Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760840AbYARBUt (ORCPT ); Thu, 17 Jan 2008 20:20:49 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1758472AbYARBUh (ORCPT ); Thu, 17 Jan 2008 20:20:37 -0500 Received: from smtp2.linux-foundation.org ([207.189.120.14]:47004 "EHLO smtp2.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1760902AbYARBUg (ORCPT ); Thu, 17 Jan 2008 20:20:36 -0500 Date: Thu, 17 Jan 2008 17:19:50 -0800 From: Andrew Morton To: Steven Rostedt Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, adobriyan@openvz.org, dev@sw.ru Subject: Re: [PATCH] printk deadlocks if called with runqueue lock held Message-Id: <20080117171950.ca4ea87f.akpm@linux-foundation.org> In-Reply-To: References: X-Mailer: Sylpheed version 2.2.4 (GTK+ 2.8.20; i486-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2817 Lines: 71 On Thu, 17 Jan 2008 20:04:27 -0500 (EST) Steven Rostedt wrote: > > I thought that one could place a printk anywhere without worrying. > But it seems that it is not wise to place a printk where the runqueue > lock is held. > > I just spent two hours debugging why some of my code was locking up, > to find that the lockup was caused by some debugging printk's that > I had in the scheduler. The printk's were only in rare paths so > they shouldn't be too much of a problem, but after I hit the printk > the system locked up. > > Thinking that it was locking up on my code I went looking down the > wrong path. I finally found (after examining an NMI dump) that > the lockup happened because printk was trying to wakeup the klogd > daemon, which caused a deadlock when the try_to_wakeup code tries > to grab the runqueue lock. A "well-known" problem which few know about ;) Anyway you should be developing with all debug options enabled and that includes NMI watchdog so there. > Since printks are seldom called with interrupts disabled, we can > hold off the waking of klogd if they are. We don't have access to > the runqueue locks from printk, but those locks need interrupts > disabled in order to be held. > > Calling printk with interrupts disabled should only be done for > emergencies and debugging anyway. > > And with this patch, my code ran fine ;-) > > Signed-off-by: Steven Rostedt > --- > kernel/printk.c | 8 +++++++- > 1 file changed, 7 insertions(+), 1 deletion(-) > > Index: linux-mcount.git/kernel/printk.c > =================================================================== > --- linux-mcount.git.orig/kernel/printk.c 2008-01-17 09:06:23.000000000 -0500 > +++ linux-mcount.git/kernel/printk.c 2008-01-17 19:56:59.000000000 -0500 > @@ -978,7 +978,13 @@ void release_console_sem(void) > console_locked = 0; > up(&console_sem); > spin_unlock_irqrestore(&logbuf_lock, flags); > - if (wake_klogd) > + /* > + * If we try to wake up klogd while printing with the runqueue lock > + * held, this will deadlock. We don't have access to the runqueue > + * lock from here, but just checking for interrupts disabled > + * should be enough. > + */ > + if (!irqs_disabled() && wake_klogd) > wake_up_klogd(); > } > EXPORT_SYMBOL(release_console_sem); this looks fairly foul. Might cause problems if one CPU is stuck with interrupts off spewing printks? Couldn't you maintain a sched-hackers-only printk patch which adds a sched_printk() which avoids the wakeup or something like that? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/