Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751446AbWE2Wkx (ORCPT ); Mon, 29 May 2006 18:40:53 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751451AbWE2Wkx (ORCPT ); Mon, 29 May 2006 18:40:53 -0400 Received: from mx3.mail.elte.hu ([157.181.1.138]:53692 "EHLO mx3.mail.elte.hu") by vger.kernel.org with ESMTP id S1751446AbWE2Wkv (ORCPT ); Mon, 29 May 2006 18:40:51 -0400 Date: Tue, 30 May 2006 00:41:08 +0200 From: Ingo Molnar To: Michal Piotrowski Cc: linux-kernel@vger.kernel.org, Arjan van de Ven , Andrew Morton , Dave Jones Subject: Re: [patch 00/61] ANNOUNCE: lock validator -V1 Message-ID: <20060529224107.GA6037@elte.hu> References: <20060529212109.GA2058@elte.hu> <6bffcb0e0605291528qe24a0a3r3841c37c5323de6a@mail.gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6bffcb0e0605291528qe24a0a3r3841c37c5323de6a@mail.gmail.com> User-Agent: Mutt/1.4.2.1i X-ELTE-SpamScore: 0.0 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=0.0 required=5.9 tests=AWL autolearn=no SpamAssassin version=3.0.3 0.0 AWL AWL: From: address is in the auto white-list X-ELTE-VirusStatus: clean Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1994 Lines: 57 * Michal Piotrowski wrote: > On 29/05/06, Ingo Molnar wrote: > >We are pleased to announce the first release of the "lock dependency > >correctness validator" kernel debugging feature, which can be downloaded > >from: > > > > http://redhat.com/~mingo/lockdep-patches/ > > > [snip] > > I get this while loading cpufreq modules > > ===================================================== > [ BUG: possible circular locking deadlock detected! ] > ----------------------------------------------------- > modprobe/1942 is trying to acquire lock: > (&anon_vma->lock){--..}, at: [] anon_vma_link+0x1d/0xc9 > > but task is already holding lock: > (&mm->mmap_sem/1){--..}, at: [] copy_process+0xbc6/0x1519 > > which lock already depends on the new lock, > which could lead to circular deadlocks! hm, this one could perhaps be a real bug. Dave: lockdep complains about having observed: anon_vma->lock => mm->mmap_sem mm->mmap_sem => anon_vma->lock locking sequences, in the cpufreq code. Is there some special runtime behavior that still makes this safe, or is it a real bug? > stack backtrace: > show_trace+0xd/0xf dump_stack+0x17/0x19 > print_circular_bug_tail+0x59/0x64 > __lockdep_acquire+0x848/0xa39 > lockdep_acquire+0x69/0x82 > __mutex_lock_slowpath+0xd0/0x347 there's one small detail to improve future lockdep printouts: please set CONFIG_STACK_BACKTRACE_COLS=1, so that the backtrace is more readable. (i'll change the code to force that when CONFIG_LOCKDEP is enabled) > BTW I still must revert lockdep-serial.patch - it doesn't compile on > my gcc 4.1.1 ok, will check this. Ingo - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/