Gang, Is anything going to be done about the slew of LORs that opfilter generates? I have a production box rebooting on me and I'm *very* suspicious about ipfilter here. the LORs in question are: LOR 51 lock order reversal 1st 0xc35fbea0 inp (udp6inp) @ /nfs/freebsd/5.x/src/sys/netinet6/udp6_usrreq.c:738 2nd 0xc06a9ae0 ipf filter rwlock (ipf filter rwlock) @ /nfs/freebsd/5.x/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(ffffffff,c06bc110,c06bc3e0,c068caec,c06e08b0) at kdb_backtrace+0x29 witness_checkorder(c06a9ae0,1,c0648afd,453,c06b5e1c,0,c065c663,6f) at witness_checkorder+0x49d _sx_slock(c06a9ae0,c0648afd,453,0,c369e600) at _sx_slock+0x29 fr_check(c369e684,28,c3253400,1,e8f9d970) at fr_check+0x430 fr_check_wrapper6(0,e8f9d970,c3253400,2,c35fbe10) at fr_check_wrapper6+0x21 pfil_run_hooks(c06e5560,e8f9d9f8,c3253400,2,c35fbe10) at pfil_run_hooks+0xb3 ip6_output(c369e600,0,e8f9da64,0,0) at ip6_output+0xd1d udp6_output(c35fbe10,c369e600,c33fc7a0,0,c3466180) at udp6_output+0x452 udp6_send(c35f28dc,0,c369e600,c33fc7a0,0) at udp6_send+0x168 sosend(c35f28dc,c33fc7a0,e8f9dc40,c369e600,0) at sosend+0x593 kern_sendit(c3466180,4,e8f9dcbc,0,0) at kern_sendit+0x104 sendit(c3466180,4,e8f9dcbc,0,806c3a0) at sendit+0x161 sendto(c3466180,e8f9dd04,6,4,292) at sendto+0x4d syscall(2f,2f,2f,806a000,bfbfea40) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (133, FreeBSD ELF32, sendto), eip = 0x280f50ef, esp = 0xbfbfe9ac, ebp = 0xbfbfeae8 --- lock order reversal 1st 0xc3778f54 inp (tcpinp) @ /nfs/freebsd/5.x/src/sys/netinet/tcp_usrreq.c:371 2nd 0xc06a9ae0 ipf filter rwlock (ipf filter rwlock) @ /nfs/freebsd/5.x/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(ffffffff,c06bda60,c06bc3e0,c068caec,c06e08b0) at kdb_backtrace+0x29 witness_checkorder(c06a9ae0,1,c0648afd,453,c06b5e1c,0,c065c663,6f) at witness_checkorder+0x49d _sx_slock(c06a9ae0,c0648afd,453,0,c3731100) at _sx_slock+0x29 fr_check(c3731140,14,c3253400,1,e8fb5b28) at fr_check+0x430 fr_check_wrapper(0,e8fb5b28,c3253400,2,c3778ec4) at fr_check_wrapper+0x2a pfil_run_hooks(c06e2180,e8fb5b9c,c3253400,2,c3778ec4) at pfil_run_hooks+0xb3 ip_output(c3731100,0,e8fb5b68,0,0) at ip_output+0x4de tcp_output(c37efde0,c3812944,c38128dc,c3466d80,e8fb5c98) at tcp_output+0x1090 tcp_usr_connect(c38128dc,c3243600,c3466d80) at tcp_usr_connect+0xeb soconnect(c38128dc,c3243600,c3466d80,0,c383bc7c) at soconnect+0x7c kern_connect(c3466d80,4,c3243600,c3243600,0) at kern_connect+0x74 connect(c3466d80,e8fb5d04,3,5,282) at connect+0x2f syscall(2f,2f,2f,82c4000,82c4000) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (98, FreeBSD ELF32, connect), eip = 0x2869132f, esp = 0xbfbfdfcc, ebp = 0xbfbfdff8 --- lock order reversal 1st 0xc06e2d4c udp (udp) @ /nfs/freebsd/5.x/src/sys/netinet/udp_usrreq.c:246 2nd 0xc06a9ae0 ipf filter rwlock (ipf filter rwlock) @ /nfs/freebsd/5.x/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(ffffffff,c06bdad8,c06bc3e0,c068caec,c06e08e8) at kdb_backtrace+0x29 witness_checkorder(c06a9ae0,1,c0648afd,453,c06b5e1c,0,c065c663,6f) at witness_checkorder+0x49d _sx_slock(c06a9ae0,c0648afd,453,0,c35fd800) at _sx_slock+0x29 fr_check(c35fd8c8,14,c3253400,1,e63daaec) at fr_check+0x430 fr_check_wrapper(0,e63daaec,c3253400,2,0) at fr_check_wrapper+0x2a pfil_run_hooks(c06e2180,e63dab60,c3253400,2,0) at pfil_run_hooks+0xb3 ip_output(c35fd800,0,e63dab2c,0,0) at ip_output+0x4de icmp_send(c35fd800,0,c35fd800) at icmp_send+0x55 icmp_reflect(c35fd800,c36009d0,c35fd8c8,14) at icmp_reflect+0x2d6 icmp_error(c3600900,3,3,0,0) at icmp_error+0x212 udp_input(c3600900,14,100007f,0,0) at udp_input+0x4d0 ip_input(c3600900) at ip_input+0x4f1 netisr_processqueue(c06e1818) at netisr_processqueue+0x6e swi_net(0) at swi_net+0x88 ithread_loop(c3095b00,e63dad38,c06b4c20,0,c0659fba) at ithread_loop+0x10c fork_exit(c04fd400,c3095b00,e63dad38) at fork_exit+0x66 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe63dad6c, ebp = 0 --- lock order reversal 1st 0xc3909090 inp (rawinp) @ /nfs/freebsd/5.x/src/sys/netinet/raw_ip.c:268 2nd 0xc06a9ae0 ipf filter rwlock (ipf filter rwlock) @ /nfs/freebsd/5.x/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(ffffffff,c06bc0c0,c06bc3e0,c068caec,c06e0840) at kdb_backtrace+0x29 witness_checkorder(c06a9ae0,1,c0648afd,453,c06b5e1c,0,c065c663,6f) at witness_checkorder+0x49d _sx_slock(c06a9ae0,c0648afd,453,0,c33e6c00) at _sx_slock+0x29 fr_check(c33e6cd0,14,c3229000,1,e90bfaec) at fr_check+0x430 fr_check_wrapper(0,e90bfaec,c3229000,2,c3909000) at fr_check_wrapper+0x2a pfil_run_hooks(c06e2180,e90bfb60,c3229000,2,c3909000) at pfil_run_hooks+0xb3 ip_output(c33e6c00,0,e90bfb2c,20,0) at ip_output+0x4de rip_output(c33e6c00,c381ca20,fa04a8c0,1c,c33e6c00) at rip_output+0x293 rip_send(c381ca20,0,c33e6c00,c3243a50,0) at rip_send+0x93 sosend(c381ca20,c3243a50,e90bfc40,c33e6c00,0) at sosend+0x593 kern_sendit(c3904c00,4,e90bfcbc,0,0) at kern_sendit+0x104 sendit(c3904c00,4,e90bfcbc,0,bfbfd47c) at sendit+0x161 sendto(c3904c00,e90bfd04,6,2,292) at sendto+0x4d syscall(2f,2f,2f,bfbfd47c,12750) at syscall+0x227 Xint0x80_syscall() at Xint0x80_syscall+0x1f --- syscall (133, FreeBSD ELF32, sendto), eip = 0x2812a0ef, esp = 0xbfbfd41c, ebp = 0xbfbfd498 --- lock order reversal 1st 0xc06e25ec tcp (tcp) @ /nfs/freebsd/5.x/src/sys/netinet/tcp_input.c:619 2nd 0xc06a9ae0 ipf filter rwlock (ipf filter rwlock) @ /nfs/freebsd/5.x/src/sys/contrib/ipfilter/netinet/fil.c:1107 KDB: stack backtrace: kdb_backtrace(ffffffff,c06bda88,c06bc3e0,c068caec,c06e0878) at kdb_backtrace+0x29 witness_checkorder(c06a9ae0,1,c0648afd,453,c06b5e1c,0,c065c663,6f) at witness_checkorder+0x49d _sx_slock(c06a9ae0,c0648afd,453,0,c364dc00) at _sx_slock+0x29 fr_check(c360d010,14,c3229000,1,e63daac8) at fr_check+0x430 fr_check_wrapper(0,e63daac8,c3229000,2,0) at fr_check_wrapper+0x2a pfil_run_hooks(c06e2180,e63dab3c,c3229000,2,0) at pfil_run_hooks+0xb3 ip_output(c364dc00,0,e63dab08,0,0,0) at ip_output+0x4de tcp_respond(0,c360d010,c360d024,c364dc00,0,87dab9ab,4) at tcp_respond+0x343 tcp_input(c364dc00,14,e25680d1,0,0) at tcp_input+0x2b65 ip_input(c364dc00) at ip_input+0x4f1 netisr_processqueue(c06e1818) at netisr_processqueue+0x6e swi_net(0) at swi_net+0x88 ithread_loop(c3095b00,e63dad38,c06b4c20,0,c0659fba) at ithread_loop+0x10c fork_exit(c04fd400,c3095b00,e63dad38) at fork_exit+0x66 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xe63dad6c, ebp = 0 --- -- Marcel Moolenaar USPA: A-39004 marcel@xcllnt.net