From mboxrd@z Thu Jan 1 00:00:00 1970 From: arrow.ebd@gmail.com Subject: ipv6: INFO: possible circular locking dependency detected -- 2.6.29-rc3 Date: Thu, 29 Jan 2009 20:43:28 +0800 Message-ID: <20090129124328.GA21638@think> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Cc: netdev@vger.kernel.org To: linux_kernel Return-path: Received: from rv-out-0506.google.com ([209.85.198.236]:58004 "EHLO rv-out-0506.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751135AbZA2MqL (ORCPT ); Thu, 29 Jan 2009 07:46:11 -0500 Content-Disposition: inline Sender: netdev-owner@vger.kernel.org List-ID: hi, Here is some error message when I starting gw6c, but work fine after try again. [28132.185654] tun: Disabled Privacy Extensions [28205.459897] ip6_tables: (C) 2000-2006 Netfilter Core Team [28696.166729] warning: `dumpcap' uses 32-bit capabilities (legacy support in use) [28715.857186] device tun entered promiscuous mode [28716.414947] [28716.414950] ======================================================= [28716.414954] [ INFO: possible circular locking dependency detected ] [28716.414956] 2.6.29-rc3 #38 [28716.414958] ------------------------------------------------------- [28716.414960] dumpcap/20695 is trying to acquire lock: [28716.414962] (&mm->mmap_sem){----}, at: [] might_fault+0x31/0x6d [28716.414969] [28716.414970] but task is already holding lock: [28716.414972] (sk_lock-AF_PACKET){--..}, at: [] sock_setsockopt+0x12c/0x4a9 [28716.414977] [28716.414978] which lock already depends on the new lock. [28716.414979] [28716.414980] [28716.414981] the existing dependency chain (in reverse order) is: [28716.414983] [28716.414983] -> #1 (sk_lock-AF_PACKET){--..}: [28716.414987] [] check_usage+0x6d/0x338 [28716.414991] [] add_lock_to_list+0x66/0x94 [28716.414994] [] __lock_acquire+0x1004/0x132b [28716.414997] [] packet_mmap+0x2e/0xf4 [28716.415001] [] packet_mmap+0x2e/0xf4 [28716.415004] [] lock_acquire+0x5c/0x7e [28716.415007] [] packet_mmap+0x2e/0xf4 [28716.415010] [] lock_sock_nested+0xac/0xb9 [28716.415014] [] packet_mmap+0x2e/0xf4 [28716.415017] [] packet_mmap+0x2e/0xf4 [28716.415020] [] sock_mmap+0xf/0x11 [28716.415022] [] mmap_region+0x283/0x4c0 [28716.415026] [] do_mmap_pgoff+0x218/0x261 [28716.415029] [] sys_mmap2+0x59/0x77 [28716.415033] [] sysenter_do_call+0x12/0x3f [28716.415036] [] 0xffffffff [28716.415050] [28716.415050] -> #0 (&mm->mmap_sem){----}: [28716.415053] [] print_circular_bug_tail+0x77/0xae [28716.415057] [] __lock_acquire+0xd34/0x132b [28716.415060] [] mark_held_locks+0x4e/0x64 [28716.415063] [] local_bh_enable+0xb8/0xc6 [28716.415066] [] lock_acquire+0x5c/0x7e [28716.415069] [] might_fault+0x31/0x6d [28716.415072] [] might_fault+0x4e/0x6d [28716.415074] [] might_fault+0x31/0x6d [28716.415077] [] copy_from_user+0x27/0x10e [28716.415081] [] sock_setsockopt+0x431/0x4a9 [28716.415084] [] trace_hardirqs_on_caller+0x10e/0x12e [28716.415087] [] might_fault+0x31/0x6d [28716.415090] [] sys_setsockopt+0x4c/0x7d [28716.415093] [] sys_socketcall+0x146/0x19f [28716.415096] [] trace_hardirqs_on_thunk+0xc/0x10 [28716.415099] [] sysenter_do_call+0x12/0x3f [28716.415102] [] 0xffffffff [28716.415107] [28716.415108] other info that might help us debug this: [28716.415109] [28716.415111] 1 lock held by dumpcap/20695: [28716.415112] #0: (sk_lock-AF_PACKET){--..}, at: [] sock_setsockopt+0x12c/0x4a9 [28716.415117] [28716.415117] stack backtrace: [28716.415121] Pid: 20695, comm: dumpcap Not tainted 2.6.29-rc3 #38 [28716.415122] Call Trace: [28716.415126] [] print_circular_bug_tail+0xa4/0xae [28716.415129] [] __lock_acquire+0xd34/0x132b [28716.415132] [] mark_held_locks+0x4e/0x64 [28716.415135] [] local_bh_enable+0xb8/0xc6 [28716.415138] [] lock_acquire+0x5c/0x7e [28716.415140] [] might_fault+0x31/0x6d [28716.415143] [] might_fault+0x4e/0x6d [28716.415145] [] might_fault+0x31/0x6d [28716.415148] [] copy_from_user+0x27/0x10e [28716.415151] [] sock_setsockopt+0x431/0x4a9 [28716.415154] [] trace_hardirqs_on_caller+0x10e/0x12e [28716.415156] [] might_fault+0x31/0x6d [28716.415159] [] sys_setsockopt+0x4c/0x7d [28716.415162] [] sys_socketcall+0x146/0x19f [28716.415165] [] trace_hardirqs_on_thunk+0xc/0x10 [28716.415168] [] sysenter_do_call+0x12/0x3f [28727.318127] device tun left promiscuous mode [28734.529148] device wlan0 entered promiscuous mode [28745.448232] device wlan0 left promiscuous mode [28789.287047] device tun entered promiscuous mode [28960.255184] device tun left promiscuous mode [29228.332332] tun: Disabled Privacy Extensions [29243.004359] tun: Disabled Privacy Extensions [29258.855659] tun: Disabled Privacy Extensions [29390.773165] tun: Disabled Privacy Extensions [29439.781285] tun: Disabled Privacy Extensions [29766.436131] tun: Disabled Privacy Extensions