When booting the latest version of Linville's wireless-dev and starting my BCM4306 with WPA-PSK TKIP, the I get the following INFO printout that indicates a possible circular locking dependency involving 80211 and wpa_supplicant.
Thanks, Larry kernel: ======================================================= kernel: [ INFO: possible circular locking dependency detected ] kernel: ------------------------------------------------------- kernel: wpa_supplicant/4266 is trying to acquire lock: kernel: (&dev->queue_lock){-+..}, at: [<c02c3b76>] dev_queue_xmit+0x56/0x290 kernel: kernel: but task is already holding lock: kernel: (&dev->_xmit_lock){-+..}, at: [<c02c3d46>] dev_queue_xmit+0x226/0x290 kernel: kernel: which lock already depends on the new lock. kernel: kernel: kernel: the existing dependency chain (in reverse order) is: kernel: kernel: -> #1 (&dev->_xmit_lock){-+..}: kernel: [<c013363b>] lock_acquire+0x5b/0x80 kernel: [<c0314880>] _spin_lock_bh+0x40/0x50 kernel: [<c02cfaac>] dev_activate+0x6c/0x130 kernel: [<c02c225b>] dev_open+0x6b/0x90 kernel: [<e79681dd>] ieee80211_open+0x18d/0x360 [80211] kernel: [<c02c2233>] dev_open+0x43/0x90 kernel: [<c02c11c5>] dev_change_flags+0x55/0x130 kernel: [<c03006af>] devinet_ioctl+0x65f/0x6d0 kernel: [<c0300a18>] inet_ioctl+0x88/0xb0 kernel: [<c02b64cb>] sock_ioctl+0xbb/0x260 kernel: [<c01718db>] do_ioctl+0x2b/0x80 kernel: [<c0171981>] vfs_ioctl+0x51/0x290 kernel: [<c0171c01>] sys_ioctl+0x41/0x60 kernel: [<c0103005>] sysenter_past_esp+0x56/0x8d kernel: kernel: -> #0 (&dev->queue_lock){-+..}: kernel: [<c013363b>] lock_acquire+0x5b/0x80 kernel: [<c031482b>] _spin_lock+0x3b/0x50 kernel: [<c02c3b76>] dev_queue_xmit+0x56/0x290 kernel: [<e796729f>] ieee80211_subif_start_xmit+0x2df/0x540 [80211] kernel: [<c02c3a22>] dev_hard_start_xmit+0x142/0x240 kernel: [<c02c3d64>] dev_queue_xmit+0x244/0x290 kernel: [<c03115cc>] packet_sendmsg+0x1fc/0x280 kernel: [<c02b7b4a>] sock_sendmsg+0xda/0x110 kernel: [<c02b7eb3>] sys_sendto+0xd3/0x100 kernel: [<c02b8552>] sys_socketcall+0x192/0x260 kernel: [<c0103005>] sysenter_past_esp+0x56/0x8d kernel: kernel: other info that might help us debug this: kernel: kernel: 1 lock held by wpa_supplicant/4266: kernel: #0: (&dev->_xmit_lock){-+..}, at: [<c02c3d46>] dev_queue_xmit+0x226/0x290 kernel: kernel: stack backtrace: kernel: [<c0103b67>] show_trace_log_lvl+0x197/0x1c0 kernel: [<c0104f7b>] show_trace+0x1b/0x20 kernel: [<c0104fa6>] dump_stack+0x26/0x30 kernel: [<c0131361>] print_circular_bug_tail+0x61/0x70 kernel: [<c0133090>] __lock_acquire+0xae0/0xd60 kernel: [<c013363b>] lock_acquire+0x5b/0x80 kernel: [<c031482b>] _spin_lock+0x3b/0x50 kernel: [<c02c3b76>] dev_queue_xmit+0x56/0x290 kernel: [<e796729f>] ieee80211_subif_start_xmit+0x2df/0x540 [80211] kernel: [<c02c3a22>] dev_hard_start_xmit+0x142/0x240 kernel: [<c02c3d64>] dev_queue_xmit+0x244/0x290 kernel: [<c03115cc>] packet_sendmsg+0x1fc/0x280 kernel: [<c02b7b4a>] sock_sendmsg+0xda/0x110 kernel: [<c02b7eb3>] sys_sendto+0xd3/0x100 kernel: [<c02b8552>] sys_socketcall+0x192/0x260 kernel: [<c0103005>] sysenter_past_esp+0x56/0x8d kernel: [<b7fb8410>] 0xb7fb8410 kernel: [<c0104f7b>] show_trace+0x1b/0x20 kernel: [<c0104fa6>] dump_stack+0x26/0x30 kernel: [<c0131361>] print_circular_bug_tail+0x61/0x70 kernel: [<c0133090>] __lock_acquire+0xae0/0xd60 kernel: [<c013363b>] lock_acquire+0x5b/0x80 kernel: [<c031482b>] _spin_lock+0x3b/0x50 kernel: [<c02c3b76>] dev_queue_xmit+0x56/0x290 kernel: [<e796729f>] ieee80211_subif_start_xmit+0x2df/0x540 [80211] kernel: [<c02c3a22>] dev_hard_start_xmit+0x142/0x240 kernel: [<c02c3d64>] dev_queue_xmit+0x244/0x290 kernel: [<c03115cc>] packet_sendmsg+0x1fc/0x280 kernel: [<c02b7b4a>] sock_sendmsg+0xda/0x110 kernel: [<c02b7eb3>] sys_sendto+0xd3/0x100 kernel: [<c02b8552>] sys_socketcall+0x192/0x260 kernel: [<c0103005>] sysenter_past_esp+0x56/0x8d -- VGER BF report: U 0.503392 - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html