From: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
To: LKML <linux-kernel@vger.kernel.org>,
linux-mm <linux-mm@kvack.org>, Hugh Dickins <hughd@google.com>
Cc: kosaki.motohiro@jp.fujitsu.com
Subject: mem-hotplug + ksm make lockdep warning
Date: Mon, 25 Oct 2010 19:49:50 +0900 (JST) [thread overview]
Message-ID: <20101025193711.917F.A69D9226@jp.fujitsu.com> (raw)
Hi Hugh,
commit 62b61f611e(ksm: memory hotremove migration only) makes following
lockdep warnings. Is this intentional?
More detail: current lockdep hieralcy is here.
memory_notify
offline_pages
lock_system_sleep();
mutex_lock(&pm_mutex);
memory_notify(MEM_GOING_OFFLINE)
__blocking_notifier_call_chain
down_read(memory_chain.rwsem)
ksm_memory_callback()
mutex_lock(&ksm_thread_mutex); // memory_chain.rmsem -> ksm_thread_mutex order
up_read(memory_chain.rwsem)
memory_notify(MEM_OFFLINE)
__blocking_notifier_call_chain
down_read(memory_chain.rwsem) // ksm_thread_mutex -> memory_chain.rmsem order
ksm_memory_callback()
mutex_unlock(&ksm_thread_mutex);
up_read(memory_chain.rwsem)
unlock_system_sleep();
mutex_unlock(&pm_mutex);
So, I think pm_mutex protect ABBA deadlock. but it exist only when
CONFIG_HIBERNATION=y. IOW, this code is not correct generically. Am I
missing something?
Thanks.
=======================================================
[ INFO: possible circular locking dependency detected ]
2.6.36-rc7-mm1+ #148
-------------------------------------------------------
bash/1621 is trying to acquire lock:
((memory_chain).rwsem){.+.+.+}, at: [<ffffffff81079339>] __blocking_notifier_call_chain+0x69/0xc0
but task is already holding lock:
(ksm_thread_mutex){+.+.+.}, at: [<ffffffff8113a3aa>] ksm_memory_callback+0x3a/0xc0
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (ksm_thread_mutex){+.+.+.}:
[<ffffffff8108b70a>] lock_acquire+0xaa/0x140
[<ffffffff81505d74>] __mutex_lock_common+0x44/0x3f0
[<ffffffff81506228>] mutex_lock_nested+0x48/0x60
[<ffffffff8113a3aa>] ksm_memory_callback+0x3a/0xc0
[<ffffffff8150c21c>] notifier_call_chain+0x8c/0xe0
[<ffffffff8107934e>] __blocking_notifier_call_chain+0x7e/0xc0
[<ffffffff810793a6>] blocking_notifier_call_chain+0x16/0x20
[<ffffffff813afbfb>] memory_notify+0x1b/0x20
[<ffffffff81141b7c>] remove_memory+0x1cc/0x5f0
[<ffffffff813af53d>] memory_block_change_state+0xfd/0x1a0
[<ffffffff813afd62>] store_mem_state+0xe2/0xf0
[<ffffffff813a0bb0>] sysdev_store+0x20/0x30
[<ffffffff811bc116>] sysfs_write_file+0xe6/0x170
[<ffffffff8114f398>] vfs_write+0xc8/0x190
[<ffffffff8114fc14>] sys_write+0x54/0x90
[<ffffffff810028b2>] system_call_fastpath+0x16/0x1b
-> #0 ((memory_chain).rwsem){.+.+.+}:
[<ffffffff8108b5ba>] __lock_acquire+0x155a/0x1600
[<ffffffff8108b70a>] lock_acquire+0xaa/0x140
[<ffffffff81506601>] down_read+0x51/0xa0
[<ffffffff81079339>] __blocking_notifier_call_chain+0x69/0xc0
[<ffffffff810793a6>] blocking_notifier_call_chain+0x16/0x20
[<ffffffff813afbfb>] memory_notify+0x1b/0x20
[<ffffffff81141f1e>] remove_memory+0x56e/0x5f0
[<ffffffff813af53d>] memory_block_change_state+0xfd/0x1a0
[<ffffffff813afd62>] store_mem_state+0xe2/0xf0
[<ffffffff813a0bb0>] sysdev_store+0x20/0x30
[<ffffffff811bc116>] sysfs_write_file+0xe6/0x170
[<ffffffff8114f398>] vfs_write+0xc8/0x190
[<ffffffff8114fc14>] sys_write+0x54/0x90
[<ffffffff810028b2>] system_call_fastpath+0x16/0x1b
other info that might help us debug this:
5 locks held by bash/1621:
#0: (&buffer->mutex){+.+.+.}, at: [<ffffffff811bc074>] sysfs_write_file+0x44/0x170
#1: (s_active#110){.+.+.+}, at: [<ffffffff811bc0fd>] sysfs_write_file+0xcd/0x170
#2: (&mem->state_mutex){+.+.+.}, at: [<ffffffff813af478>] memory_block_change_state+0x38/0x1a0
#3: (pm_mutex){+.+.+.}, at: [<ffffffff81141ad9>] remove_memory+0x129/0x5f0
#4: (ksm_thread_mutex){+.+.+.}, at: [<ffffffff8113a3aa>] ksm_memory_callback+0x3a/0xc0
stack backtrace:
Pid: 1621, comm: bash Not tainted 2.6.36-rc7-mm1+ #148
Call Trace:
[<ffffffff81088b5b>] print_circular_bug+0xeb/0xf0
[<ffffffff8108b5ba>] __lock_acquire+0x155a/0x1600
[<ffffffff8103a1f9>] ? finish_task_switch+0x79/0xe0
[<ffffffff815049a9>] ? schedule+0x419/0xa80
[<ffffffff8108b70a>] lock_acquire+0xaa/0x140
[<ffffffff81079339>] ? __blocking_notifier_call_chain+0x69/0xc0
[<ffffffff81506601>] down_read+0x51/0xa0
[<ffffffff81079339>] ? __blocking_notifier_call_chain+0x69/0xc0
[<ffffffff81079339>] __blocking_notifier_call_chain+0x69/0xc0
[<ffffffff81110f06>] ? next_online_pgdat+0x26/0x50
[<ffffffff810793a6>] blocking_notifier_call_chain+0x16/0x20
[<ffffffff813afbfb>] memory_notify+0x1b/0x20
[<ffffffff81141f1e>] remove_memory+0x56e/0x5f0
[<ffffffff8108ba98>] ? lock_release_non_nested+0x2f8/0x3a0
[<ffffffff813af53d>] memory_block_change_state+0xfd/0x1a0
[<ffffffff8111705c>] ? might_fault+0x5c/0xb0
[<ffffffff813afd62>] store_mem_state+0xe2/0xf0
[<ffffffff811bc0fd>] ? sysfs_write_file+0xcd/0x170
[<ffffffff813a0bb0>] sysdev_store+0x20/0x30
[<ffffffff811bc116>] sysfs_write_file+0xe6/0x170
[<ffffffff8114f398>] vfs_write+0xc8/0x190
[<ffffffff8114fc14>] sys_write+0x54/0x90
[<ffffffff810028b2>] system_call_fastpath+0x16/0x1b
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next reply other threads:[~2010-10-25 10:49 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-10-25 10:49 KOSAKI Motohiro [this message]
2010-10-26 7:10 ` Hugh Dickins
2010-10-26 8:07 ` KOSAKI Motohiro
2010-12-01 5:28 ` [PATCH 1/2] mem-hotplug: Introduce {un}lock_memory_hotplug() KOSAKI Motohiro
2010-12-01 19:57 ` Hugh Dickins
2010-12-01 5:29 ` [PATCH 2/2] ksm: annotate ksm_thread_mutex is no deadlock source KOSAKI Motohiro
2010-12-01 20:13 ` Hugh Dickins
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20101025193711.917F.A69D9226@jp.fujitsu.com \
--to=kosaki.motohiro@jp.fujitsu.com \
--cc=hughd@google.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox