Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1762212AbZAWKGU (ORCPT ); Fri, 23 Jan 2009 05:06:20 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1756351AbZAWKGL (ORCPT ); Fri, 23 Jan 2009 05:06:11 -0500 Received: from ribosome.natur.cuni.cz ([195.113.57.20]:58706 "EHLO ribosome.natur.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755869AbZAWKGJ (ORCPT ); Fri, 23 Jan 2009 05:06:09 -0500 Message-ID: <49799691.3070701@ribosome.natur.cuni.cz> Date: Fri, 23 Jan 2009 11:06:09 +0100 From: =?UTF-8?B?TWFydGluIE1PS1JFSsWg?= User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.19) Gecko/20081227 SeaMonkey/1.1.14 MIME-Version: 1.0 To: LKML Subject: [BUG #12515] 2.6.29-rc2-git1: possible circular locking #0: (sk_lock-AF_PACKET){--..}, at: [] sock_setsockopt+0x12b/0x4a4 X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3389 Lines: 92 Hi, I haven't received any answer on this bug report so I am re-trying over the email list. Running tcpdump under heavy load/io I got this stacktrace. Snippet from dmesg output follows: device eth0 entered promiscuous mode ======================================================= [ INFO: possible circular locking dependency detected ] 2.6.29-rc2-git1 #1 ------------------------------------------------------- tcpdump/3734 is trying to acquire lock: (&mm->mmap_sem){----}, at: [] might_fault+0x30/0x6b but task is already holding lock: (sk_lock-AF_PACKET){--..}, at: [] sock_setsockopt+0x12b/0x4a4 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (sk_lock-AF_PACKET){--..}: [] add_lock_to_list+0x5e/0x8b [] __lock_acquire+0xfb8/0x12e5 [] packet_mmap+0x2e/0xf4 [] packet_mmap+0x2e/0xf4 [] lock_acquire+0x47/0x5e [] packet_mmap+0x2e/0xf4 [] lock_sock_nested+0xac/0xb9 [] packet_mmap+0x2e/0xf4 [] packet_mmap+0x2e/0xf4 [] trace_hardirqs_on_caller+0x104/0x124 [] sock_mmap+0xc/0xe [] mmap_region+0x27e/0x4b4 [] do_mmap_pgoff+0x1ef/0x239 [] sys_mmap2+0x58/0x76 [] sysenter_do_call+0x12/0x35 [] 0xffffffff -> #0 (&mm->mmap_sem){----}: [] print_circular_bug_entry+0x36/0x3d [] __lock_acquire+0xcdb/0x12e5 [] mark_held_locks+0x50/0x66 [] local_bh_enable+0x97/0x9a [] lock_acquire+0x47/0x5e [] might_fault+0x30/0x6b [] might_fault+0x4d/0x6b [] might_fault+0x30/0x6b [] copy_from_user+0x27/0x10e [] sock_setsockopt+0x42e/0x4a4 [] might_fault+0x50/0x6b [] sys_setsockopt+0x4c/0x7d [] sys_socketcall+0x135/0x18c [] sysenter_do_call+0x12/0x35 [] 0xffffffff other info that might help us debug this: 1 lock held by tcpdump/3734: #0: (sk_lock-AF_PACKET){--..}, at: [] sock_setsockopt+0x12b/0x4a4 stack backtrace: Pid: 3734, comm: tcpdump Not tainted 2.6.29-rc2-git1 #1 Call Trace: [] print_circular_bug_tail+0xa5/0xaf [] print_circular_bug_entry+0x36/0x3d [] __lock_acquire+0xcdb/0x12e5 [] mark_held_locks+0x50/0x66 [] local_bh_enable+0x97/0x9a [] lock_acquire+0x47/0x5e [] might_fault+0x30/0x6b [] might_fault+0x4d/0x6b [] might_fault+0x30/0x6b [] copy_from_user+0x27/0x10e [] sock_setsockopt+0x42e/0x4a4 [] might_fault+0x50/0x6b [] sys_setsockopt+0x4c/0x7d [] sys_socketcall+0x135/0x18c [] sysenter_do_call+0x12/0x35 device eth0 left promiscuous mode More details are at http://bugzilla.kernel.org/show_bug.cgi?id=12515 Please Cc: me in replies. Thanks. Martin -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/