[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <000001c8365a$e0e500c0$9c94fea9@jason>
Date: Tue, 4 Dec 2007 18:48:24 +0900
From: "Joonwoo Park" <joonwpark81@...il.com>
To: <netdev@...r.kernel.org>,
"'Linux Kernel Mailing List'" <linux-kernel@...r.kernel.org>
Subject: NET: ASSERT_RTNL in __dev_set_promiscuity makes debug warning
Hi,
dev_set_rx_mode calls __dev_set_rx_mode with softirq disabled (by netif_tx_lock_bh)
therefore __dev_set_promiscuity can be called with softirq disabled.
It will cause in_interrupt() to return true and ASSERT_RTNL warning.
Is there a good solution to fix it besides blowing ASSERT_RTNL up?
Thanks.
Joonwoo
---
diff --git a/net/core/dev.c b/net/core/dev.c
index 86d6261..6f8e72f 100644
--- a/net/core/dev.c
+++ b/net/core/dev.c
@@ -2747,8 +2747,6 @@ static void __dev_set_promiscuity(struct net_device *dev, int inc)
{
unsigned short old_flags = dev->flags;
- ASSERT_RTNL();
-
if ((dev->promiscuity += inc) == 0)
dev->flags &= ~IFF_PROMISC;
else
---
message from e1000 (netdev->set_rx_mode is NULL) + vlan device mac address chage.
WARNING: at kernel/mutex.c:324 __mutex_trylock_slowpath()
Pid: 4523, comm: ifconfig Not tainted 2.6.24-rc3 #179
[<c400544a>] show_trace_log_lvl+0x1a/0x30
[<c4005fa2>] show_trace+0x12/0x20
[<c400679e>] dump_stack+0x6e/0x80
[<c43b084d>] mutex_trylock+0xcd/0x130
[<c42dccfd>] rtnl_trylock+0xd/0x10
[<c42d1f49>] __dev_set_promiscuity+0x19/0x130
[<c42d20b4>] __dev_set_rx_mode+0x54/0x90
[<c42d2151>] dev_unicast_add+0x61/0xb0
[<c438c764>] vlan_set_mac_address+0x104/0x150
[<c42d2ee1>] dev_set_mac_address+0x51/0x70
[<c42d3dca>] dev_ifsioc+0x11a/0x270
[<c42d4131>] dev_ioctl+0x211/0x510
[<c42c699a>] sock_ioctl+0xea/0x220
[<c408a468>] do_ioctl+0x28/0x80
[<c408a517>] vfs_ioctl+0x57/0x280
[<c408a779>] sys_ioctl+0x39/0x60
[<c40043ee>] sysenter_past_esp+0x5f/0x85
=======================
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists