Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755884Ab1FTRsr (ORCPT ); Mon, 20 Jun 2011 13:48:47 -0400 Received: from merlin.infradead.org ([205.233.59.134]:56570 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755414Ab1FTRso convert rfc822-to-8bit (ORCPT ); Mon, 20 Jun 2011 13:48:44 -0400 Subject: slab vs lockdep vs debugobjects From: Peter Zijlstra To: Pekka Enberg , Thomas Gleixner Cc: linux-kernel , "linux-mm@kvack.org" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT Date: Mon, 20 Jun 2011 19:48:00 +0200 Message-ID: <1308592080.26237.114.camel@twins> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4426 Lines: 100 Hi Pekka, Thomas found a fun lockdep splat, see below. Basically call_rcu() can end up in kmem_cache_alloc(), and call_rcu() is used under l3->list_lock, causing the splat. Since the debug kmem_cache isn't SLAB_DESTROY_BY_RCU this shouldn't ever actually recurse. Now, since this particular kmem_cache is created with SLAB_DEBUG_OBJECTS, we thought it might be easy enough to set a separate lockdep class for its l3->list_lock's. However I found that the existing lockdep annotation is for kmalloc only -- don't custom kmem_caches use OFF_SLAB? Anyway, I got lost in slab (again), but would it make sense to move all lockdep fixups into kmem_list3_init() or thereabouts? --- ============================================= [ INFO: possible recursive locking detected ] 3.0.0-rc3+ #37 --------------------------------------------- udevd/124 is trying to acquire lock: (&(&parent->list_lock)->rlock){......}, at: [] ____cache_alloc+0xc9/0x323 but task is already holding lock: (&(&parent->list_lock)->rlock){......}, at: [] __cache_free+0x325/0x3ea other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&(&parent->list_lock)->rlock); lock(&(&parent->list_lock)->rlock); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by udevd/124: #0: (&(&(*({ do { const void *__vpp_verify = (typeof((&(slab_lock))))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*(&(slab_lock))) *)(&(slab_lock)))); (typeof((typeof(*(&(slab_lock))) *)(&(slab_lock)))) (__ptr + (((__per_cpu_offset[__cpu])))); }); })).lock)->rlock){..-...}, at: [] __local_lock_irq+0x16/0x61 #1: (&(&parent->list_lock)->rlock){......}, at: [] __cache_free+0x325/0x3ea stack backtrace: Pid: 124, comm: udevd Not tainted 3.0.0-rc3+ #37 Call Trace: [] __lock_acquire+0x9ae/0xdc8 [] ? look_up_lock_class+0x5f/0xbe [] ? mark_lock+0x2d/0x1d8 [] ? ____cache_alloc+0xc9/0x323 [] lock_acquire+0x103/0x12e [] ? ____cache_alloc+0xc9/0x323 [] ? register_lock_class+0x1e/0x2ca [] ? __debug_object_init+0x43/0x2e7 [] _raw_spin_lock+0x3b/0x4a [] ? ____cache_alloc+0xc9/0x323 [] ____cache_alloc+0xc9/0x323 [] ? register_lock_class+0x1e/0x2ca [] ? __debug_object_init+0x43/0x2e7 [] kmem_cache_alloc+0xc5/0x1fb [] __debug_object_init+0x43/0x2e7 [] ? debug_object_activate+0x38/0xdc [] ? mark_lock+0x2d/0x1d8 [] debug_object_init+0x14/0x16 [] rcuhead_fixup_activate+0x2b/0xbc [] debug_object_fixup+0x1e/0x2b [] debug_object_activate+0xcf/0xdc [] ? kmem_cache_shrink+0x68/0x68 [] __call_rcu+0x4f/0x19e [] call_rcu+0x15/0x17 [] slab_destroy+0x11f/0x157 [] free_block+0x152/0x18d [] __cache_free+0x36e/0x3ea [] ? anon_vma_free+0x3d/0x41 [] ? __local_lock_irq+0x16/0x61 [] kmem_cache_free+0xa1/0x11f [] anon_vma_free+0x3d/0x41 [] __put_anon_vma+0x38/0x3d [] put_anon_vma+0x29/0x2d [] unlink_anon_vmas+0x72/0xa5 [] free_pgtables+0x6c/0xcb [] exit_mmap+0xc0/0xf7 [] mmput+0x60/0xd3 [] exit_mm+0x141/0x14e [] ? _raw_spin_unlock_irq+0x54/0x61 [] do_exit+0x24b/0x74f [] ? fput+0x1d4/0x1e3 [] ? trace_hardirqs_off_caller+0x33/0x90 [] ? retint_swapgs+0x13/0x1b [] do_group_exit+0x82/0xad [] sys_exit_group+0x17/0x1b [] system_call_fastpath+0x16/0x1b -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/