AM> hm, yes, it does look that way.
 AM> It could be that any task which travels that path ends up running
 AM> under lock_kernel() for the rest of its existence, and nobody
 AM> noticed.
Probably, this patch may help us. It checks current->lock_depth after
each syscall and prints warning.
diff -uNr linux/arch/i386/kernel/entry.S edited/arch/i386/kernel/entry.S
--- linux/arch/i386/kernel/entry.S	Thu Mar  6 14:57:38 2003
+++ edited/arch/i386/kernel/entry.S	Thu Mar  6 16:40:27 2003
@@ -282,6 +282,17 @@
 syscall_call:
 	call *sys_call_table(,%eax,4)
 	movl %eax,EAX(%esp)		# store the return value
+
+	movl TI_TASK(%ebp), %edx	# check current->lock_depth
+	movl 20(%edx), %ecx 
+	cmpl $0, %ecx
+	je   syscall_exit   
+	cmpl $-1, %ecx
+	je   syscall_exit
+
+	GET_THREAD_INFO(%ebp) 
+	call warn_invalid_lock_depth
+
 syscall_exit:
 	cli				# make sure we don't miss an interrupt
 					# setting need_resched or sigpending
diff -uNr linux/arch/i386/kernel/l edited/arch/i386/kernel/l
--- linux/arch/i386/kernel/l	Thu Jan  1 03:00:00 1970
+++ edited/arch/i386/kernel/l	Thu Mar  6 13:44:03 2003
@@ -0,0 +1 @@
+make: *** No rule to make target `bzImage'.  Stop.
diff -uNr linux/arch/i386/kernel/process.c edited/arch/i386/kernel/process.c
--- linux/arch/i386/kernel/process.c	Thu Mar  6 14:57:25 2003
+++ edited/arch/i386/kernel/process.c	Thu Mar  6 16:32:17 2003
@@ -714,3 +714,14 @@
 	return 0;
 }
 
+asmlinkage void warn_invalid_lock_depth(void)
+{
+	struct task_struct * tsk = current;
+		        
+	if (!(tsk->flags & 0x10000000)) {
+		printk("WARNING: non-zero(%d) lock_depth, pid %u\n",
+			tsk->lock_depth, tsk->pid);
+		tsk->flags |= 0x10000000;
+	}
+}
+
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/