Hello,

This a witness report I got on boot with snapshot Jun 1st amd64

root on sd0a (9b49e3196b9bfae8.a) swap on sd0b dump on sd0b
lock order reversal:
 1st 0xffffff021cdac180 vmmaplk (&map->lock) @ /usr/src/sys/uvm/uvm_map.c:4433
 2nd 0xffffff01dc5f71a8 inode (&ip->i_lock)
@ /usr/src/sys/ufs/ufs/ufs_vnops.c:1559 lock order "&ip->i_lock"(rrwlock) ->
"&map->lock"(rwlock) first seen at: #0  witness_checkorder+0x494
#1  _rw_enter_read+0x49
#2  uvmfault_lookup+0x7d
#3  uvm_fault+0x65
#4  trap+0x509
#5  Xalltraps_untramp+0xec
#6  copyout+0x48
#7  ffs_read+0x1e0
#8  VOP_READ+0x3c
#9  vn_read+0xba
#10 dofilereadv+0x21c
#11 sys_read+0x75
#12 syscall+0x31d
#13 Xsyscall_untramp+0xc0
lock order "&map->lock"(rwlock) -> "&ip->i_lock"(rrwlock) first seen at:
#0  witness_checkorder+0x494
#1  _rw_enter+0x56
#2  _rrw_enter+0x32
#3  VOP_LOCK+0x30
#4  vn_lock+0x24
#5  uvn_io+0x1a5
#6  uvm_pager_put+0xf9
#7  uvn_flush+0x414
#8  uvm_map_clean+0x3c7
#9  syscall+0x31d
#10 Xsyscall_untramp+0xc0


-- 
Christophe Prévotaux

Reply via email to