| Summary: | possible circular locking dependency detected | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Shawn <jvillain> |
| Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> |
| Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | aquini, gansalmon, itamar, jbacik, jonathan, jwboyer, kernel-maint, madhu.chinakonda |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-08-25 11:36:18 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Have you seen this happen on a 3.0 final kernel, or in 3.1-rc1/2? The last I have seen of them was 3.1.0-0.rc0.git21.1.fc17.x86_64. I had oodles of them with that one. Since then it has been clean. I have included an example of that one in case it has any value.
Thanks for all the hard work guys.
Aug 7 22:24:22 pete kernel: [ 1502.979124]
Aug 7 22:24:22 pete kernel: [ 1502.979128] =======================================================
Aug 7 22:24:22 pete kernel: [ 1502.979136] [ INFO: possible circular locking dependency detected ]
Aug 7 22:24:22 pete kernel: [ 1502.979142] 3.1.0-0.rc0.git21.1.fc17.x86_64 #1
Aug 7 22:24:22 pete kernel: [ 1502.979147] -------------------------------------------------------
Aug 7 22:24:22 pete kernel: [ 1502.979153] kworker/0:1/2110 is trying to acquire lock:
Aug 7 22:24:22 pete kernel: [ 1502.979158] (s_active#14){++++.+}, at: [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979179]
Aug 7 22:24:22 pete kernel: [ 1502.979181] but task is already holding lock:
Aug 7 22:24:22 pete kernel: [ 1502.979186] (&battery->lock){+.+.+.}, at: [<ffffffff812c8dfb>] sysfs_remove_battery+0x15/0x50
Aug 7 22:24:22 pete kernel: [ 1502.979202]
Aug 7 22:24:22 pete kernel: [ 1502.979203] which lock already depends on the new lock.
Aug 7 22:24:22 pete kernel: [ 1502.979206]
Aug 7 22:24:22 pete kernel: [ 1502.979210]
Aug 7 22:24:22 pete kernel: [ 1502.979211] the existing dependency chain (in reverse order) is:
Aug 7 22:24:22 pete kernel: [ 1502.979217]
Aug 7 22:24:22 pete kernel: [ 1502.979218] -> #1 (&battery->lock){+.+.+.}:
Aug 7 22:24:22 pete kernel: [ 1502.979229] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e
Aug 7 22:24:22 pete kernel: [ 1502.979239] [<ffffffff814f262b>] __mutex_lock_common+0x5d/0x39a
Aug 7 22:24:22 pete kernel: [ 1502.979250] [<ffffffff814f2a77>] mutex_lock_nested+0x40/0x45
Aug 7 22:24:22 pete kernel: [ 1502.979259] [<ffffffff812c9033>] acpi_battery_get_state+0x6f/0x174
Aug 7 22:24:22 pete kernel: [ 1502.979268] [<ffffffff812c916a>] acpi_battery_get_property+0x32/0x1d4
Aug 7 22:24:22 pete kernel: [ 1502.979278] [<ffffffff813aa1f3>] power_supply_show_property+0x5e/0x175
Aug 7 22:24:22 pete kernel: [ 1502.979288] [<ffffffff813aa447>] power_supply_uevent+0x105/0x21e
Aug 7 22:24:22 pete kernel: [ 1502.979296] [<ffffffff81312d00>] dev_uevent+0x16c/0x20c
Aug 7 22:24:22 pete kernel: [ 1502.979307] [<ffffffff81249f5c>] kobject_uevent_env+0x260/0x523
Aug 7 22:24:22 pete kernel: [ 1502.979317] [<ffffffff8124a22a>] kobject_uevent+0xb/0xd
Aug 7 22:24:22 pete kernel: [ 1502.979326] [<ffffffff81311c9e>] store_uevent+0x35/0x52
Aug 7 22:24:22 pete kernel: [ 1502.979335] [<ffffffff81310fdc>] dev_attr_store+0x20/0x22
Aug 7 22:24:22 pete kernel: [ 1502.979344] [<ffffffff811a0561>] sysfs_write_file+0x108/0x144
Aug 7 22:24:22 pete kernel: [ 1502.979353] [<ffffffff8114258a>] vfs_write+0xaf/0xf6
Aug 7 22:24:22 pete kernel: [ 1502.979362] [<ffffffff81142785>] sys_write+0x4d/0x74
Aug 7 22:24:22 pete kernel: [ 1502.979371] [<ffffffff814fb0c2>] system_call_fastpath+0x16/0x1b
Aug 7 22:24:22 pete kernel: [ 1502.979381] Aug 7 22:24:22 pete kernel: [ 1502.979383] -> #0 (s_active#14){++++.+}:
Aug 7 22:24:22 pete kernel: [ 1502.979394] [<ffffffff8108ec02>] __lock_acquire+0xa1a/0xcf7
Aug 7 22:24:22 pete kernel: [ 1502.979403] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e
Aug 7 22:24:22 pete kernel: [ 1502.979412] [<ffffffff811a0ff0>] sysfs_deactivate+0xa6/0x10f
Aug 7 22:24:22 pete kernel: [ 1502.979421] [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979430] [<ffffffff811a00ea>] sysfs_hash_and_remove+0x59/0x7b
Aug 7 22:24:22 pete kernel: [ 1502.979439] [<ffffffff811a0a2f>] sysfs_remove_file+0x17/0x19
Aug 7 22:24:22 pete kernel: [ 1502.979447] [<ffffffff81311731>] device_remove_file+0x17/0x19
Aug 7 22:24:22 pete kernel: [ 1502.979456] [<ffffffff813118fa>] device_del+0x126/0x184
Aug 7 22:24:22 pete kernel: [ 1502.979465] [<ffffffff813119a1>] device_unregister+0x49/0x56
Aug 7 22:24:22 pete kernel: [ 1502.979474] [<ffffffff813a9c7f>] power_supply_unregister+0x28/0x2c
Aug 7 22:24:22 pete kernel: [ 1502.979484] [<ffffffff812c8e1f>] sysfs_remove_battery+0x39/0x50
Aug 7 22:24:22 pete kernel: [ 1502.979493] [<ffffffff812c9e5e>] acpi_battery_notify+0x4a/0xb1
Aug 7 22:24:22 pete kernel: [ 1502.979503] [<ffffffff81298423>] acpi_device_notify+0x19/0x1b
Aug 7 22:24:22 pete kernel: [ 1502.979513] [<ffffffff812a6923>] acpi_ev_notify_dispatch+0x67/0x7e
Aug 7 22:24:22 pete kernel: [ 1502.979524] [<ffffffff8129485d>] acpi_os_execute_deferred+0x27/0x34
Aug 7 22:24:22 pete kernel: [ 1502.979533] [<ffffffff810759d1>] process_one_work+0x205/0x3e7
Aug 7 22:24:22 pete kernel: [ 1502.979543] [<ffffffff8107667f>] worker_thread+0xda/0x15d
Aug 7 22:24:22 pete kernel: [ 1502.979551] [<ffffffff8107a045>] kthread+0xa8/0xb0
Aug 7 22:24:22 pete kernel: [ 1502.979561] [<ffffffff814fd2e4>] kernel_thread_helper+0x4/0x10
Aug 7 22:24:22 pete kernel: [ 1502.979571]
Aug 7 22:24:22 pete kernel: [ 1502.979572] other info that might help us debug this:
Aug 7 22:24:22 pete kernel: [ 1502.979575]
Aug 7 22:24:22 pete kernel: [ 1502.979579] Possible unsafe locking scenario:
Aug 7 22:24:22 pete kernel: [ 1502.979572] other info that might help us debug this:
Aug 7 22:24:22 pete kernel: [ 1502.979575]
Aug 7 22:24:22 pete kernel: [ 1502.979579] Possible unsafe locking scenario:
Aug 7 22:24:22 pete kernel: [ 1502.979581]
Aug 7 22:24:22 pete kernel: [ 1502.979585] CPU0 CPU1
Aug 7 22:24:22 pete kernel: [ 1502.979589] ---- ----
Aug 7 22:24:22 pete kernel: [ 1502.979593] lock(&battery->lock);
Aug 7 22:24:22 pete kernel: [ 1502.979601] lock(s_active);
Aug 7 22:24:22 pete kernel: [ 1502.979609] lock(&battery->lock);
Aug 7 22:24:22 pete kernel: [ 1502.979617] lock(s_active);
Aug 7 22:24:22 pete kernel: [ 1502.979624]
Aug 7 22:24:22 pete kernel: [ 1502.979626] *** DEADLOCK ***
Aug 7 22:24:22 pete kernel: [ 1502.979627]
Aug 7 22:24:22 pete kernel: [ 1502.979633] 3 locks held by kworker/0:1/2110:
Aug 7 22:24:22 pete kernel: [ 1502.979637] #0: (kacpi_notify){.+.+.+}, at: [<ffffffff81075919>] process_one_work+0x14d/0x3e7
Aug 7 22:24:22 pete kernel: [ 1502.979652] #1: ((&dpc->work)){+.+.+.}, at: [<ffffffff81075919>] process_one_work+0x14d/0x3e7
Aug 7 22:24:22 pete kernel: [ 1502.979667] #2: (&battery->lock){+.+.+.}, at: [<ffffffff812c8dfb>] sysfs_remove_battery+0x15/0x50
Aug 7 22:24:22 pete kernel: [ 1502.979683]
Aug 7 22:24:22 pete kernel: [ 1502.979684] stack backtrace:
Aug 7 22:24:22 pete kernel: [ 1502.979691] Pid: 2110, comm: kworker/0:1 Not tainted 3.1.0-0.rc0.git21.1.fc17.x86_64 #1
Aug 7 22:24:22 pete kernel: [ 1502.979697] Call Trace:
Aug 7 22:24:22 pete kernel: [ 1502.979707] [<ffffffff814e9cfa>] print_circular_bug+0x1f8/0x209
Aug 7 22:24:22 pete kernel: [ 1502.979716] [<ffffffff8108ec02>] __lock_acquire+0xa1a/0xcf7
Aug 7 22:24:22 pete kernel: [ 1502.979726] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979735] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e
Aug 7 22:24:22 pete kernel: [ 1502.979744] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979753] [<ffffffff81294836>] ? acpi_os_wait_events_complete+0x23/0x23
Aug 7 22:24:22 pete kernel: [ 1502.979762] [<ffffffff811a0ff0>] sysfs_deactivate+0xa6/0x10f
Aug 7 22:24:22 pete kernel: [ 1502.979770] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979780] [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55
Aug 7 22:24:22 pete kernel: [ 1502.979789] [<ffffffff811a00ea>] sysfs_hash_and_remove+0x59/0x7b
Aug 7 22:24:22 pete kernel: [ 1502.979798] [<ffffffff811a0a2f>] sysfs_remove_file+0x17/0x19
Aug 7 22:24:22 pete kernel: [ 1502.979806] [<ffffffff81311731>] device_remove_file+0x17/0x19
Aug 7 22:24:22 pete kernel: [ 1502.979814] [<ffffffff813118fa>] device_del+0x126/0x184
Aug 7 22:24:22 pete kernel: [ 1502.979822] [<ffffffff813119a1>] device_unregister+0x49/0x56
Aug 7 22:24:22 pete kernel: [ 1502.979832] [<ffffffff813a9c7f>] power_supply_unregister+0x28/0x2c
Aug 7 22:24:22 pete kernel: [ 1502.979841] [<ffffffff812c8e1f>] sysfs_remove_battery+0x39/0x50
Aug 7 22:24:22 pete kernel: [ 1502.979850] [<ffffffff812c9e5e>] acpi_battery_notify+0x4a/0xb1
Aug 7 22:24:22 pete kernel: [ 1502.979859] [<ffffffff81298423>] acpi_device_notify+0x19/0x1b
Aug 7 22:24:22 pete kernel: [ 1502.979868] [<ffffffff812a6923>] acpi_ev_notify_dispatch+0x67/0x7e
Aug 7 22:24:22 pete kernel: [ 1502.979877] [<ffffffff8129485d>] acpi_os_execute_deferred+0x27/0x34
Aug 7 22:24:22 pete kernel: [ 1502.979885] [<ffffffff810759d1>] process_one_work+0x205/0x3e7
Aug 7 22:24:22 pete kernel: [ 1502.979893] [<ffffffff81075919>] ? process_one_work+0x14d/0x3e7
Aug 7 22:24:22 pete kernel: [ 1502.979901] [<ffffffff8108d2cf>] ? lock_acquired+0x210/0x243
Aug 7 22:24:22 pete kernel: [ 1502.979910] [<ffffffff8107667f>] worker_thread+0xda/0x15d
Aug 7 22:24:22 pete kernel: [ 1502.979919] [<ffffffff810765a5>] ? manage_workers+0x176/0x176
Aug 7 22:24:22 pete kernel: [ 1502.979927] [<ffffffff8107a045>] kthread+0xa8/0xb0
Aug 7 22:24:22 pete kernel: [ 1502.979937] [<ffffffff814fd2e4>] kernel_thread_helper+0x4/0x10
Aug 7 22:24:22 pete kernel: [ 1502.979946] [<ffffffff814f4734>] ? retint_restore_args+0x13/0x13
Aug 7 22:24:22 pete kernel: [ 1502.979956] [<ffffffff81079f9d>] ? __init_kthread_worker+0x5a/0x5a
Aug 7 22:24:22 pete kernel: [ 1502.979965] [<ffffffff814fd2e0>] ? gs_change+0x13/0x13
That one is unrelated to the original report. The battery one got fixed with commit 69d94ec6d83d84044252d9ba03f6a8970816e350. I'll close this out for now. If you see another lockdep report about btrfs, please reopen or file a new bug. |
Description of problem:[ 2377.283470] ======================================================= [ 2377.283476] [ INFO: possible circular locking dependency detected ] [ 2377.283481] 3.0-0.rc3.git5.1.fc16.x86_64 #1 [ 2377.283484] ------------------------------------------------------- [ 2377.283488] okular/2613 is trying to acquire lock: [ 2377.283492] (btrfs-extent-01){+.+...}, at: [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283529] [ 2377.283530] but task is already holding lock: [ 2377.283534] (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa019f4f0>] btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.283566] [ 2377.283567] which lock already depends on the new lock. [ 2377.283568] [ 2377.283571] [ 2377.283572] the existing dependency chain (in reverse order) is: [ 2377.283576] [ 2377.283577] -> #1 (&(&eb->lock)->rlock){+.+...}: [ 2377.283584] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.283593] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.283601] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283630] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.283651] [<ffffffffa016dac5>] btrfs_lookup_csum+0x68/0x10a [btrfs] [ 2377.283674] [<ffffffffa016dce4>] __btrfs_lookup_bio_sums+0x17d/0x2e2 [btrfs] [ 2377.283697] [<ffffffffa016de99>] btrfs_lookup_bio_sums+0x16/0x18 [btrfs] [ 2377.283721] [<ffffffffa01787c7>] btrfs_submit_bio_hook+0x9b/0x111 [btrfs] [ 2377.283748] [<ffffffffa01900f7>] submit_one_bio+0x92/0xca [btrfs] [ 2377.283776] [<ffffffffa0193712>] extent_readpages+0xbf/0xd0 [btrfs] [ 2377.283804] [<ffffffffa01796ff>] btrfs_readpages+0x1f/0x21 [btrfs] [ 2377.283831] [<ffffffff810f34a3>] __do_page_cache_readahead+0x158/0x1de [ 2377.283839] [<ffffffff810f3792>] ra_submit+0x21/0x25 [ 2377.283845] [<ffffffff810f3984>] ondemand_readahead+0x1ee/0x1fd [ 2377.283851] [<ffffffff810f3a55>] page_cache_sync_readahead+0x40/0x43 [ 2377.283858] [<ffffffff810eb693>] generic_file_aio_read+0x2b9/0x65b [ 2377.283865] [<ffffffff8113794a>] do_sync_read+0xbf/0xff [ 2377.283871] [<ffffffff8113800e>] vfs_read+0xac/0xf3 [ 2377.283877] [<ffffffff811380a2>] sys_read+0x4d/0x74 [ 2377.283882] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b [ 2377.283889] [ 2377.283890] -> #0 (btrfs-extent-01){+.+...}: [ 2377.283897] [<ffffffff81088b18>] __lock_acquire+0xa1a/0xcf7 [ 2377.283903] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.283909] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.283916] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283944] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.283964] [<ffffffffa01777bd>] btrfs_real_readdir+0x1d4/0x522 [btrfs] [ 2377.283991] [<ffffffff81146d69>] vfs_readdir+0x78/0xb1 [ 2377.283997] [<ffffffff81146e88>] sys_getdents+0x7e/0xd1 [ 2377.284003] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b [ 2377.284010] [ 2377.284011] other info that might help us debug this: [ 2377.284012] [ 2377.284015] Possible unsafe locking scenario: [ 2377.284017] [ 2377.284019] CPU0 CPU1 [ 2377.284022] ---- ---- [ 2377.284022] lock(&(&eb->lock)->rlock); [ 2377.284022] lock(btrfs-extent-01); [ 2377.284022] lock(&(&eb->lock)->rlock); [ 2377.284022] lock(btrfs-extent-01); [ 2377.284022] [ 2377.284022] *** DEADLOCK *** [ 2377.284022] [ 2377.284022] 2 locks held by okular/2613: [ 2377.284022] #0: (&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff81146d49>] vfs_readdir+0x58/0xb1 [ 2377.284022] #1: (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa019f4f0>] btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.284022] [ 2377.284022] stack backtrace: [ 2377.284022] Pid: 2613, comm: okular Not tainted 3.0-0.rc3.git5.1.fc16.x86_64 #1 [ 2377.284022] Call Trace: [ 2377.284022] [<ffffffff814eadb9>] print_circular_bug+0x1f8/0x209 [ 2377.284022] [<ffffffff81088b18>] __lock_acquire+0xa1a/0xcf7 [ 2377.284022] [<ffffffff8100e9ad>] ? paravirt_read_tsc+0x9/0xd [ 2377.284022] [<ffffffff8100ee82>] ? sched_clock+0x9/0xd [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffffa019f4f0>] ? btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.284022] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.284022] [<ffffffffa01777bd>] btrfs_real_readdir+0x1d4/0x522 [btrfs] [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146d49>] ? vfs_readdir+0x58/0xb1 [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146d69>] vfs_readdir+0x78/0xb1 [ 2377.284022] [<ffffffff81146e88>] sys_getdents+0x7e/0xd1 [ 2377.284022] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b Version-Release number of selected component (if applicable): kernel-3.0-0.rc3.git5.1.fc16.x86_64 kdegraphics-4.6.3-1.fc16.x86_64 How reproducible: Steps to Reproduce: 1. Not sure happens in the background 2. 3. Actual results: Expected results: Additional info: