From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753974Ab2GBDjU (ORCPT ); Sun, 1 Jul 2012 23:39:20 -0400 Received: from mga11.intel.com ([192.55.52.93]:18398 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751032Ab2GBDjS (ORCPT ); Sun, 1 Jul 2012 23:39:18 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.71,315,1320652800"; d="scan'208";a="187320563" Date: Mon, 2 Jul 2012 11:39:14 +0800 From: Fengguang Wu To: Christoph Lameter Cc: Trond Myklebust , "J. Bruce Fields" , linux-nfs@vger.kernel.org, LKML , netdev , Pekka Enberg , Linux Memory Management List , Stephen Rothwell Subject: Re: linux-next BUG: held lock freed! Message-ID: <20120702033914.GA7433@localhost> References: <20120626145432.GA15289@localhost> <20120626172918.GA16446@localhost> <20120627122306.GA19252@localhost> <20120702025625.GA6531@localhost> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20120702025625.GA6531@localhost> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 02, 2012 at 10:56:25AM +0800, Fengguang Wu wrote: > Hi all, > > More observations on this bug: > > The slab tree itself actually boots fine. So Christoph's commit may be > merely disclosing some bug hidden in another for-next tree which > happens to be merged before the slab tree.. Sorry: the bug does appear in the standalone slab tree, where the dmesg is [ 307.648802] blkid (2963) used greatest stack depth: 2832 bytes left [ 307.892070] vhci_hcd: changed 0 [ 308.766647] [ 308.766648] ========================= [ 308.766649] [ BUG: held lock freed! ] [ 308.766651] 3.5.0-rc1+ #44 Not tainted [ 308.766651] ------------------------- [ 308.766653] mtd_probe/3040 is freeing memory ffff880006defdd0-ffff880006df0dcf, with a lock still held there! [ 308.766662] (&type->s_umount_key#31/1){+.+.+.}, at: [] sget+0x299/0x463 [ 308.766663] 3 locks held by mtd_probe/3040: [ 308.766667] #0: (&type->s_umount_key#31/1){+.+.+.}, at: [] sget+0x299/0x463 [ 308.766671] #1: (sb_lock){+.+.-.}, at: [] sget+0x33/0x463 [ 308.766675] #2: (unnamed_dev_lock){+.+...}, at: [] get_anon_bdev+0x38/0xe8 [ 308.766675] [ 308.766675] stack backtrace: [ 308.766677] Pid: 3040, comm: mtd_probe Not tainted 3.5.0-rc1+ #44 [ 308.766678] Call Trace: [ 308.766683] [] debug_check_no_locks_freed+0x109/0x14b [ 308.766703] [] kmem_cache_free+0x2e/0xa7 [ 308.766708] [] ida_get_new_above+0x173/0x184 [ 308.766711] [] ? lock_acquired+0x1e4/0x219 [ 308.766713] [] get_anon_bdev+0x4e/0xe8 [ 308.766715] [] set_anon_super+0x17/0x2a [ 308.766717] [] sget+0x3a3/0x463 [ 308.766719] [] ? get_anon_bdev+0xe8/0xe8 [ 308.766722] [] mount_pseudo+0x31/0x152 [ 308.766727] [] mtd_inodefs_mount+0x24/0x26 [ 308.766729] [] mount_fs+0x69/0x155 [ 308.766733] [] ? __alloc_percpu+0x10/0x12 [ 308.766736] [] vfs_kern_mount+0x62/0xd9 [ 308.766739] [] simple_pin_fs+0x4c/0x9b [ 308.766741] [] mtdchar_open+0x42/0x188 [ 308.766744] [] chrdev_open+0x11f/0x14a [ 308.766747] [] ? local_clock+0x19/0x52 [ 308.766750] [] ? cdev_put+0x26/0x26 [ 308.766752] [] do_dentry_open+0x1e4/0x2b2 [ 308.766754] [] nameidata_to_filp+0x5e/0xa3 [ 308.766756] [] do_last+0x68f/0x6d3 [ 308.766759] [] path_openat+0xd2/0x32a [ 308.766762] [] ? time_hardirqs_off+0x26/0x2a [ 308.766765] [] ? trace_hardirqs_off+0xd/0xf [ 308.766767] [] do_filp_open+0x38/0x86 [ 308.766771] [] ? _raw_spin_unlock+0x28/0x3b [ 308.766773] [] ? alloc_fd+0xe5/0xf7 [ 308.766776] [] do_sys_open+0x6e/0xfb [ 308.766777] [] sys_open+0x21/0x23 [ 308.766780] [] system_call_fastpath+0x16/0x1b Thanks, Fengguang From mboxrd@z Thu Jan 1 00:00:00 1970 From: Fengguang Wu Subject: Re: linux-next BUG: held lock freed! Date: Mon, 2 Jul 2012 11:39:14 +0800 Message-ID: <20120702033914.GA7433@localhost> References: <20120626145432.GA15289@localhost> <20120626172918.GA16446@localhost> <20120627122306.GA19252@localhost> <20120702025625.GA6531@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Trond Myklebust , "J. Bruce Fields" , linux-nfs@vger.kernel.org, LKML , netdev , Pekka Enberg , Linux Memory Management List , Stephen Rothwell To: Christoph Lameter Return-path: Content-Disposition: inline In-Reply-To: <20120702025625.GA6531@localhost> Sender: owner-linux-mm@kvack.org List-Id: netdev.vger.kernel.org On Mon, Jul 02, 2012 at 10:56:25AM +0800, Fengguang Wu wrote: > Hi all, > > More observations on this bug: > > The slab tree itself actually boots fine. So Christoph's commit may be > merely disclosing some bug hidden in another for-next tree which > happens to be merged before the slab tree.. Sorry: the bug does appear in the standalone slab tree, where the dmesg is [ 307.648802] blkid (2963) used greatest stack depth: 2832 bytes left [ 307.892070] vhci_hcd: changed 0 [ 308.766647] [ 308.766648] ========================= [ 308.766649] [ BUG: held lock freed! ] [ 308.766651] 3.5.0-rc1+ #44 Not tainted [ 308.766651] ------------------------- [ 308.766653] mtd_probe/3040 is freeing memory ffff880006defdd0-ffff880006df0dcf, with a lock still held there! [ 308.766662] (&type->s_umount_key#31/1){+.+.+.}, at: [] sget+0x299/0x463 [ 308.766663] 3 locks held by mtd_probe/3040: [ 308.766667] #0: (&type->s_umount_key#31/1){+.+.+.}, at: [] sget+0x299/0x463 [ 308.766671] #1: (sb_lock){+.+.-.}, at: [] sget+0x33/0x463 [ 308.766675] #2: (unnamed_dev_lock){+.+...}, at: [] get_anon_bdev+0x38/0xe8 [ 308.766675] [ 308.766675] stack backtrace: [ 308.766677] Pid: 3040, comm: mtd_probe Not tainted 3.5.0-rc1+ #44 [ 308.766678] Call Trace: [ 308.766683] [] debug_check_no_locks_freed+0x109/0x14b [ 308.766703] [] kmem_cache_free+0x2e/0xa7 [ 308.766708] [] ida_get_new_above+0x173/0x184 [ 308.766711] [] ? lock_acquired+0x1e4/0x219 [ 308.766713] [] get_anon_bdev+0x4e/0xe8 [ 308.766715] [] set_anon_super+0x17/0x2a [ 308.766717] [] sget+0x3a3/0x463 [ 308.766719] [] ? get_anon_bdev+0xe8/0xe8 [ 308.766722] [] mount_pseudo+0x31/0x152 [ 308.766727] [] mtd_inodefs_mount+0x24/0x26 [ 308.766729] [] mount_fs+0x69/0x155 [ 308.766733] [] ? __alloc_percpu+0x10/0x12 [ 308.766736] [] vfs_kern_mount+0x62/0xd9 [ 308.766739] [] simple_pin_fs+0x4c/0x9b [ 308.766741] [] mtdchar_open+0x42/0x188 [ 308.766744] [] chrdev_open+0x11f/0x14a [ 308.766747] [] ? local_clock+0x19/0x52 [ 308.766750] [] ? cdev_put+0x26/0x26 [ 308.766752] [] do_dentry_open+0x1e4/0x2b2 [ 308.766754] [] nameidata_to_filp+0x5e/0xa3 [ 308.766756] [] do_last+0x68f/0x6d3 [ 308.766759] [] path_openat+0xd2/0x32a [ 308.766762] [] ? time_hardirqs_off+0x26/0x2a [ 308.766765] [] ? trace_hardirqs_off+0xd/0xf [ 308.766767] [] do_filp_open+0x38/0x86 [ 308.766771] [] ? _raw_spin_unlock+0x28/0x3b [ 308.766773] [] ? alloc_fd+0xe5/0xf7 [ 308.766776] [] do_sys_open+0x6e/0xfb [ 308.766777] [] sys_open+0x21/0x23 [ 308.766780] [] system_call_fastpath+0x16/0x1b Thanks, Fengguang -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org