Search Linux Wireless

Possible circular locking problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



While testing usage of b43legacy as an AP, I got the following in my logs. My
kernel is the latest wireless-testing that was pulled about 2 hours ago -
hostapd is 0.6.8.

Larry

=======================================================
[ INFO: possible circular locking dependency detected ]
2.6.29-rc8-wl #89
-------------------------------------------------------
hostapd/6686 is trying to acquire lock:
 (rtnl_mutex){--..}, at: [<ffffffff803e45b8>] rtnl_lock+0x12/0x14

but task is already holding lock:
 (&drv->mtx){--..}, at: [<ffffffffa01e2a60>]
cfg80211_get_dev_from_info+0x101/0x115 [cfg80211]

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #2 (&drv->mtx){--..}:
       [<ffffffff8025ed1f>] __lock_acquire+0x12b4/0x161e
       [<ffffffff8025f0de>] lock_acquire+0x55/0x71
       [<ffffffff804490d2>] mutex_lock_nested+0x111/0x2ae
       [<ffffffffa01e293a>] cfg80211_get_dev_from_ifindex+0x65/0x8a [cfg80211]
       [<ffffffffa01e4ef5>] cfg80211_wext_giwscan+0x40/0xe8a [cfg80211]
       [<ffffffff804382bd>] ioctl_standard_iw_point+0x16d/0x1fc
       [<ffffffff804383e1>] ioctl_standard_call+0x95/0xb4
       [<ffffffff8043852b>] wext_ioctl_dispatch+0x9a/0x172
       [<ffffffff804386ee>] wext_handle_ioctl+0x39/0x6f
       [<ffffffff803dd0a8>] dev_ioctl+0x611/0x63a
       [<ffffffff803cc9df>] sock_ioctl+0x20e/0x21d
       [<ffffffff802bc050>] vfs_ioctl+0x2a/0x78
       [<ffffffff802bc509>] do_vfs_ioctl+0x46b/0x4ab
       [<ffffffff802bc58b>] sys_ioctl+0x42/0x65
       [<ffffffff8020c0db>] system_call_fastpath+0x16/0x1b
       [<ffffffffffffffff>] 0xffffffffffffffff

-> #1 (cfg80211_mutex){--..}:
       [<ffffffff8025ed1f>] __lock_acquire+0x12b4/0x161e
       [<ffffffff8025f0de>] lock_acquire+0x55/0x71
       [<ffffffff804490d2>] mutex_lock_nested+0x111/0x2ae
       [<ffffffffa01e28ec>] cfg80211_get_dev_from_ifindex+0x17/0x8a [cfg80211]
       [<ffffffffa01e4ef5>] cfg80211_wext_giwscan+0x40/0xe8a [cfg80211]
       [<ffffffff804382bd>] ioctl_standard_iw_point+0x16d/0x1fc
       [<ffffffff804383e1>] ioctl_standard_call+0x95/0xb4
       [<ffffffff8043852b>] wext_ioctl_dispatch+0x9a/0x172
       [<ffffffff804386ee>] wext_handle_ioctl+0x39/0x6f
       [<ffffffff803dd0a8>] dev_ioctl+0x611/0x63a
       [<ffffffff803cc9df>] sock_ioctl+0x20e/0x21d
       [<ffffffff802bc050>] vfs_ioctl+0x2a/0x78
       [<ffffffff802bc509>] do_vfs_ioctl+0x46b/0x4ab
       [<ffffffff802bc58b>] sys_ioctl+0x42/0x65
       [<ffffffff8020c0db>] system_call_fastpath+0x16/0x1b
       [<ffffffffffffffff>] 0xffffffffffffffff

-> #0 (rtnl_mutex){--..}:
       [<ffffffff8025e9ee>] __lock_acquire+0xf83/0x161e
       [<ffffffff8025f0de>] lock_acquire+0x55/0x71
       [<ffffffff804490d2>] mutex_lock_nested+0x111/0x2ae
       [<ffffffff803e45b8>] rtnl_lock+0x12/0x14
       [<ffffffffa01eac78>] nl80211_new_interface+0xb8/0x18d [cfg80211]
       [<ffffffff803ef5be>] genl_rcv_msg+0x19a/0x1bb
       [<ffffffff803ee7a2>] netlink_rcv_skb+0x3e/0x90
       [<ffffffff803ef414>] genl_rcv+0x29/0x39
       [<ffffffff803ee282>] netlink_unicast+0x1fe/0x274
       [<ffffffff803ee575>] netlink_sendmsg+0x27d/0x290
       [<ffffffff803cd17d>] sock_sendmsg+0xdf/0xf8
       [<ffffffff803cd368>] sys_sendmsg+0x1d2/0x23c
       [<ffffffff8020c0db>] system_call_fastpath+0x16/0x1b
       [<ffffffffffffffff>] 0xffffffffffffffff

other info that might help us debug this:

2 locks held by hostapd/6686:
 #0:  (genl_mutex){--..}, at: [<ffffffff803ef405>] genl_rcv+0x1a/0x39
 #1:  (&drv->mtx){--..}, at: [<ffffffffa01e2a60>]
cfg80211_get_dev_from_info+0x101/0x115 [cfg80211]

stack backtrace:
Pid: 6686, comm: hostapd Not tainted 2.6.29-rc8-wl #89
Call Trace:
 [<ffffffff8025d685>] print_circular_bug_tail+0xc5/0xd0
 [<ffffffff8025e9ee>] __lock_acquire+0xf83/0x161e
 [<ffffffffa01e2a60>] ? cfg80211_get_dev_from_info+0x101/0x115 [cfg80211]
 [<ffffffff8025f0de>] lock_acquire+0x55/0x71
 [<ffffffff803e45b8>] ? rtnl_lock+0x12/0x14
 [<ffffffff804490d2>] mutex_lock_nested+0x111/0x2ae
 [<ffffffff803e45b8>] ? rtnl_lock+0x12/0x14
 [<ffffffff803e45b8>] ? rtnl_lock+0x12/0x14
 [<ffffffff803e45b8>] rtnl_lock+0x12/0x14
 [<ffffffffa01eac78>] nl80211_new_interface+0xb8/0x18d [cfg80211]
 [<ffffffff803eeb6b>] ? validate_nla+0x96/0x141
 [<ffffffff803ef5be>] genl_rcv_msg+0x19a/0x1bb
 [<ffffffff803ef424>] ? genl_rcv_msg+0x0/0x1bb
 [<ffffffff803ee7a2>] netlink_rcv_skb+0x3e/0x90
 [<ffffffff803ef414>] genl_rcv+0x29/0x39
 [<ffffffff803ee180>] ? netlink_unicast+0xfc/0x274
 [<ffffffff803ee282>] netlink_unicast+0x1fe/0x274
 [<ffffffff803d4310>] ? __alloc_skb+0x6f/0x131
 [<ffffffff803ee575>] netlink_sendmsg+0x27d/0x290
 [<ffffffff803cd17d>] sock_sendmsg+0xdf/0xf8
 [<ffffffff8024f1c4>] ? autoremove_wake_function+0x0/0x38
 [<ffffffff8044acf0>] ? _spin_unlock_irqrestore+0x3f/0x47
 [<ffffffff803cdb68>] ? move_addr_to_kernel+0x40/0x49
 [<ffffffff803d5502>] ? verify_iovec+0x4f/0x91
 [<ffffffff803cd368>] sys_sendmsg+0x1d2/0x23c
 [<ffffffff802be90d>] ? __d_free+0x55/0x59
 [<ffffffff802be943>] ? d_free+0x32/0x4c
 [<ffffffff802c5577>] ? mntput_no_expire+0x2a/0x13d
 [<ffffffff802b1012>] ? __fput+0x19c/0x1a9
 [<ffffffff8025d14b>] ? trace_hardirqs_on_caller+0x114/0x138
 [<ffffffff8044a8cc>] ? trace_hardirqs_on_thunk+0x3a/0x3f
 [<ffffffff8032ac62>] ? __up_read+0x1c/0x9a
 [<ffffffff8020c0db>] system_call_fastpath+0x16/0x1b
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux