Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161179AbWJ3KHO (ORCPT ); Mon, 30 Oct 2006 05:07:14 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1161202AbWJ3KHO (ORCPT ); Mon, 30 Oct 2006 05:07:14 -0500 Received: from amsfep17-int.chello.nl ([213.46.243.15]:54563 "EHLO amsfep18-int.chello.nl") by vger.kernel.org with ESMTP id S1161179AbWJ3KHM (ORCPT ); Mon, 30 Oct 2006 05:07:12 -0500 Subject: [PATCH] lockdep: annotate sk_lock nesting in AF_BLUETOOTH -v2 From: Peter Zijlstra To: linux-kernel Cc: Andrew Morton , Ingo Molnar , David Miller , Marcel Holtmann In-Reply-To: <1162196186.24143.158.camel@taijtu> References: <1162196186.24143.158.camel@taijtu> Content-Type: text/plain Date: Mon, 30 Oct 2006 11:08:02 +0100 Message-Id: <1162202882.24143.182.camel@taijtu> Mime-Version: 1.0 X-Mailer: Evolution 2.6.3 (2.6.3-1.fc5.5) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3766 Lines: 119 Today I suck, in an attempt to avoid more damage this shall be my last patch for today. --- ============================================= [ INFO: possible recursive locking detected ] 2.6.18-1.2726.fc6 #1 --------------------------------------------- hidd/2271 is trying to acquire lock: (sk_lock-AF_BLUETOOTH){--..}, at: [] bt_accept_dequeue+0x26/0xc6 [bluetooth] but task is already holding lock: (sk_lock-AF_BLUETOOTH){--..}, at: [] l2cap_sock_accept+0x41/0x11e [l2cap] other info that might help us debug this: 1 lock held by hidd/2271: #0: (sk_lock-AF_BLUETOOTH){--..}, at: [] l2cap_sock_accept+0x41/0x11e [l2cap] stack backtrace: [] show_trace_log_lvl+0x58/0x16a [] show_trace+0xd/0x10 [] dump_stack+0x19/0x1b [] __lock_acquire+0x6ea/0x90d [] lock_acquire+0x4b/0x6b [] lock_sock+0xac/0xbc [] bt_accept_dequeue+0x26/0xc6 [bluetooth] [] l2cap_sock_accept+0xe2/0x11e [l2cap] [] sys_accept+0xd8/0x179 [] sys_socketcall+0xa7/0x186 [] syscall_call+0x7/0xb classical case of nesting; bt_accept_dequeue() locks the children of the object locked by l2cap_sock_accept(). Signed-off-by: Peter Zijlstra --- include/net/sock.h | 8 +++++++- net/bluetooth/l2cap.c | 4 ++-- net/core/sock.c | 6 +++--- 3 files changed, 12 insertions(+), 6 deletions(-) Index: linux-2.6/include/net/sock.h =================================================================== --- linux-2.6.orig/include/net/sock.h +++ linux-2.6/include/net/sock.h @@ -745,7 +745,13 @@ static inline int sk_stream_wmem_schedul */ #define sock_owned_by_user(sk) ((sk)->sk_lock.owner) -extern void FASTCALL(lock_sock(struct sock *sk)); +extern void FASTCALL(lock_sock_nested(struct sock *sk, int subclass)); + +static inline void lock_sock(struct sock *sk) +{ + lock_sock_nested(sk, 0); +} + extern void FASTCALL(release_sock(struct sock *sk)); /* BH context may only use the following locking interface. */ Index: linux-2.6/net/bluetooth/l2cap.c =================================================================== --- linux-2.6.orig/net/bluetooth/l2cap.c +++ linux-2.6/net/bluetooth/l2cap.c @@ -770,7 +770,7 @@ static int l2cap_sock_accept(struct sock long timeo; int err = 0; - lock_sock(sk); + lock_sock_nested(sk, SINGLE_DEPTH_NESTING); if (sk->sk_state != BT_LISTEN) { err = -EBADFD; @@ -792,7 +792,7 @@ static int l2cap_sock_accept(struct sock release_sock(sk); timeo = schedule_timeout(timeo); - lock_sock(sk); + lock_sock_nested(sk, SINGLE_DEPTH_NESTING); if (sk->sk_state != BT_LISTEN) { err = -EBADFD; Index: linux-2.6/net/core/sock.c =================================================================== --- linux-2.6.orig/net/core/sock.c +++ linux-2.6/net/core/sock.c @@ -1527,7 +1527,7 @@ void sock_init_data(struct socket *sock, atomic_set(&sk->sk_refcnt, 1); } -void fastcall lock_sock(struct sock *sk) +void fastcall lock_sock_nested(struct sock *sk, int subclass) { might_sleep(); spin_lock_bh(&sk->sk_lock.slock); @@ -1538,11 +1538,11 @@ void fastcall lock_sock(struct sock *sk) /* * The sk_lock has mutex_lock() semantics here: */ - mutex_acquire(&sk->sk_lock.dep_map, 0, 0, _RET_IP_); + mutex_acquire(&sk->sk_lock.dep_map, subclass, 0, _RET_IP_); local_bh_enable(); } -EXPORT_SYMBOL(lock_sock); +EXPORT_SYMBOL(lock_sock_nested); void fastcall release_sock(struct sock *sk) { - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/