From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dave Jones Subject: another networking lockdep bug Date: Thu, 13 Jul 2006 00:07:16 -0400 Message-ID: <20060713040715.GE4199@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: netdev Return-path: Received: from mx1.redhat.com ([66.187.233.31]:39566 "EHLO mx1.redhat.com") by vger.kernel.org with ESMTP id S932168AbWGMEHV (ORCPT ); Thu, 13 Jul 2006 00:07:21 -0400 To: Linux Kernel Content-Disposition: inline Sender: netdev-owner@vger.kernel.org List-Id: netdev.vger.kernel.org Not sure if this one got reported/fixed yet, as I was running a kernel from sometime last week.. Dave ======================================================= [ INFO: possible circular locking dependency detected ] ------------------------------------------------------- git-fetch/11540 is trying to acquire lock: (sk_lock-AF_INET){--..}, at: [] tcp_sendmsg+0x1f/0xb1a but task is already holding lock: (&inode->i_alloc_sem){--..}, at: [] notify_change+0x105/0x2f7 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&inode->i_alloc_sem){--..}: [] lock_acquire+0x4a/0x69 [] down_write+0x3a/0x47 [] notify_change+0x104/0x2f7 [] do_truncate+0x52/0x72 [] may_open+0x1d5/0x231 [] open_namei+0x290/0x6b4 [] do_filp_open+0x27/0x46 [] do_sys_open+0x4e/0xcd [] sys_open+0x1a/0x1d [] system_call+0x7d/0x83 -> #2 (&sysfs_inode_imutex_key){--..}: [] lock_acquire+0x4a/0x69 [] __mutex_lock_slowpath+0xeb/0x29f [] mutex_lock+0x29/0x2e [] create_dir+0x2c/0x1e2 [] sysfs_create_dir+0x59/0x78 [] kobject_add+0x114/0x1d8 [] class_device_add+0xb5/0x49d [] netdev_register_sysfs+0x98/0xa2 [] register_netdevice+0x28c/0x377 [] register_netdev+0x5a/0x69 [] loopback_init+0x4e/0x53 [] net_olddevs_init+0xb/0xb7 [] init+0x177/0x348 [] child_rip+0x7/0x12 -> #1 (rtnl_mutex){--..}: [] lock_acquire+0x4a/0x69 [] __mutex_lock_slowpath+0xeb/0x29f [] mutex_lock+0x29/0x2e [] rtnl_lock+0xf/0x12 [] ip_mc_leave_group+0x1e/0xae [] do_ip_setsockopt+0x6ad/0x9b2 [] ip_setsockopt+0x2a/0x84 [] udp_setsockopt+0xd/0x1c [] sock_common_setsockopt+0xe/0x11 [] sys_setsockopt+0x8e/0xb4 [] tracesys+0xd0/0xdb -> #0 (sk_lock-AF_INET){--..}: [] lock_acquire+0x4a/0x69 [] lock_sock+0xd4/0xe7 [] tcp_sendmsg+0x1e/0xb1a [] inet_sendmsg+0x45/0x53 [] sock_sendmsg+0x110/0x130 [] kernel_sendmsg+0x3c/0x52 [] xs_tcp_send_request+0x117/0x320 [sunrpc] [] xprt_transmit+0x105/0x21e [sunrpc] [] call_transmit+0x1f4/0x239 [sunrpc] [] __rpc_execute+0x9b/0x1e6 [sunrpc] [] rpc_execute+0x1a/0x1d [sunrpc] [] rpc_call_sync+0x87/0xb9 [sunrpc] [] nfs3_rpc_wrapper+0x2e/0x74 [nfs] [] nfs3_proc_setattr+0x9b/0xd3 [nfs] [] nfs_setattr+0xe9/0x11e [nfs] [] notify_change+0x154/0x2f7 [] do_truncate+0x52/0x72 [] may_open+0x1d5/0x231 [] open_namei+0x290/0x6b4 [] do_filp_open+0x27/0x46 [] do_sys_open+0x4e/0xcd [] sys_open+0x1a/0x1d [] tracesys+0xd0/0xdb other info that might help us debug this: 2 locks held by git-fetch/11540: #0: (&inode->i_mutex){--..}, at: [] mutex_lock+0x2a/0x2e #1: (&inode->i_alloc_sem){--..}, at: [] notify_change+0x105/0x2f7 stack backtrace: Call Trace: [] show_trace+0xaa/0x23d [] dump_stack+0x15/0x17 [] print_circular_bug_tail+0x6c/0x77 [] __lock_acquire+0x853/0xa54 [] lock_acquire+0x4b/0x69 [] lock_sock+0xd5/0xe7 [] tcp_sendmsg+0x1f/0xb1a [] inet_sendmsg+0x46/0x53 [] sock_sendmsg+0x111/0x130 [] kernel_sendmsg+0x3d/0x52 [] :sunrpc:xs_tcp_send_request+0x118/0x320 [] :sunrpc:xprt_transmit+0x106/0x21e [] :sunrpc:call_transmit+0x1f5/0x239 [] :sunrpc:__rpc_execute+0x9c/0x1e6 [] :sunrpc:rpc_execute+0x1b/0x1d [] :sunrpc:rpc_call_sync+0x88/0xb9 [] :nfs:nfs3_rpc_wrapper+0x2f/0x74 [] :nfs:nfs3_proc_setattr+0x9c/0xd3 [] :nfs:nfs_setattr+0xea/0x11e [] notify_change+0x155/0x2f7 [] do_truncate+0x53/0x72 [] may_open+0x1d6/0x231 [] open_namei+0x291/0x6b4 [] do_filp_open+0x28/0x46 [] do_sys_open+0x4f/0xcd [] sys_open+0x1b/0x1d [] tracesys+0xd1/0xdb -- http://www.codemonkey.org.uk