lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 28 Mar 2012 01:53:58 +0200
From:	Sasha Levin <levinsasha928@...il.com>
To:	Andrew Morton <akpm@...ux-foundation.org>
Cc:	Hugh Dickins <hughd@...gle.com>,
	Peter Zijlstra <peterz@...radead.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...e.hu>, Pekka Enberg <penberg@...nel.org>,
	Dave Jones <davej@...hat.com>, linux-mm@...ck.org,
	"linux-kernel@...r.kernel.org List" <linux-kernel@...r.kernel.org>
Subject: Re: mm: hung task (handle_pte_fault)

On Tue, Mar 27, 2012 at 1:17 AM, Andrew Morton
<akpm@...ux-foundation.org> wrote:
> The task is waiting for IO to complete against a page, and it isn't
> happening.
>
> There are quite a lot of things which could cause this, alas.  VM,
> readahead, scheduler, core wait/wakeup code, IO system, interrupt
> system (if it happens outside KVM, I guess).
>
> So....  ugh.  Hopefully someone will hit this in a situation where it
> can be narrowed down or bisected.

I've only managed to reproduce it once, and was unable to get anything
useful out of it due to technical reasons.

The good part is that I've managed to hit something similar (although
I'm not 100% sure it's the same problem as the one in the original
mail).

Here's the spew:

[ 1450.628565] BUG: sleeping function called from invalid context at
fs/proc/task_mmu.c:826
[ 1450.632828] in_atomic(): 1, irqs_disabled(): 0, pid: 17086, name: trinity
[ 1450.637242] 2 locks held by trinity/17086:
[ 1450.639308]  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff8124aee3>]
pagemap_read+0x263/0x340
[ 1450.656425]  #1:  (&(&mm->page_table_lock)->rlock){+.+.-.}, at:
[<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1450.669409] Pid: 17086, comm: trinity Not tainted
3.3.0-next-20120327-sasha #70
[ 1450.674559] Call Trace:
[ 1450.676252]  [<ffffffff810eb609>] __might_sleep+0x149/0x200
[ 1450.679876]  [<ffffffff8124b410>] ? pagemap_pte_range+0x70/0x2d0
[ 1450.681392]  [<ffffffff8124b4bf>] pagemap_pte_range+0x11f/0x2d0
[ 1450.684906]  [<ffffffff811191bf>] ? lock_release_non_nested+0x30f/0x350
[ 1450.687309]  [<ffffffff811ad5e8>] walk_pmd_range+0x118/0x200
[ 1450.689444]  [<ffffffff811ad7e8>] walk_pud_range+0x118/0x150
[ 1450.691498]  [<ffffffff811ada31>] walk_page_range+0x211/0x260
[ 1450.693574]  [<ffffffff8124aef2>] pagemap_read+0x272/0x340
[ 1450.695271]  [<ffffffff8124b3a0>] ? clear_refs_pte_range+0x190/0x190
[ 1450.700743]  [<ffffffff81249b10>] ? get_vmalloc_info+0x120/0x120
[ 1450.704875]  [<ffffffff8124b010>] ? m_stop+0x50/0x50
[ 1450.707599]  [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1450.709751]  [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1450.713269]  [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
[ 1450.715966] BUG: scheduling while atomic: trinity/17086/0x10000002
[ 1450.722426] 2 locks held by trinity/17086:
[ 1450.724283]  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff8124aee3>]
pagemap_read+0x263/0x340
[ 1450.727407]  #1:  (&(&mm->page_table_lock)->rlock){+.+.-.}, at:
[<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1450.732867] Pid: 17086, comm: trinity Not tainted
3.3.0-next-20120327-sasha #70
[ 1450.735580] Call Trace:
[ 1450.736529]  [<ffffffff810e1b9c>] __schedule_bug+0x8c/0xa0
[ 1450.738627]  [<ffffffff826ce28d>] __schedule+0x6bd/0x6d0
[ 1450.740642]  [<ffffffff810e7e83>] __cond_resched+0x13/0x20
[ 1450.742691]  [<ffffffff826ce4dc>] _cond_resched+0x2c/0x40
[ 1450.745357]  [<ffffffff8124b4c4>] pagemap_pte_range+0x124/0x2d0
[ 1450.747744]  [<ffffffff811191bf>] ? lock_release_non_nested+0x30f/0x350
[ 1450.752051]  [<ffffffff811ad5e8>] walk_pmd_range+0x118/0x200
[ 1450.755811]  [<ffffffff811ad7e8>] walk_pud_range+0x118/0x150
[ 1450.758000]  [<ffffffff811ada31>] walk_page_range+0x211/0x260
[ 1450.760054]  [<ffffffff8124aef2>] pagemap_read+0x272/0x340
[ 1450.762597]  [<ffffffff8124b3a0>] ? clear_refs_pte_range+0x190/0x190
[ 1450.765484]  [<ffffffff81249b10>] ? get_vmalloc_info+0x120/0x120
[ 1450.767166]  [<ffffffff8124b010>] ? m_stop+0x50/0x50
[ 1450.768858]  [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1450.770809]  [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1450.772074]  [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
[ 1450.791135]
[ 1450.791397] ======================================================
[ 1450.792019] [ INFO: possible circular locking dependency detected ]
[ 1450.792019] 3.3.0-next-20120327-sasha #70 Not tainted
[ 1450.792019] -------------------------------------------------------
[ 1450.792019] trinity/17086 is trying to acquire lock:
[ 1450.792019]  (&mm->mmap_sem){++++++}, at: [<ffffffff8124aee3>]
pagemap_read+0x263/0x340
[ 1450.792019]
[ 1450.792019] but task is already holding lock:
[ 1450.792019]  (&(&mm->page_table_lock)->rlock){+.+.-.}, at:
[<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1450.792019]
[ 1450.792019] which lock already depends on the new lock.
[ 1450.792019]
[ 1450.792019]
[ 1450.792019] the existing dependency chain (in reverse order) is:
[ 1450.813449]
[ 1450.813449] -> #1 (&(&mm->page_table_lock)->rlock){+.+.-.}:
[ 1450.813449]        [<ffffffff81115b9c>] validate_chain.clone.26+0x88c/0x960
[ 1450.813449]        [<ffffffff81118735>] __lock_acquire+0x3f5/0xb70
[ 1450.813449]        [<ffffffff81119553>] lock_acquire+0xc3/0x100
[ 1450.813449]        [<ffffffff826cf71b>] _raw_spin_lock+0x3b/0x70
[ 1450.813449]        [<ffffffff8119cd84>] __pmd_alloc+0x44/0x100
[ 1450.813449]        [<ffffffff811a4fce>] alloc_new_pmd.clone.3+0x13e/0x160
[ 1450.813449]        [<ffffffff811a52cd>] move_page_tables+0x12d/0x3a0
[ 1450.813449]        [<ffffffff811ea1e7>] shift_arg_pages+0xc7/0x190
[ 1450.813449]        [<ffffffff811ebb5b>] setup_arg_pages+0x1db/0x200
[ 1450.813449]        [<ffffffff8123a445>] load_elf_binary+0x455/0xe20
[ 1450.813449]        [<ffffffff811ec3f1>] search_binary_handler+0x141/0x2d0
[ 1450.813449]        [<ffffffff811ec82d>] do_execve_common.clone.32+0x2ad/0x340
[ 1450.813449]        [<ffffffff811ec8d6>] do_execve+0x16/0x20
[ 1450.813449]        [<ffffffff810579b5>] sys_execve+0x45/0x70
[ 1450.813449]        [<ffffffff826d26a8>] kernel_execve+0x68/0xd0
[ 1450.813449]        [<ffffffff81002130>] init_post+0xb0/0xd0
[ 1450.813449]        [<ffffffff83927f3b>] kernel_init+0x1d9/0x1eb
[ 1450.813449]        [<ffffffff826d2634>] kernel_thread_helper+0x4/0x10
[ 1450.813449]
[ 1450.813449] -> #0 (&mm->mmap_sem){++++++}:
[ 1450.813449]        [<ffffffff811152e1>] check_prev_add+0x6b1/0x6e0
[ 1450.813449]        [<ffffffff81115b9c>] validate_chain.clone.26+0x88c/0x960
[ 1450.813449]        [<ffffffff81118735>] __lock_acquire+0x3f5/0xb70
[ 1450.813449]        [<ffffffff81119553>] lock_acquire+0xc3/0x100
[ 1450.813449]        [<ffffffff826cd707>] down_read+0x47/0x90
[ 1450.813449]        [<ffffffff8124aee3>] pagemap_read+0x263/0x340
[ 1450.813449]        [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1450.813449]        [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1450.813449]        [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
[ 1450.813449]
[ 1450.813449] other info that might help us debug this:
[ 1450.813449]
[ 1450.813449]  Possible unsafe locking scenario:
[ 1450.813449]
[ 1450.813449]        CPU0                    CPU1
[ 1450.813449]        ----                    ----
[ 1450.813449]   lock(&(&mm->page_table_lock)->rlock);
[ 1450.813449]                                lock(&mm->mmap_sem);
[ 1450.813449]
lock(&(&mm->page_table_lock)->rlock);
[ 1450.813449]   lock(&mm->mmap_sem);
[ 1450.813449]
[ 1450.813449]  *** DEADLOCK ***
[ 1450.813449]
[ 1450.813449] 1 lock held by trinity/17086:
[ 1450.813449]  #0:  (&(&mm->page_table_lock)->rlock){+.+.-.}, at:
[<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1450.813449]
[ 1450.813449] stack backtrace:
[ 1450.813449] Pid: 17086, comm: trinity Not tainted
3.3.0-next-20120327-sasha #70
[ 1450.813449] Call Trace:
[ 1450.813449]  [<ffffffff81113fcf>] print_circular_bug+0x10f/0x120
[ 1450.813449]  [<ffffffff811152e1>] check_prev_add+0x6b1/0x6e0
[ 1450.813449]  [<ffffffff81115b9c>] validate_chain.clone.26+0x88c/0x960
[ 1450.813449]  [<ffffffff81118735>] __lock_acquire+0x3f5/0xb70
[ 1450.813449]  [<ffffffff8124b410>] ? pagemap_pte_range+0x70/0x2d0
[ 1450.813449]  [<ffffffff8124b410>] ? pagemap_pte_range+0x70/0x2d0
[ 1450.813449]  [<ffffffff811ad5e8>] ? walk_pmd_range+0x118/0x200
[ 1450.813449]  [<ffffffff81119553>] lock_acquire+0xc3/0x100
[ 1450.813449]  [<ffffffff8124aee3>] ? pagemap_read+0x263/0x340
[ 1450.813449]  [<ffffffff826cd707>] down_read+0x47/0x90
[ 1450.813449]  [<ffffffff8124aee3>] ? pagemap_read+0x263/0x340
[ 1450.813449]  [<ffffffff810dc02e>] ? up_read+0x1e/0x40
[ 1450.813449]  [<ffffffff8124aee3>] pagemap_read+0x263/0x340
[ 1450.813449]  [<ffffffff8124b3a0>] ? clear_refs_pte_range+0x190/0x190
[ 1450.813449]  [<ffffffff81249b10>] ? get_vmalloc_info+0x120/0x120
[ 1450.813449]  [<ffffffff8124b010>] ? m_stop+0x50/0x50
[ 1450.813449]  [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1450.813449]  [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1450.813449]  [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
391000 iterations.
606000 iterations.
[ 1476.139003] BUG: soft lockup - CPU#0 stuck for 22s! [trinity:17086]
[ 1476.139012] irq event stamp: 4409
[ 1476.139012] hardirqs last  enabled at (4409): [<ffffffff826cfa4b>]
_raw_spin_unlock_irq+0x2b/0x70
[ 1476.139012] hardirqs last disabled at (4408): [<ffffffff826cf834>]
_raw_spin_lock_irq+0x24/0x90
[ 1476.139012] softirqs last  enabled at (4406): [<ffffffff810b9ac3>]
__do_softirq+0x133/0x180
[ 1476.139012] softirqs last disabled at (4361): [<ffffffff826d272c>]
call_softirq+0x1c/0x30
[ 1476.139012] CPU 0
[ 1476.139012] Pid: 17086, comm: trinity Not tainted
3.3.0-next-20120327-sasha #70
[ 1476.139012] RIP: 0010:[<ffffffff81056b6c>]  [<ffffffff81056b6c>]
native_read_tsc+0xc/0x20
[ 1476.139012] RSP: 0018:ffff880006a71c00  EFLAGS: 00000286
[ 1476.139012] RAX: 0000000000000359 RBX: ffffffff826d07b4 RCX: 00000000127bc595
[ 1476.139012] RDX: 0000000000000359 RSI: ffffffff82ed0b9f RDI: 0000000000000001
[ 1476.139012] RBP: ffff880006a71c38 R08: 0000000000000000 R09: 0000000000000002
[ 1476.139012] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880006a71b78
[ 1476.139012] R13: ffff8800253a8000 R14: ffff880006a70000 R15: ffff880006a71fd8
[ 1476.139012] FS:  00007feb180a7700(0000) GS:ffff88003d600000(0000)
knlGS:0000000000000000
[ 1476.139012] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 1476.139012] CR2: 0000000000ec86b0 CR3: 0000000023814000 CR4: 00000000000406f0
[ 1476.139012] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1476.139012] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 1476.139012] Process trinity (pid: 17086, threadinfo
ffff880006a70000, task ffff8800253a8000)
[ 1476.139012] Stack:
[ 1476.139012]  ffffffff818850df 0000000000000018 ffff8800350ad060
0000000011c28537
[ 1476.139012]  00000000948b09e0 0000000000000001 ffff880035177b10
ffff880006a71c48
[ 1476.139012]  ffffffff818851ea ffff880006a71c88 ffffffff81899972
ffff880006a71c88
[ 1476.139012] Call Trace:
[ 1476.139012]  [<ffffffff818850df>] ? delay_tsc+0x3f/0x120
[ 1476.139012]  [<ffffffff818851ea>] __delay+0xa/0x10
[ 1476.139012]  [<ffffffff81899972>] do_raw_spin_lock+0xf2/0x140
[ 1476.139012]  [<ffffffff826cf73b>] _raw_spin_lock+0x5b/0x70
[ 1476.139012]  [<ffffffff8124b410>] ? pagemap_pte_range+0x70/0x2d0
[ 1476.139012]  [<ffffffff8188640e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 1476.139012]  [<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1476.139012]  [<ffffffff811ad5e8>] walk_pmd_range+0x118/0x200
[ 1476.139012]  [<ffffffff811ad7e8>] walk_pud_range+0x118/0x150
[ 1476.139012]  [<ffffffff811ada31>] walk_page_range+0x211/0x260
[ 1476.139012]  [<ffffffff8124aef2>] pagemap_read+0x272/0x340
[ 1476.139012]  [<ffffffff8124b3a0>] ? clear_refs_pte_range+0x190/0x190
[ 1476.139012]  [<ffffffff81249b10>] ? get_vmalloc_info+0x120/0x120
[ 1476.139012]  [<ffffffff8124b010>] ? m_stop+0x50/0x50
[ 1476.139012]  [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1476.139012]  [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1476.139012]  [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
[ 1476.139012] Code: 02 48 c7 43 08 00 00 00 00 48 89 03 48 83 c4 08
5b c9 c3 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 0f 31$
[ 1476.139012] Call Trace:
[ 1476.139012]  [<ffffffff818850df>] ? delay_tsc+0x3f/0x120
[ 1476.139012]  [<ffffffff818851ea>] __delay+0xa/0x10
[ 1476.139012]  [<ffffffff81899972>] do_raw_spin_lock+0xf2/0x140
[ 1476.139012]  [<ffffffff826cf73b>] _raw_spin_lock+0x5b/0x70
[ 1476.139012]  [<ffffffff8124b410>] ? pagemap_pte_range+0x70/0x2d0
[ 1476.139012]  [<ffffffff8188640e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 1476.139012]  [<ffffffff8124b410>] pagemap_pte_range+0x70/0x2d0
[ 1476.139012]  [<ffffffff811ad5e8>] walk_pmd_range+0x118/0x200
[ 1476.139012]  [<ffffffff811ad7e8>] walk_pud_range+0x118/0x150
[ 1476.139012]  [<ffffffff811ada31>] walk_page_range+0x211/0x260
[ 1476.139012]  [<ffffffff8124aef2>] pagemap_read+0x272/0x340
[ 1476.139012]  [<ffffffff8124b3a0>] ? clear_refs_pte_range+0x190/0x190
[ 1476.139012]  [<ffffffff81249b10>] ? get_vmalloc_info+0x120/0x120
[ 1476.139012]  [<ffffffff8124b010>] ? m_stop+0x50/0x50
[ 1476.139012]  [<ffffffff811e3a93>] vfs_read+0xc3/0x180
[ 1476.139012]  [<ffffffff811e3e3f>] sys_read+0x4f/0xa0
[ 1476.139012]  [<ffffffff826d107d>] system_call_fastpath+0x1a/0x1f
[ 1476.139012] Kernel panic - not syncing: softlockup: hung tasks
[ 1476.139012] Rebooting in 1 seconds..  # lkvm run -k ./bzImage -m
1024 -c 8 --name run
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ