I don't know if this is a previously known lockdep spew for
a 2.6.18-rc6 based fedora kernel. DaveJ suggested I send this
to netdev for wider review.
=============================================
[ INFO: possible recursive locking detected ]
2.6.17-1.2614.fc6 #1
---------------------------------------------
java/7112 is trying to acquire lock:
(slock-AF_INET6){-+..}, at: [<c05b34de>] sk_clone+0xd4/0x2d8
but task is already holding lock:
(slock-AF_INET6){-+..}, at: [<e0ce94c9>] tcp_v6_rcv+0x327/0x736 [ipv6]
other info that might help us debug this:
1 lock held by java/7112:
#0: (slock-AF_INET6){-+..}, at: [<e0ce94c9>] tcp_v6_rcv+0x327/0x736 [ipv6]
stack backtrace:
[<c04051ee>] show_trace_log_lvl+0x58/0x171
[<c0405802>] show_trace+0xd/0x10
[<c040591b>] dump_stack+0x19/0x1b
[<c043b929>] __lock_acquire+0x778/0x99c
[<c043c0be>] lock_acquire+0x4b/0x6d
[<c0613f53>] _spin_lock+0x19/0x28
[<c05b34de>] sk_clone+0xd4/0x2d8
[<c05db03f>] inet_csk_clone+0xf/0x72
[<c05ebe7d>] tcp_create_openreq_child+0x1b/0x3a1
[<e0ce8155>] tcp_v6_syn_recv_sock+0x271/0x5b3 [ipv6]
[<c05ec3d8>] tcp_check_req+0x1d5/0x2e9
[<e0ce7441>] tcp_v6_do_rcv+0x142/0x340 [ipv6]
[<e0ce9883>] tcp_v6_rcv+0x6e1/0x736 [ipv6]
[<e0ccfa6f>] ip6_input+0x1c3/0x296 [ipv6]
[<e0ccffdf>] ipv6_rcv+0x1d2/0x21f [ipv6]
[<c05b9548>] netif_receive_skb+0x205/0x274
[<c05baeac>] process_backlog+0x99/0xfa
[<c05bb08f>] net_rx_action+0x9d/0x196
[<c04293cb>] __do_softirq+0x78/0xf2
[<c040668b>] do_softirq+0x5a/0xbe
[<c04291c2>] local_bh_enable_ip+0xa9/0xcf
[<c0613ef1>] _spin_unlock_bh+0x25/0x28
[<c05b22df>] release_sock+0xb0/0xb8
[<c05f40f6>] inet_stream_connect+0x113/0x206
[<c05b1242>] sys_connect+0x67/0x84
[<c05b18b4>] sys_socketcall+0x8c/0x186
[<c0403faf>] syscall_call+0x7/0xb
DWARF2 unwinder stuck at syscall_call+0x7/0xb
Leftover inexact backtrace:
[no leftovers printed]
--
Matthew Galgoci
IS Production Operations
Red Hat, Inc
919.754.3700 x44155
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html