From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752984Ab0HPXny (ORCPT ); Mon, 16 Aug 2010 19:43:54 -0400 Received: from mailout-us.gmx.com ([74.208.5.67]:53517 "HELO mailout-us.gmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1752542Ab0HPXnw (ORCPT ); Mon, 16 Aug 2010 19:43:52 -0400 X-Authenticated: #65048216 X-Provags-ID: V01U2FsdGVkX1/jf3M1DefjkyEZhmJCN69mYwnY2J+TZTenCm5Pn3 Mw3/XQU14pVOlw Subject: 2.6.36-rc1 - iptables inconsistent lock state From: Ivan Bulatovic To: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Date: Tue, 17 Aug 2010 01:43:41 +0200 Message-ID: <1282002221.2247.8.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.30.2 Content-Transfer-Encoding: 7bit X-Y-GMX-Trusted: 0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I've compiled 2.6.36-rc1 with CONFIG_DEBUG_SPINLOCK=y CONFIG_DEBUG_LOCK_ALLOC=y CONFIG_PROVE_LOCKING=y CONFIG_LOCKDEP=y and when I try to load ufw I get this info in dmesg: [ 30.687708] ================================= [ 30.688013] [ INFO: inconsistent lock state ] [ 30.688013] 2.6.36-rc1-RC #1 [ 30.688013] --------------------------------- [ 30.688013] inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. [ 30.688013] iptables/1853 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 30.688013] (&(&lock->lock)->rlock){+.?...}, at: [] get_counters+0x9d/0x146 [ 30.688013] {IN-SOFTIRQ-W} state was registered at: [ 30.688013] [] __lock_acquire+0x635/0x16a3 [ 30.688013] [] lock_acquire+0xef/0x115 [ 30.688013] [] _raw_spin_lock+0x36/0x45 [ 30.688013] [] ipt_do_table+0xa7/0x3af [ 30.688013] [] iptable_mangle_hook+0x105/0x11a [ 30.688013] [] nf_iterate+0x41/0x84 [ 30.688013] [] nf_hook_slow+0x98/0x13a [ 30.688013] [] ip_rcv+0x26e/0x2aa [ 30.688013] [] __netif_receive_skb+0x47f/0x4df [ 30.688013] [] netif_receive_skb+0x125/0x134 [ 30.688013] [] rtl8169_rx_interrupt.clone.36 +0x345/0x428 [r8169] [ 30.688013] [] rtl8169_poll+0x30/0x16f [r8169] [ 30.688013] [] net_rx_action+0xbb/0x201 [ 30.688013] [] __do_softirq+0x126/0x218 [ 30.688013] [] call_softirq+0x1c/0x28 [ 30.688013] [] do_softirq+0x38/0x81 [ 30.688013] [] irq_exit+0x45/0x90 [ 30.688013] [] do_IRQ+0xac/0xc3 [ 30.688013] [] ret_from_intr+0x0/0xf [ 30.688013] [] cpuidle_idle_call+0xa9/0x13e [ 30.688013] [] cpu_idle+0x65/0xed [ 30.688013] [] rest_init+0xf3/0xfa [ 30.688013] [] start_kernel+0x398/0x3a3 [ 30.688013] [] x86_64_start_reservations +0xb1/0xb5 [ 30.688013] [] x86_64_start_kernel+0xe9/0xf0 [ 30.688013] irq event stamp: 3481 [ 30.688013] hardirqs last enabled at (3481): [] local_bh_enable+0xb8/0xd7 [ 30.688013] hardirqs last disabled at (3479): [] local_bh_enable+0x52/0xd7 [ 30.688013] softirqs last enabled at (3480): [] get_counters+0x70/0x146 [ 30.688013] softirqs last disabled at (3478): [] get_counters+0x2e/0x146 [ 30.688013] [ 30.688013] other info that might help us debug this: [ 30.688013] 2 locks held by iptables/1853: [ 30.688013] #0: (sk_lock-AF_INET){+.+.+.}, at: [] ip_getsockopt+0x5d/0xa3 [ 30.688013] #1: (&xt[i].mutex){+.+.+.}, at: [] xt_find_table_lock+0x3b/0x177 [ 30.688013] [ 30.688013] stack backtrace: [ 30.688013] Pid: 1853, comm: iptables Not tainted 2.6.36-rc1-RC #1 [ 30.688013] Call Trace: [ 30.688013] [] print_usage_bug+0x1a7/0x1b8 [ 30.688013] [] ? save_stack_trace+0x2a/0x47 [ 30.688013] [] ? check_usage_backwards+0x0/0xd1 [ 30.688013] [] mark_lock+0x2e9/0x530 [ 30.688013] [] __lock_acquire+0x6b8/0x16a3 [ 30.688013] [] ? __kmalloc_node+0x14f/0x213 [ 30.688013] [] ? get_counters+0x9d/0x146 [ 30.688013] [] lock_acquire+0xef/0x115 [ 30.688013] [] ? get_counters+0x9d/0x146 [ 30.688013] [] _raw_spin_lock+0x36/0x45 [ 30.688013] [] ? get_counters+0x9d/0x146 [ 30.688013] [] ? local_bh_enable+0xb8/0xd7 [ 30.688013] [] get_counters+0x9d/0x146 [ 30.688013] [] alloc_counters.clone.4+0x2d/0x41 [ 30.688013] [] do_ipt_get_ctl+0x117/0x363 [ 30.688013] [] ? mutex_unlock+0x9/0xb [ 30.688013] [] ? lock_sock_nested+0x6e/0x79 [ 30.688013] [] nf_sockopt+0x53/0x7f [ 30.688013] [] nf_getsockopt+0x13/0x15 [ 30.688013] [] ip_getsockopt+0x74/0xa3 [ 30.688013] [] raw_getsockopt+0x18/0x26 [ 30.688013] [] sock_common_getsockopt+0xf/0x11 [ 30.688013] [] sys_getsockopt+0x75/0x96 [ 30.688013] [] ? handle_mm_fault+0x32e/0x74b [ 30.688013] [] system_call_fastpath+0x16/0x1b uname -a Linux vostro 2.6.36-rc1-RC #1 SMP PREEMPT Tue Aug 17 01:26:16 CEST 2010 x86_64 Intel(R) Core(TM)2 Duo CPU T5670 @ 1.80GHz GenuineIntel GNU/Linux