tcp_input+0x313b
ip_input(c28dde00) at ip_input+0x539
netisr_processqueue(c0771218) at netisr_processqueue+0x6e
swi_net(0) at swi_net+0xbe
ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124
fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 ---
lock order reversal
 1st 0xc077274c udp (udp) @ /usr/src/sys/netinet/udp_usrreq.c:246
 2nd 0xc073a7c0 ipf filter rwlock (ipf filter rwlock) @ /usr/src/sys/contrib/ipfilter/netinet/fil.c:1107
KDB: stack backtrace:
kdb_backtrace(0,ffffffff,c074d3d8,c074bbf0,c071800c) at kdb_backtrace+0x29
witness_checkorder(c073a7c0,1,c06ccc8f,453) at witness_checkorder+0x544
_sx_slock(c073a7c0,c06ccc8f,453,0,c276a400) at _sx_slock+0x50
fr_check(c276a4c8,14,c23fe800,1,e4f3fb0c) at fr_check+0x430
fr_check_wrapper(0,e4f3fb0c,c23fe800,2,0) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e4f3fb80,c23fe800,2,0) at pfil_run_hooks+0xbd
ip_output(c276a400,0,e4f3fb4c,0,0) at ip_output+0x57e
icmp_send(c276a400,0,c276a400) at icmp_send+0x55
icmp_reflect(c276a400,c291f010,c276a4c8,14) at icmp_reflect+0x2d6
icmp_error(c28ddd00,3,3,0,0) at icmp_error+0x212
udp_input(c28ddd00,14,51b7cbc8,0,0) at udp_input+0x4d0
ip_input(c28ddd00) at ip_input+0x539
netisr_processqueue(c0771218) at netisr_processqueue+0x6e
swi_net(0) at swi_net+0xbe
ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124
fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 ---
Waiting on "ipf IP state rwlock" with the following non-sleepable locks held:
exclusive sleep mutex inp (tcpinp) r = 0 (0xc3833bd0) locked @ /usr/src/sys/netinet/tcp_input.c:744
KDB: stack backtrace:
kdb_backtrace(1,1,1,c23a6a80,c073a864) at kdb_backtrace+0x29
witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a
cv_wait(c073a864,c0744cf4,0,0,92e2f6a1) at cv_wait+0xad
_sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68
fr_checkstate(c2929540,e4f3f9e0,0,c2929500,0) at fr_checkstate+0x4b1
fr_check(c2929540,14,c23fe800,1,e4f3fa88) at fr_check+0x51c
fr_check_wrapper(0,e4f3fa88,c23fe800,2,c3833b40) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e4f3fafc,c23fe800,2,c3833b40) at pfil_run_hooks+0xbd
ip_output(c2929500,0,e4f3fac8,0,0) at ip_output+0x57e
tcp_output(c29a9378) at tcp_output+0x1144
tcp_input(c2927100,14,61b7cbc8,0,0) at tcp_input+0x2ec7
ip_input(c2927100) at ip_input+0x539
netisr_processqueue(c0771218) at netisr_processqueue+0x6e
swi_net(0) at swi_net+0xbe
ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124
fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 ---
Waiting on "ipf IP state rwlock" with the following non-sleepable locks held:
exclusive sleep mutex inp (tcpinp) r = 0 (0xc37aaf54) locked @ /usr/src/sys/netinet/tcp_input.c:744
KDB: stack backtrace:
kdb_backtrace(1,1,1,c23a6a80,c073a864) at kdb_backtrace+0x29
witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a
cv_wait(c073a864,c0744cf4,0,0,6ce9de9a) at cv_wait+0xad
_sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68
fr_checkstate(c34f7c40,e4f3f9e0,0,c34f7c00,0) at fr_checkstate+0x4b1
fr_check(c34f7c40,14,c23fe800,1,e4f3fa88) at fr_check+0x51c
fr_check_wrapper(0,e4f3fa88,c23fe800,2,c37aaec4) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e4f3fafc,c23fe800,2,c37aaec4) at pfil_run_hooks+0xbd
ip_output(c34f7c00,0,e4f3fac8,0,0) at ip_output+0x57e
tcp_output(c35c8000) at tcp_output+0x1144
tcp_input(c3546600,14,61b7cbc8,0,0) at tcp_input+0x2ec7
ip_input(c3546600) at ip_input+0x539
netisr_processqueue(c0771218) at netisr_processqueue+0x6e
swi_net(0) at swi_net+0xbe
ithread_loop(c2392680,e4f3fd48,c2392680,c052c5ec,0) at ithread_loop+0x124
fork_exit(c052c5ec,c2392680,e4f3fd48) at fork_exit+0xa4
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xe4f3fd7c, ebp = 0 ---
Waiting on "ipf IP state rwlock" with the following non-sleepable locks held:
exclusive sleep mutex inp (tcpinp) r = 0 (0xc4530144) locked @ /usr/src/sys/netinet/tcp_usrreq.c:602
KDB: stack backtrace:
kdb_backtrace(1,1,1,c2b76a80,c073a864) at kdb_backtrace+0x29
witness_warn(5,c0744cf4,c06dcc2a,c06cd145,c071800c) at witness_warn+0x19a
cv_wait(c073a864,c0744cf4,0,0,b970a161) at cv_wait+0xad
_sx_slock(c073a840,c06ccf4b,643) at _sx_slock+0x68
fr_checkstate(c2928540,e76499d8,0,c2928500,0) at fr_checkstate+0x4b1
fr_check(c2928540,14,c256e800,1,e7649a80) at fr_check+0x51c
fr_check_wrapper(0,e7649a80,c256e800,2,c45300b4) at fr_check_wrapper+0x2a
pfil_run_hooks(c0771b80,e7649af4,c256e800,2,c45300b4) at pfil_run_hooks+0xbd
ip_output(c2928500,0,e7649ac0,0,0) at ip_output+0x57e
tcp_output(c380f1bc) at tcp_output+0x1144
tcp_usr_rcvd(c655e510,0,c655e578,0,c06e66c3) at tcp_usr_rcvd+0x82
soreceive(c655e510,0,e7649c88,0,0) at soreceive+0xb79
soo_read(c3156374,e7649c88,c2f72980,0,c2b76a80) at soo_read+0x41
dofileread(c2b76a80,c3156374,9,80e2008,1000) at dofileread+0x95
read(c2b76a80,e7649d14,3,f,296) at read+0x3b
syscall(2f,2f,2f,9,12c) at syscall+0x227
Xint0x80_syscall() at Xint0x80_syscall+0x1f
--- syscall (3, FreeBSD ELF32, read), eip = 0x3829c5db, esp = 0xbfbfe7ec, ebp = 0xbfbfe818 ---


More information about the freebsd-stable mailing list