Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751462AbWE3M0O (ORCPT ); Tue, 30 May 2006 08:26:14 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751469AbWE3M0O (ORCPT ); Tue, 30 May 2006 08:26:14 -0400 Received: from mail.gmx.net ([213.165.64.20]:17867 "HELO mail.gmx.net") by vger.kernel.org with SMTP id S1751462AbWE3M0N (ORCPT ); Tue, 30 May 2006 08:26:13 -0400 X-Authenticated: #14349625 Subject: Re: [patch, -rc5-mm1] lock validator, fix NULL type->name bug From: Mike Galbraith To: Ingo Molnar Cc: Andrew Morton , linux-kernel@vger.kernel.org In-Reply-To: <20060530121952.GA9625@elte.hu> References: <20060530022925.8a67b613.akpm@osdl.org> <20060530111138.GA5078@elte.hu> <1148990326.7599.4.camel@homer> <1148990725.8610.1.camel@homer> <20060530120641.GA8263@elte.hu> <1148991422.8610.8.camel@homer> <20060530121952.GA9625@elte.hu> Content-Type: text/plain Date: Tue, 30 May 2006 14:28:18 +0200 Message-Id: <1148992098.8700.2.camel@homer> Mime-Version: 1.0 X-Mailer: Evolution 2.4.0 Content-Transfer-Encoding: 7bit X-Y-GMX-Trusted: 0 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3719 Lines: 89 On Tue, 2006-05-30 at 14:19 +0200, Ingo Molnar wrote: > * Mike Galbraith wrote: > > > I have nmi_watchdog=1. I'll reboot with 0 and see if it'll trigger. > > > > I found a warning. > > > BUG: warning at kernel/lockdep.c:2398/check_flags() > > this one could be related to NMI. We are already disabling NMI on > x86_64, but i thought i had it fixed up for i386 - apparently not. Booted with nmi_watchdog=0, no warning and no deadlock. It produced fruit for NFTS. ===================================================== [ BUG: possible circular locking deadlock detected! ] ----------------------------------------------------- mount/2545 is trying to acquire lock: (&ni->mrec_lock){--..}, at: [] mutex_lock+0x8/0xa but task is already holding lock: (&rl->lock){----}, at: [] ntfs_map_runlist+0x14/0xa7 which lock already depends on the new lock, which could lead to circular deadlocks! the existing dependency chain (in reverse order) is: -> #1 (&rl->lock){----}: [] lockdep_acquire+0x61/0x77 [] ntfs_readpage+0x92c/0xb53 [] read_cache_page+0x95/0x15a [] map_mft_record+0xda/0x28a [] ntfs_read_locked_inode+0x5d/0x1559 [] ntfs_read_inode_mount+0x572/0xb30 [] ntfs_fill_super+0xc9e/0x1467 [] get_sb_bdev+0xee/0x141 [] ntfs_get_sb+0x1a/0x20 [] vfs_kern_mount+0x9a/0x166 [] do_kern_mount+0x30/0x43 [] do_mount+0x464/0x7ba [] sys_mount+0x6f/0xa4 [] syscall_call+0x7/0xb -> #0 (&ni->mrec_lock){--..}: [] lockdep_acquire+0x61/0x77 [] __mutex_lock_slowpath+0x49/0xff [] mutex_lock+0x8/0xa [] map_mft_record+0x1d/0x28a [] ntfs_map_runlist_nolock+0x378/0x4a6 [] ntfs_map_runlist+0x6e/0xa7 [] ntfs_readpage+0x8f3/0xb53 [] read_cache_page+0x95/0x15a [] load_system_files+0x1e3/0x1e5c [] ntfs_fill_super+0xcfe/0x1467 [] get_sb_bdev+0xee/0x141 [] ntfs_get_sb+0x1a/0x20 [] vfs_kern_mount+0x9a/0x166 [] do_kern_mount+0x30/0x43 [] do_mount+0x464/0x7ba [] sys_mount+0x6f/0xa4 [] syscall_call+0x7/0xb other info that might help us debug this: 2 locks held by mount/2545: #0: (&s->s_umount){----}, at: [] sget+0x1d9/0x3bd #1: (&rl->lock){----}, at: [] ntfs_map_runlist+0x14/0xa7 stack backtrace: show_trace+0xd/0xf dump_stack+0x17/0x19 print_circular_bug_tail+0x5d/0x66 __lockdep_acquire+0x772/0xc32 lockdep_acquire+0x61/0x77 __mutex_lock_slowpath+0x49/0xff mutex_lock+0x8/0xa map_mft_record+0x1d/0x28a ntfs_map_runlist_nolock+0x378/0x4a6 ntfs_map_runlist+0x6e/0xa7 ntfs_readpage+0x8f3/0xb53 read_cache_page+0x95/0x15a load_system_files+0x1e3/0x1e5c ntfs_fill_super+0xcfe/0x1467 get_sb_bdev+0xee/0x141 ntfs_get_sb+0x1a/0x20 vfs_kern_mount+0x9a/0x166 do_kern_mount+0x30/0x43 do_mount+0x464/0x7ba sys_mount+0x6f/0xa4 syscall_call+0x7/0xb - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/