On 14/07/2006 5:48 p.m., Andrew Morton wrote:
ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.18-rc1/2.6.18-rc1-mm2/
- Patches were merged, added, dropped and fixed. Nothing particularly exciting.
- Added the avr32 architecture. Review is sought, please.
Just spotted this in logs:
=======================================================
[ INFO: possible circular locking dependency detected ]
-------------------------------------------------------
imap/30033 is trying to acquire lock:
(iprune_mutex){--..}, at: [<ffffffff80263f71>] mutex_lock+0x19/0x20
but task is already holding lock:
(&dev->ev_mutex){--..}, at: [<ffffffff80263f71>] mutex_lock+0x19/0x20
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (&dev->ev_mutex){--..}:
[<ffffffff8029b639>] lock_acquire+0x4e/0x75
[<ffffffff80263def>] __mutex_lock_slowpath+0xd3/0x23c
[<ffffffff80263f70>] mutex_lock+0x18/0x20
[<ffffffff8021d583>] inotify_dev_queue_event+0x33/0x140
[<ffffffff802da926>] inotify_remove_watch_locked+0x34/0x3a
[<ffffffff802daa0c>] inotify_rm_wd+0x8b/0xb5
[<ffffffff802dafd8>] sys_inotify_rm_watch+0x4a/0x6b
[<ffffffff8025f3a1>] system_call+0x7d/0x83
-> #2 (&ih->mutex){--..}:
[<ffffffff8029b639>] lock_acquire+0x4e/0x75
[<ffffffff80263def>] __mutex_lock_slowpath+0xd3/0x23c
[<ffffffff80263f70>] mutex_lock+0x18/0x20
[<ffffffff802da5d8>] inotify_find_update_watch+0x49/0x9d
[<ffffffff8024d4fd>] sys_inotify_add_watch+0xd8/0x1ac
[<ffffffff8025f3a1>] system_call+0x7d/0x83
-> #1 (&inode->inotify_mutex){--..}:
[<ffffffff8029b639>] lock_acquire+0x4e/0x75
[<ffffffff80263def>] __mutex_lock_slowpath+0xd3/0x23c
[<ffffffff80263f70>] mutex_lock+0x18/0x20
[<ffffffff8025b984>] inotify_unmount_inodes+0xd4/0x1d0
[<ffffffff802ce62b>] invalidate_inodes+0x46/0x10b
[<ffffffff802c61d7>] generic_shutdown_super+0x77/0x16c
[<ffffffff802c62f1>] kill_block_super+0x25/0x3b
[<ffffffff802c63bf>] deactivate_super+0x4b/0x6c
[<ffffffff8022d040>] mntput_no_expire+0x57/0x92
[<ffffffff802325e1>] path_release_on_umount+0x1c/0x2b
[<ffffffff802d01e1>] sys_umount+0x251/0x29b
[<ffffffff8025f3a1>] system_call+0x7d/0x83
-> #0 (iprune_mutex){--..}:
[<ffffffff8029b639>] lock_acquire+0x4e/0x75
[<ffffffff80263def>] __mutex_lock_slowpath+0xd3/0x23c
[<ffffffff80263f70>] mutex_lock+0x18/0x20
[<ffffffff8022d9f1>] shrink_icache_memory+0x41/0x270
[<ffffffff80240dc3>] shrink_slab+0x11c/0x1c9
[<ffffffff802b5103>] try_to_free_pages+0x186/0x244
[<ffffffff8020efec>] __alloc_pages+0x1cc/0x2e0
[<ffffffff8025e1f7>] cache_alloc_refill+0x3f7/0x821
[<ffffffff8020a5e4>] kmem_cache_alloc+0x84/0xcb
[<ffffffff802db026>] kernel_event+0x2d/0x122
[<ffffffff8021d61b>] inotify_dev_queue_event+0xcb/0x140
[<ffffffff802da926>] inotify_remove_watch_locked+0x34/0x3a
[<ffffffff802daa0c>] inotify_rm_wd+0x8b/0xb5
[<ffffffff802dafd8>] sys_inotify_rm_watch+0x4a/0x6b
[<ffffffff8025f3a1>] system_call+0x7d/0x83
other info that might help us debug this:
4 locks held by imap/30033:
#0: (&inode->inotify_mutex){--..}, at: [<ffffffff80263f71>] mutex_lock+0x19/0x20
#1: (&ih->mutex){--..}, at: [<ffffffff80263f71>] mutex_lock+0x19/0x20
#2: (&dev->ev_mutex){--..}, at: [<ffffffff80263f71>] mutex_lock+0x19/0x20
#3: (shrinker_rwsem){----}, at: [<ffffffff80240cd9>] shrink_slab+0x32/0x1c9
stack backtrace:
Call Trace:
[<ffffffff8026963e>] show_trace+0xae/0x265
[<ffffffff8026980a>] dump_stack+0x15/0x1b
[<ffffffff8029996d>] print_circular_bug_tail+0x6d/0x80
[<ffffffff8029b2fd>] __lock_acquire+0x9cd/0xcbb
[<ffffffff8029b63a>] lock_acquire+0x4f/0x75
[<ffffffff80263df0>] __mutex_lock_slowpath+0xd4/0x23c
[<ffffffff80263f71>] mutex_lock+0x19/0x20
[<ffffffff8022d9f2>] shrink_icache_memory+0x42/0x270
[<ffffffff80240dc4>] shrink_slab+0x11d/0x1c9
[<ffffffff802b5104>] try_to_free_pages+0x187/0x244
[<ffffffff8020efed>] __alloc_pages+0x1cd/0x2e0
[<ffffffff8025e1f8>] cache_alloc_refill+0x3f8/0x821
[<ffffffff8020a5e5>] kmem_cache_alloc+0x85/0xcb
[<ffffffff802db027>] kernel_event+0x2e/0x122
[<ffffffff8021d61c>] inotify_dev_queue_event+0xcc/0x140
[<ffffffff802da927>] inotify_remove_watch_locked+0x35/0x3a
[<ffffffff802daa0d>] inotify_rm_wd+0x8c/0xb5
[<ffffffff802dafd9>] sys_inotify_rm_watch+0x4b/0x6b
[<ffffffff8025f3a2>] system_call+0x7e/0x83
[<000000350ced0247>]
Reuben
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]