On Wed, 8 Feb 2012, Darcy Watkins wrote: > [ 0.000000] Linux version 3.0.18-rt34 (darcy@tr-pentomino) (gcc version 4.4.6 (crosstool-NG 1.12.4) ) #41 PREEMPT RT Wed Feb 8 10:04:00 PST 2012 > [ 20.932000] ======================================================= > [ 20.932000] [ INFO: possible circular locking dependency detected ] > [ 20.932000] 3.0.18-rt34 #41 > [ 20.932000] ------------------------------------------------------- > [ 20.932000] depmod/734 is trying to acquire lock: > [ 20.932000] (&mm->mmap_sem){++++++}, at: [<800e82d0>] might_fault+0x4c/0xa4 > [ 20.932000] > [ 20.932000] but task is already holding lock: > [ 20.932000] (&f->sem){+.+.+.}, at: [<80184f88>] jffs2_readdir+0x108/0x1c0 > [ 20.932000] > [ 20.932000] which lock already depends on the new lock. > [ 20.932000] > [ 20.932000] > [ 20.932000] the existing dependency chain (in reverse order) is: > [ 20.932000] > [ 20.932000] -> #1 (&f->sem){+.+.+.}: > [ 20.932000] [<800bae14>] lock_acquire+0x60/0x88 > [ 20.932000] [<802d3a84>] _mutex_lock+0x34/0x48 > [ 20.932000] [<80185754>] jffs2_readpage+0x24/0x54 > [ 20.932000] [<800d91e8>] __do_page_cache_readahead+0x274/0x2dc > [ 20.932000] [<800d9278>] ra_submit+0x28/0x34 > [ 20.932000] [<800d1320>] filemap_fault+0x1a8/0x48c > [ 20.932000] [<800e898c>] __do_fault+0x70/0x468 > [ 20.932000] [<800e9df8>] handle_pte_fault+0x388/0xd28 > [ 20.932000] [<800eaa44>] handle_mm_fault+0xf4/0x11c > [ 20.932000] [<8006c230>] do_page_fault+0x110/0x300 > [ 20.932000] [<80062c04>] ret_from_exception+0x0/0x10 > [ 20.932000] [<801c3cb4>] __bzero+0x38/0x164 > [ 20.932000] [<8014121c>] padzero+0x58/0x84 > [ 20.932000] [<80142b18>] load_elf_binary+0x774/0x12fc > [ 20.932000] [<80102c60>] search_binary_handler+0xec/0x318 > [ 20.932000] [<801044c4>] do_execve+0x158/0x264 > [ 20.932000] [<800670a8>] sys_execve+0x44/0x6c > [ 20.932000] [<8006a3b8>] stack_done+0x20/0x40 > [ 20.932000] > [ 20.932000] -> #0 (&mm->mmap_sem){++++++}: > [ 20.932000] [<800ba1f4>] __lock_acquire+0x1228/0x1934 > [ 20.932000] [<800bae14>] lock_acquire+0x60/0x88 > [ 20.932000] [<800e82f8>] might_fault+0x74/0xa4 > [ 20.932000] [<8010dd80>] filldir64+0xe0/0x144 > [ 20.932000] [<80184fe4>] jffs2_readdir+0x164/0x1c0 > [ 20.932000] [<8010e070>] vfs_readdir+0x74/0xcc > [ 20.932000] [<8010e13c>] sys_getdents64+0x74/0xd8 > [ 20.932000] [<8006a3b8>] stack_done+0x20/0x40 > [ 20.932000] > [ 20.932000] other info that might help us debug this: > [ 20.932000] > [ 20.932000] Possible unsafe locking scenario: > [ 20.932000] > [ 20.932000] CPU0 CPU1 > [ 20.932000] ---- ---- > [ 20.932000] lock(&f->sem); > [ 20.932000] lock(&mm->mmap_sem); > [ 20.932000] lock(&f->sem); > [ 20.932000] lock(&mm->mmap_sem); > [ 20.932000] > [ 20.932000] *** DEADLOCK *** > [ 20.932000] > [ 20.932000] 2 locks held by depmod/734: > [ 20.932000] #0: (&sb->s_type->i_mutex_key#3){+.+.+.}, at: [<8010e044>] vfs_readdir+0x48/0xcc > [ 20.932000] #1: (&f->sem){+.+.+.}, at: [<80184f88>] jffs2_readdir+0x108/0x1c0 > [ 20.932000] > [ 20.932000] stack backtrace: > [ 20.932000] Call Trace: > [ 20.932000] [<802d103c>] dump_stack+0x8/0x34 > [ 20.932000] [<800b8960>] print_circular_bug+0x2bc/0x2e8 > [ 20.932000] [<800ba1f4>] __lock_acquire+0x1228/0x1934 > [ 20.932000] [<800bae14>] lock_acquire+0x60/0x88 > [ 20.932000] [<800e82f8>] might_fault+0x74/0xa4 > [ 20.932000] [<8010dd80>] filldir64+0xe0/0x144 > [ 20.932000] [<80184fe4>] jffs2_readdir+0x164/0x1c0 > [ 20.932000] [<8010e070>] vfs_readdir+0x74/0xcc > [ 20.932000] [<8010e13c>] sys_getdents64+0x74/0xd8 > [ 20.932000] [<8006a3b8>] stack_done+0x20/0x40 Classic ABBA deadlock. I don't think it's RT specific, but I might be wrong as usual. Will have a look later this week, when noone beats me. Thanks, tglx -- To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html