lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111108105019.794045fa@redhat.com>
Date:	Tue, 8 Nov 2011 10:50:19 -0600
From:	Clark Williams <williams@...hat.com>
To:	Thomas Gleixner <tglx@...utronix.de>
Cc:	LKML <linux-kernel@...r.kernel.org>,
	linux-rt-users <linux-rt-users@...r.kernel.org>,
	Peter Zijlstra <peterz@...radead.org>
Subject: Re: [ANNOUNCE] 3.0.8-rt22

On Mon, 7 Nov 2011 22:37:57 +0100 (CET)
Thomas Gleixner <tglx@...utronix.de> wrote:

> Dear RT Folks,
> 
> I'm pleased to announce the 3.0.8-rt21 release.
> 
>

Thomas et al, 

Got the following splat on boot (f15 64-bit laptop, quad-core i7):

[  146.609030] 
[  146.609031] =======================================================
[  146.609033] [ INFO: possible circular locking dependency detected ]
[  146.609035] 3.0.8-rt22+ #27
[  146.609036] -------------------------------------------------------
[  146.609038] dconf-service/9046 is trying to acquire lock:
[  146.609040]  (&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff811adcc4>] ext4_evict_inode+0x44/0x26f
[  146.609047] 
[  146.609048] but task is already holding lock:
[  146.609049]  (&mm->mmap_sem){++++++}, at: [<ffffffff81108ee6>] sys_munmap+0x36/0x5b
[  146.609053] 
[  146.609054] which lock already depends on the new lock.
[  146.609055] 
[  146.609056] 
[  146.609056] the existing dependency chain (in reverse order) is:
[  146.609058] 
[  146.609058] -> #1 (&mm->mmap_sem){++++++}:
[  146.609061]        [<ffffffff810844f0>] check_prevs_add+0x8b/0x104
[  146.609065]        [<ffffffff810848ca>] validate_chain+0x361/0x39d
[  146.609067]        [<ffffffff81084fa5>] __lock_acquire+0x37a/0x3f3
[  146.609069]        [<ffffffff81085501>] lock_acquire+0xc4/0x108
[  146.609071]        [<ffffffff811026a7>] might_fault+0x6d/0x90
[  146.609075]        [<ffffffff8113eac7>] filldir+0x6f/0xc7
[  146.609079]        [<ffffffff811a377b>] call_filldir+0x96/0xc0
[  146.609081]        [<ffffffff811a3937>] ext4_dx_readdir+0x17d/0x1e6
[  146.609083]        [<ffffffff811a3b4d>] ext4_readdir+0x70/0x3b3
[  146.609085]        [<ffffffff8113ed1d>] vfs_readdir+0x7c/0xb5
[  146.609087]        [<ffffffff8113ee3c>] sys_getdents+0x7e/0xd1
[  146.609089]        [<ffffffff814cc2c2>] system_call_fastpath+0x16/0x1b
[  146.609094] 
[  146.609094] -> #0 (&sb->s_type->i_mutex_key#13){+.+.+.}:
[  146.609096]        [<ffffffff810842c6>] check_prev_add+0x68/0x207
[  146.609098]        [<ffffffff810844f0>] check_prevs_add+0x8b/0x104
[  146.609101]        [<ffffffff810848ca>] validate_chain+0x361/0x39d
[  146.609103]        [<ffffffff81084fa5>] __lock_acquire+0x37a/0x3f3
[  146.609105]        [<ffffffff81085501>] lock_acquire+0xc4/0x108
[  146.609108]        [<ffffffff814c5854>] _mutex_lock+0x31/0x40
[  146.609113]        [<ffffffff811adcc4>] ext4_evict_inode+0x44/0x26f
[  146.609120]        [<ffffffff811452b7>] evict+0x89/0x141
[  146.609123]        [<ffffffff81145501>] iput_final+0x14d/0x155
[  146.609126]        [<ffffffff81145543>] iput+0x3a/0x3e
[  146.609128]        [<ffffffff81140b61>] dentry_iput+0x97/0xaf
[  146.609130]        [<ffffffff81141e89>] dentry_kill+0xc7/0xde
[  146.609133]        [<ffffffff81142444>] dput+0xe3/0xf4
[  146.609135]        [<ffffffff8113157d>] __fput+0x1a9/0x1c1
[  146.609137]        [<ffffffff811315b2>] fput+0x1d/0x1f
[  146.609139]        [<ffffffff81107bb1>] remove_vma+0x3c/0x71
[  146.609141]        [<ffffffff81108d78>] do_munmap+0x267/0x280
[  146.609143]        [<ffffffff81108ef4>] sys_munmap+0x44/0x5b
[  146.609145]        [<ffffffff814cc2c2>] system_call_fastpath+0x16/0x1b
[  146.609148] 
[  146.609149] other info that might help us debug this:
[  146.609150] 
[  146.609151]  Possible unsafe locking scenario:
[  146.609151] 
[  146.609152]        CPU0                    CPU1
[  146.609153]        ----                    ----
[  146.609154]   lock(&mm->mmap_sem);
[  146.609155]                                lock(&sb->s_type->i_mutex_key);
[  146.609157]                                lock(&mm->mmap_sem);
[  146.609158]   lock(&sb->s_type->i_mutex_key);
[  146.609159] 
[  146.609160]  *** DEADLOCK ***
[  146.609160] 
[  146.609162] 1 lock held by dconf-service/9046:
[  146.609163]  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff81108ee6>] sys_munmap+0x36/0x5b
[  146.609166] 
[  146.609166] stack backtrace:
[  146.609168] Pid: 9046, comm: dconf-service Not tainted 3.0.8-rt22+ #27
[  146.609169] Call Trace:
[  146.609174]  [<ffffffff814b1fd1>] print_circular_bug+0xc8/0xd9
[  146.609176]  [<ffffffff810842c6>] check_prev_add+0x68/0x207
[  146.609179]  [<ffffffff810844f0>] check_prevs_add+0x8b/0x104
[  146.609182]  [<ffffffff810848ca>] validate_chain+0x361/0x39d
[  146.609184]  [<ffffffff81084fa5>] __lock_acquire+0x37a/0x3f3
[  146.609187]  [<ffffffff811adcc4>] ? ext4_evict_inode+0x44/0x26f
[  146.609189]  [<ffffffff81085501>] lock_acquire+0xc4/0x108
[  146.609192]  [<ffffffff811adcc4>] ? ext4_evict_inode+0x44/0x26f
[  146.609194]  [<ffffffff810852ef>] ? lock_release_nested+0x9f/0xa6
[  146.609197]  [<ffffffff814c5854>] _mutex_lock+0x31/0x40
[  146.609199]  [<ffffffff811adcc4>] ? ext4_evict_inode+0x44/0x26f
[  146.609201]  [<ffffffff814c91cd>] ? sub_preempt_count+0x4d/0x4f
[  146.609204]  [<ffffffff811adcc4>] ext4_evict_inode+0x44/0x26f
[  146.609206]  [<ffffffff811452b7>] evict+0x89/0x141
[  146.609208]  [<ffffffff81145501>] iput_final+0x14d/0x155
[  146.609210]  [<ffffffff81145543>] iput+0x3a/0x3e
[  146.609212]  [<ffffffff81140b61>] dentry_iput+0x97/0xaf
[  146.609214]  [<ffffffff81141e89>] dentry_kill+0xc7/0xde
[  146.609216]  [<ffffffff81142444>] dput+0xe3/0xf4
[  146.609218]  [<ffffffff8113157d>] __fput+0x1a9/0x1c1
[  146.609220]  [<ffffffff811315b2>] fput+0x1d/0x1f
[  146.609222]  [<ffffffff81107bb1>] remove_vma+0x3c/0x71
[  146.609224]  [<ffffffff81108d78>] do_munmap+0x267/0x280
[  146.609227]  [<ffffffff814c4f07>] ? rt_mutex_lock+0x15/0x17
[  146.609229]  [<ffffffff81108ef4>] sys_munmap+0x44/0x5b
[  146.609232]  [<ffffffff814cc2c2>] system_call_fastpath+0x16/0x1b


Config file attached.

Clark

Download attachment ".config" of type "application/octet-stream" (119565 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ