On Saturday 08 July 2006 19:59, you wrote: > kernel: stack backtrace: > kernel: [<c0103d1d>] show_trace_log_lvl+0x13d/0x160 > kernel: [<c010525b>] show_trace+0x1b/0x20 > kernel: [<c0105286>] dump_stack+0x26/0x30 > kernel: [<c0133f7d>] check_usage+0x26d/0x280 > kernel: [<c013536f>] __lock_acquire+0x77f/0xdd0 > kernel: [<c0135d48>] lock_acquire+0x68/0x90 > kernel: [<c030c195>] _read_lock+0x45/0x60 > kernel: [<c02a786f>] sock_def_readable+0x1f/0x90 > kernel: [<c02bf072>] netlink_broadcast+0x282/0x320 > kernel: [<c02bb6e4>] wireless_send_event+0x244/0x3b0
This is another fscking deadlock. But it should be fixed by the suggested workaround as well. So I see this problem solved for now, too. > kernel: [<e4a2c586>] ieee80211softmac_call_events_locked+0x86/0x140 > [ieee80211softmac] > kernel: [<e4a2c674>] ieee80211softmac_call_events+0x34/0x6f > [ieee80211softmac] > kernel: [<e4a28faf>] ieee80211softmac_auth_resp+0x19f/0x620 > [ieee80211softmac] > kernel: [<e4a1e413>] ieee80211_rx_mgt+0x543/0x810 [ieee80211] > kernel: [<e4a7ea2b>] bcm43xx_rx+0x34b/0x980 [bcm43xx] > kernel: [<e4a820bc>] bcm43xx_dma_rx+0x23c/0x550 [bcm43xx] > kernel: [<e4a6751e>] bcm43xx_interrupt_tasklet+0x38e/0x970 [bcm43xx] > kernel: [<c011e4de>] tasklet_action+0x4e/0x90 > kernel: [<c011ecc2>] __do_softirq+0x62/0xe0 > kernel: [<c01055cb>] do_softirq+0x9b/0xf0 > kernel: [<c01056d1>] do_IRQ+0xb1/0x110 > kernel: [<c0103439>] common_interrupt+0x25/0x2c > kernel: [<c015e01e>] kmem_cache_free+0x6e/0xa0 > kernel: [<c019631d>] proc_destroy_inode+0x1d/0x20 > kernel: [<c017d7eb>] destroy_inode+0x2b/0x60 > kernel: [<c017e753>] generic_delete_inode+0xb3/0x100 > kernel: [<c017d8fd>] iput+0x6d/0x80 > kernel: [<c017b79b>] dentry_iput+0x7b/0xd0 > kernel: [<c017bee4>] dput+0x84/0x190 > kernel: [<c0172194>] path_release+0x14/0x30 > kernel: [<c017295a>] __link_path_walk+0x3ea/0xef0 > kernel: [<c01734b4>] link_path_walk+0x54/0xf0 > kernel: [<c017394e>] do_path_lookup+0xae/0x260 > kernel: [<c017403a>] __path_lookup_intent_open+0x4a/0x90 > kernel: [<c017410a>] path_lookup_open+0x2a/0x30 > kernel: [<c01743a7>] open_namei+0x77/0x6d0 > kernel: [<c0161898>] do_filp_open+0x38/0x60 > kernel: [<c016190b>] do_sys_open+0x4b/0x100 > kernel: [<c0161a17>] sys_open+0x27/0x30 > kernel: [<c01031cd>] sysenter_past_esp+0x56/0x8d > kernel: [<b7fb9410>] 0xb7fb9410 > kernel: SoftMAC: sent association request! > kernel: SoftMAC: associated! > kernel: SoftMAC: Scanning finished > > So far, this situation has only occurred during the initial > association/authorization steps during > bootup. BTW: Jiri, As you can see, various deadlocks are possible when calling directly from a driver tasklet into the 802.11 stack, because by the nature of the 802.11 we must call back into the driver at some places. So, I would like to get rid of the not _irqsafe functions in devicescape. The _irqsafe functions could be stripped by the postfix and the unsafe functions should be strictly internal to the stack. I don't see valid usages for them outside of the stack. -- Greetings Michael. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html