Hello,

        When using /proc/net/tcp in the following manner:

                while true
                do
                cat /proc/net/tcp
                sleep 3
                done

I can regularly get the kernel to hard lock in 2.1.121. (2.1.125
doesn't show any changes in proc.c related to the function
that takes care of this). I can see that Alexey commented in
the code that he also got his machine to hard lock but I cannot
tell from his context whether it was because of using lock_sock
or the current version which uses SOCKHASH_LOCK() (which
translates into a start_bh_atomic()). 

I'd like to use this as a clean way to pulling some information out
of the kernel (I've changed what data gets passed back for my thesis)
but I obviously don't want it to lock up during my defense! =)

I must admit to being a bit baffled by why it could crash inside of
the locks. Is this a bug with a known solution waiting to be fixed?
If so, someone pointing me in the right direction could result in
me sending back a patch. It would be nice if this worked right for
2.2.


-Steve

-- 
______________________________________________________________________________
Steve Shah ([EMAIL PROTECTED]) | SysAdmin/Coder/Gabbernaut/DJ/Writer/Minister
http://www.cs.ucr.edu/~sshah  | We're not dropping out, we're infiltrating.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      Beating code into submission, one operating system at a time...
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to