Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933678AbYBMROd (ORCPT ); Wed, 13 Feb 2008 12:14:33 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932369AbYBMRNx (ORCPT ); Wed, 13 Feb 2008 12:13:53 -0500 Received: from cantor2.suse.de ([195.135.220.15]:49829 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933103AbYBMRNv (ORCPT ); Wed, 13 Feb 2008 12:13:51 -0500 From: Andi Kleen Organization: SUSE Linux Products GmbH, Nuernberg, GF: Markus Rex, HRB 16746 (AG Nuernberg) To: Jiri Kosina Subject: Re: print_vma_addr possible deadlock (was Re: Jeste jeden bug) Date: Wed, 13 Feb 2008 18:13:46 +0100 User-Agent: KMail/1.9.6 Cc: Ingo Molnar , Thomas Gleixner , Zdenek Kabelac , linux-kernel@vger.kernel.org References: In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200802131813.47136.ak@suse.de> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 906 Lines: 22 > > in commit 03252919 you introduced print_vma_addr(), but this funcion for > > obvious reasons takes mmap_sem, so it is not safe to call it from atomic > > context (i.e. do_trap(), for example), which is behavior your patch > > introduced. Ah yes -- this behaviour of int3 do_trap was always a source of bugs. I remember fixing such things in this area several times (last time in the RT kernel), but I keep forgetting it. Sorry. The correct fix is to run the int3 and debug handlers on the process stack when the fault originated from user space. Then they can run preemptive and it's ok to schedule for the lock too. I'll fix that tomorrow. -Andi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/