lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 29 Jul 2008 13:53:39 +0200
From:	"Zdenek Kabelac" <zdenek.kabelac@...il.com>
To:	"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>
Subject: INFO: possible recursive locking detected dev_deactivate

Hi

With kernel from yesterdays' git (08/07/28) (sorry I've already
deleted any traces for more precise commit number) - I've just found
the bactrace in the log running already today's 2.6.27-rc1.

Happened during the reboot of 2.6.26
As usually T61, 2GB, C2D

(wlan0): now unmanaged
(wlan0): device state change: 3 -> 1
(wlan0): cleaning up...
(wlan0): taking down device.

=============================================
[ INFO: possible recursive locking detected ]
2.6.26 #47
---------------------------------------------
NetworkManager/2623 is trying to acquire lock:
 (_xmit_IEEE80211#2){-...}, at: [<ffffffff812a3cd2>] dev_deactivate+0x82/0x150

but task is already holding lock:
 (_xmit_IEEE80211#2){-...}, at: [<ffffffff812a3cd2>] dev_deactivate+0x82/0x150

other info that might help us debug this:
2 locks held by NetworkManager/2623:
 #0:  (rtnl_mutex){--..}, at: [<ffffffff8129ca0a>] rtnetlink_rcv+0x1a/0x40
 #1:  (_xmit_IEEE80211#2){-...}, at: [<ffffffff812a3cd2>]
dev_deactivate+0x82/0x150

stack backtrace:
Pid: 2623, comm: NetworkManager Not tainted 2.6.26 #47

Call Trace:
 [<ffffffff81068b4a>] __lock_acquire+0xcea/0x13b0
 [<ffffffff810674fd>] ? mark_held_locks+0x4d/0x90
 [<ffffffff810657a4>] ? get_lock_stats+0x34/0x70
 [<ffffffff812a3cd2>] ? dev_deactivate+0x82/0x150
 [<ffffffff810692a6>] lock_acquire+0x96/0xe0
 [<ffffffff812a3cd2>] ? dev_deactivate+0x82/0x150
 [<ffffffff81315161>] _spin_lock+0x31/0x60
 [<ffffffff812a3cd2>] dev_deactivate+0x82/0x150
 [<ffffffff81292885>] dev_close+0x65/0xc0
 [<ffffffffa013a9d9>] ieee80211_stop+0x339/0x4e0 [mac80211]
 [<ffffffff81292896>] dev_close+0x76/0xc0
 [<ffffffff81292461>] dev_change_flags+0xa1/0x1e0
 [<ffffffff8129b774>] do_setlink+0x214/0x3a0
 [<ffffffff81318c60>] ? sub_preempt_count+0x80/0x120
 [<ffffffff81314e40>] ? _read_unlock+0x30/0x60
 [<ffffffff8129bacd>] rtnl_setlink+0x10d/0x150
 [<ffffffff8129cbbd>] rtnetlink_rcv_msg+0x18d/0x240
 [<ffffffff8129ca30>] ? rtnetlink_rcv_msg+0x0/0x240
 [<ffffffff812a77e9>] netlink_rcv_skb+0x89/0xb0
 [<ffffffff8129ca19>] rtnetlink_rcv+0x29/0x40
 [<ffffffff812a720d>] netlink_unicast+0x2cd/0x2e0
 [<ffffffff8128b01e>] ? __alloc_skb+0x6e/0x150
 [<ffffffff812a7424>] netlink_sendmsg+0x204/0x300
 [<ffffffff81314e5e>] ? _read_unlock+0x4e/0x60
 [<ffffffff812827d7>] sock_sendmsg+0x127/0x140
 [<ffffffff81057120>] ? autoremove_wake_function+0x0/0x40
 [<ffffffff810677ad>] ? trace_hardirqs_on+0xd/0x10
 [<ffffffff8106773b>] ? trace_hardirqs_on_caller+0x14b/0x1b0
 [<ffffffff812835f7>] ? move_addr_to_kernel+0x57/0x60
 [<ffffffff8128c04f>] ? verify_iovec+0x3f/0xe0
 [<ffffffff81282979>] sys_sendmsg+0x189/0x320
 [<ffffffff812836fd>] ? sys_sendto+0xfd/0x120
 [<ffffffff810e1a8c>] ? d_free+0x6c/0x80
 [<ffffffff810cec01>] ? __fput+0x171/0x1c0
 [<ffffffff8106773b>] ? trace_hardirqs_on_caller+0x14b/0x1b0
 [<ffffffff813148d6>] ? trace_hardirqs_on_thunk+0x3a/0x3f
 [<ffffffff8100c5bb>] system_call_fastpath+0x16/0x1b

iwl3945 0000:03:00.0: PCI INT A disabled
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ