Hide Forgot
Description of problem:[ 2377.283470] ======================================================= [ 2377.283476] [ INFO: possible circular locking dependency detected ] [ 2377.283481] 3.0-0.rc3.git5.1.fc16.x86_64 #1 [ 2377.283484] ------------------------------------------------------- [ 2377.283488] okular/2613 is trying to acquire lock: [ 2377.283492] (btrfs-extent-01){+.+...}, at: [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283529] [ 2377.283530] but task is already holding lock: [ 2377.283534] (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa019f4f0>] btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.283566] [ 2377.283567] which lock already depends on the new lock. [ 2377.283568] [ 2377.283571] [ 2377.283572] the existing dependency chain (in reverse order) is: [ 2377.283576] [ 2377.283577] -> #1 (&(&eb->lock)->rlock){+.+...}: [ 2377.283584] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.283593] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.283601] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283630] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.283651] [<ffffffffa016dac5>] btrfs_lookup_csum+0x68/0x10a [btrfs] [ 2377.283674] [<ffffffffa016dce4>] __btrfs_lookup_bio_sums+0x17d/0x2e2 [btrfs] [ 2377.283697] [<ffffffffa016de99>] btrfs_lookup_bio_sums+0x16/0x18 [btrfs] [ 2377.283721] [<ffffffffa01787c7>] btrfs_submit_bio_hook+0x9b/0x111 [btrfs] [ 2377.283748] [<ffffffffa01900f7>] submit_one_bio+0x92/0xca [btrfs] [ 2377.283776] [<ffffffffa0193712>] extent_readpages+0xbf/0xd0 [btrfs] [ 2377.283804] [<ffffffffa01796ff>] btrfs_readpages+0x1f/0x21 [btrfs] [ 2377.283831] [<ffffffff810f34a3>] __do_page_cache_readahead+0x158/0x1de [ 2377.283839] [<ffffffff810f3792>] ra_submit+0x21/0x25 [ 2377.283845] [<ffffffff810f3984>] ondemand_readahead+0x1ee/0x1fd [ 2377.283851] [<ffffffff810f3a55>] page_cache_sync_readahead+0x40/0x43 [ 2377.283858] [<ffffffff810eb693>] generic_file_aio_read+0x2b9/0x65b [ 2377.283865] [<ffffffff8113794a>] do_sync_read+0xbf/0xff [ 2377.283871] [<ffffffff8113800e>] vfs_read+0xac/0xf3 [ 2377.283877] [<ffffffff811380a2>] sys_read+0x4d/0x74 [ 2377.283882] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b [ 2377.283889] [ 2377.283890] -> #0 (btrfs-extent-01){+.+...}: [ 2377.283897] [<ffffffff81088b18>] __lock_acquire+0xa1a/0xcf7 [ 2377.283903] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.283909] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.283916] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.283944] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.283964] [<ffffffffa01777bd>] btrfs_real_readdir+0x1d4/0x522 [btrfs] [ 2377.283991] [<ffffffff81146d69>] vfs_readdir+0x78/0xb1 [ 2377.283997] [<ffffffff81146e88>] sys_getdents+0x7e/0xd1 [ 2377.284003] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b [ 2377.284010] [ 2377.284011] other info that might help us debug this: [ 2377.284012] [ 2377.284015] Possible unsafe locking scenario: [ 2377.284017] [ 2377.284019] CPU0 CPU1 [ 2377.284022] ---- ---- [ 2377.284022] lock(&(&eb->lock)->rlock); [ 2377.284022] lock(btrfs-extent-01); [ 2377.284022] lock(&(&eb->lock)->rlock); [ 2377.284022] lock(btrfs-extent-01); [ 2377.284022] [ 2377.284022] *** DEADLOCK *** [ 2377.284022] [ 2377.284022] 2 locks held by okular/2613: [ 2377.284022] #0: (&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff81146d49>] vfs_readdir+0x58/0xb1 [ 2377.284022] #1: (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa019f4f0>] btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.284022] [ 2377.284022] stack backtrace: [ 2377.284022] Pid: 2613, comm: okular Not tainted 3.0-0.rc3.git5.1.fc16.x86_64 #1 [ 2377.284022] Call Trace: [ 2377.284022] [<ffffffff814eadb9>] print_circular_bug+0x1f8/0x209 [ 2377.284022] [<ffffffff81088b18>] __lock_acquire+0xa1a/0xcf7 [ 2377.284022] [<ffffffff8100e9ad>] ? paravirt_read_tsc+0x9/0xd [ 2377.284022] [<ffffffff8100ee82>] ? sched_clock+0x9/0xd [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffff81089282>] lock_acquire+0xbf/0x103 [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffff814f4600>] _raw_spin_lock+0x36/0x6a [ 2377.284022] [<ffffffffa019f520>] ? btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffffa019f4f0>] ? btrfs_clear_lock_blocking+0x1f/0x28 [btrfs] [ 2377.284022] [<ffffffffa019f520>] btrfs_try_spin_lock+0x27/0x83 [btrfs] [ 2377.284022] [<ffffffffa015fce4>] btrfs_search_slot+0x37b/0x499 [btrfs] [ 2377.284022] [<ffffffffa01777bd>] btrfs_real_readdir+0x1d4/0x522 [btrfs] [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146d49>] ? vfs_readdir+0x58/0xb1 [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146aa8>] ? sys_ioctl+0x7a/0x7a [ 2377.284022] [<ffffffff81146d69>] vfs_readdir+0x78/0xb1 [ 2377.284022] [<ffffffff81146e88>] sys_getdents+0x7e/0xd1 [ 2377.284022] [<ffffffff814fba02>] system_call_fastpath+0x16/0x1b Version-Release number of selected component (if applicable): kernel-3.0-0.rc3.git5.1.fc16.x86_64 kdegraphics-4.6.3-1.fc16.x86_64 How reproducible: Steps to Reproduce: 1. Not sure happens in the background 2. 3. Actual results: Expected results: Additional info:
Have you seen this happen on a 3.0 final kernel, or in 3.1-rc1/2?
The last I have seen of them was 3.1.0-0.rc0.git21.1.fc17.x86_64. I had oodles of them with that one. Since then it has been clean. I have included an example of that one in case it has any value. Thanks for all the hard work guys. Aug 7 22:24:22 pete kernel: [ 1502.979124] Aug 7 22:24:22 pete kernel: [ 1502.979128] ======================================================= Aug 7 22:24:22 pete kernel: [ 1502.979136] [ INFO: possible circular locking dependency detected ] Aug 7 22:24:22 pete kernel: [ 1502.979142] 3.1.0-0.rc0.git21.1.fc17.x86_64 #1 Aug 7 22:24:22 pete kernel: [ 1502.979147] ------------------------------------------------------- Aug 7 22:24:22 pete kernel: [ 1502.979153] kworker/0:1/2110 is trying to acquire lock: Aug 7 22:24:22 pete kernel: [ 1502.979158] (s_active#14){++++.+}, at: [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979179] Aug 7 22:24:22 pete kernel: [ 1502.979181] but task is already holding lock: Aug 7 22:24:22 pete kernel: [ 1502.979186] (&battery->lock){+.+.+.}, at: [<ffffffff812c8dfb>] sysfs_remove_battery+0x15/0x50 Aug 7 22:24:22 pete kernel: [ 1502.979202] Aug 7 22:24:22 pete kernel: [ 1502.979203] which lock already depends on the new lock. Aug 7 22:24:22 pete kernel: [ 1502.979206] Aug 7 22:24:22 pete kernel: [ 1502.979210] Aug 7 22:24:22 pete kernel: [ 1502.979211] the existing dependency chain (in reverse order) is: Aug 7 22:24:22 pete kernel: [ 1502.979217] Aug 7 22:24:22 pete kernel: [ 1502.979218] -> #1 (&battery->lock){+.+.+.}: Aug 7 22:24:22 pete kernel: [ 1502.979229] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e Aug 7 22:24:22 pete kernel: [ 1502.979239] [<ffffffff814f262b>] __mutex_lock_common+0x5d/0x39a Aug 7 22:24:22 pete kernel: [ 1502.979250] [<ffffffff814f2a77>] mutex_lock_nested+0x40/0x45 Aug 7 22:24:22 pete kernel: [ 1502.979259] [<ffffffff812c9033>] acpi_battery_get_state+0x6f/0x174 Aug 7 22:24:22 pete kernel: [ 1502.979268] [<ffffffff812c916a>] acpi_battery_get_property+0x32/0x1d4 Aug 7 22:24:22 pete kernel: [ 1502.979278] [<ffffffff813aa1f3>] power_supply_show_property+0x5e/0x175 Aug 7 22:24:22 pete kernel: [ 1502.979288] [<ffffffff813aa447>] power_supply_uevent+0x105/0x21e Aug 7 22:24:22 pete kernel: [ 1502.979296] [<ffffffff81312d00>] dev_uevent+0x16c/0x20c Aug 7 22:24:22 pete kernel: [ 1502.979307] [<ffffffff81249f5c>] kobject_uevent_env+0x260/0x523 Aug 7 22:24:22 pete kernel: [ 1502.979317] [<ffffffff8124a22a>] kobject_uevent+0xb/0xd Aug 7 22:24:22 pete kernel: [ 1502.979326] [<ffffffff81311c9e>] store_uevent+0x35/0x52 Aug 7 22:24:22 pete kernel: [ 1502.979335] [<ffffffff81310fdc>] dev_attr_store+0x20/0x22 Aug 7 22:24:22 pete kernel: [ 1502.979344] [<ffffffff811a0561>] sysfs_write_file+0x108/0x144 Aug 7 22:24:22 pete kernel: [ 1502.979353] [<ffffffff8114258a>] vfs_write+0xaf/0xf6 Aug 7 22:24:22 pete kernel: [ 1502.979362] [<ffffffff81142785>] sys_write+0x4d/0x74 Aug 7 22:24:22 pete kernel: [ 1502.979371] [<ffffffff814fb0c2>] system_call_fastpath+0x16/0x1b Aug 7 22:24:22 pete kernel: [ 1502.979381] Aug 7 22:24:22 pete kernel: [ 1502.979383] -> #0 (s_active#14){++++.+}: Aug 7 22:24:22 pete kernel: [ 1502.979394] [<ffffffff8108ec02>] __lock_acquire+0xa1a/0xcf7 Aug 7 22:24:22 pete kernel: [ 1502.979403] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e Aug 7 22:24:22 pete kernel: [ 1502.979412] [<ffffffff811a0ff0>] sysfs_deactivate+0xa6/0x10f Aug 7 22:24:22 pete kernel: [ 1502.979421] [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979430] [<ffffffff811a00ea>] sysfs_hash_and_remove+0x59/0x7b Aug 7 22:24:22 pete kernel: [ 1502.979439] [<ffffffff811a0a2f>] sysfs_remove_file+0x17/0x19 Aug 7 22:24:22 pete kernel: [ 1502.979447] [<ffffffff81311731>] device_remove_file+0x17/0x19 Aug 7 22:24:22 pete kernel: [ 1502.979456] [<ffffffff813118fa>] device_del+0x126/0x184 Aug 7 22:24:22 pete kernel: [ 1502.979465] [<ffffffff813119a1>] device_unregister+0x49/0x56 Aug 7 22:24:22 pete kernel: [ 1502.979474] [<ffffffff813a9c7f>] power_supply_unregister+0x28/0x2c Aug 7 22:24:22 pete kernel: [ 1502.979484] [<ffffffff812c8e1f>] sysfs_remove_battery+0x39/0x50 Aug 7 22:24:22 pete kernel: [ 1502.979493] [<ffffffff812c9e5e>] acpi_battery_notify+0x4a/0xb1 Aug 7 22:24:22 pete kernel: [ 1502.979503] [<ffffffff81298423>] acpi_device_notify+0x19/0x1b Aug 7 22:24:22 pete kernel: [ 1502.979513] [<ffffffff812a6923>] acpi_ev_notify_dispatch+0x67/0x7e Aug 7 22:24:22 pete kernel: [ 1502.979524] [<ffffffff8129485d>] acpi_os_execute_deferred+0x27/0x34 Aug 7 22:24:22 pete kernel: [ 1502.979533] [<ffffffff810759d1>] process_one_work+0x205/0x3e7 Aug 7 22:24:22 pete kernel: [ 1502.979543] [<ffffffff8107667f>] worker_thread+0xda/0x15d Aug 7 22:24:22 pete kernel: [ 1502.979551] [<ffffffff8107a045>] kthread+0xa8/0xb0 Aug 7 22:24:22 pete kernel: [ 1502.979561] [<ffffffff814fd2e4>] kernel_thread_helper+0x4/0x10 Aug 7 22:24:22 pete kernel: [ 1502.979571] Aug 7 22:24:22 pete kernel: [ 1502.979572] other info that might help us debug this: Aug 7 22:24:22 pete kernel: [ 1502.979575] Aug 7 22:24:22 pete kernel: [ 1502.979579] Possible unsafe locking scenario: Aug 7 22:24:22 pete kernel: [ 1502.979572] other info that might help us debug this: Aug 7 22:24:22 pete kernel: [ 1502.979575] Aug 7 22:24:22 pete kernel: [ 1502.979579] Possible unsafe locking scenario: Aug 7 22:24:22 pete kernel: [ 1502.979581] Aug 7 22:24:22 pete kernel: [ 1502.979585] CPU0 CPU1 Aug 7 22:24:22 pete kernel: [ 1502.979589] ---- ---- Aug 7 22:24:22 pete kernel: [ 1502.979593] lock(&battery->lock); Aug 7 22:24:22 pete kernel: [ 1502.979601] lock(s_active); Aug 7 22:24:22 pete kernel: [ 1502.979609] lock(&battery->lock); Aug 7 22:24:22 pete kernel: [ 1502.979617] lock(s_active); Aug 7 22:24:22 pete kernel: [ 1502.979624] Aug 7 22:24:22 pete kernel: [ 1502.979626] *** DEADLOCK *** Aug 7 22:24:22 pete kernel: [ 1502.979627] Aug 7 22:24:22 pete kernel: [ 1502.979633] 3 locks held by kworker/0:1/2110: Aug 7 22:24:22 pete kernel: [ 1502.979637] #0: (kacpi_notify){.+.+.+}, at: [<ffffffff81075919>] process_one_work+0x14d/0x3e7 Aug 7 22:24:22 pete kernel: [ 1502.979652] #1: ((&dpc->work)){+.+.+.}, at: [<ffffffff81075919>] process_one_work+0x14d/0x3e7 Aug 7 22:24:22 pete kernel: [ 1502.979667] #2: (&battery->lock){+.+.+.}, at: [<ffffffff812c8dfb>] sysfs_remove_battery+0x15/0x50 Aug 7 22:24:22 pete kernel: [ 1502.979683] Aug 7 22:24:22 pete kernel: [ 1502.979684] stack backtrace: Aug 7 22:24:22 pete kernel: [ 1502.979691] Pid: 2110, comm: kworker/0:1 Not tainted 3.1.0-0.rc0.git21.1.fc17.x86_64 #1 Aug 7 22:24:22 pete kernel: [ 1502.979697] Call Trace: Aug 7 22:24:22 pete kernel: [ 1502.979707] [<ffffffff814e9cfa>] print_circular_bug+0x1f8/0x209 Aug 7 22:24:22 pete kernel: [ 1502.979716] [<ffffffff8108ec02>] __lock_acquire+0xa1a/0xcf7 Aug 7 22:24:22 pete kernel: [ 1502.979726] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979735] [<ffffffff8108f3d5>] lock_acquire+0xf3/0x13e Aug 7 22:24:22 pete kernel: [ 1502.979744] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979753] [<ffffffff81294836>] ? acpi_os_wait_events_complete+0x23/0x23 Aug 7 22:24:22 pete kernel: [ 1502.979762] [<ffffffff811a0ff0>] sysfs_deactivate+0xa6/0x10f Aug 7 22:24:22 pete kernel: [ 1502.979770] [<ffffffff811a1704>] ? sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979780] [<ffffffff811a1704>] sysfs_addrm_finish+0x36/0x55 Aug 7 22:24:22 pete kernel: [ 1502.979789] [<ffffffff811a00ea>] sysfs_hash_and_remove+0x59/0x7b Aug 7 22:24:22 pete kernel: [ 1502.979798] [<ffffffff811a0a2f>] sysfs_remove_file+0x17/0x19 Aug 7 22:24:22 pete kernel: [ 1502.979806] [<ffffffff81311731>] device_remove_file+0x17/0x19 Aug 7 22:24:22 pete kernel: [ 1502.979814] [<ffffffff813118fa>] device_del+0x126/0x184 Aug 7 22:24:22 pete kernel: [ 1502.979822] [<ffffffff813119a1>] device_unregister+0x49/0x56 Aug 7 22:24:22 pete kernel: [ 1502.979832] [<ffffffff813a9c7f>] power_supply_unregister+0x28/0x2c Aug 7 22:24:22 pete kernel: [ 1502.979841] [<ffffffff812c8e1f>] sysfs_remove_battery+0x39/0x50 Aug 7 22:24:22 pete kernel: [ 1502.979850] [<ffffffff812c9e5e>] acpi_battery_notify+0x4a/0xb1 Aug 7 22:24:22 pete kernel: [ 1502.979859] [<ffffffff81298423>] acpi_device_notify+0x19/0x1b Aug 7 22:24:22 pete kernel: [ 1502.979868] [<ffffffff812a6923>] acpi_ev_notify_dispatch+0x67/0x7e Aug 7 22:24:22 pete kernel: [ 1502.979877] [<ffffffff8129485d>] acpi_os_execute_deferred+0x27/0x34 Aug 7 22:24:22 pete kernel: [ 1502.979885] [<ffffffff810759d1>] process_one_work+0x205/0x3e7 Aug 7 22:24:22 pete kernel: [ 1502.979893] [<ffffffff81075919>] ? process_one_work+0x14d/0x3e7 Aug 7 22:24:22 pete kernel: [ 1502.979901] [<ffffffff8108d2cf>] ? lock_acquired+0x210/0x243 Aug 7 22:24:22 pete kernel: [ 1502.979910] [<ffffffff8107667f>] worker_thread+0xda/0x15d Aug 7 22:24:22 pete kernel: [ 1502.979919] [<ffffffff810765a5>] ? manage_workers+0x176/0x176 Aug 7 22:24:22 pete kernel: [ 1502.979927] [<ffffffff8107a045>] kthread+0xa8/0xb0 Aug 7 22:24:22 pete kernel: [ 1502.979937] [<ffffffff814fd2e4>] kernel_thread_helper+0x4/0x10 Aug 7 22:24:22 pete kernel: [ 1502.979946] [<ffffffff814f4734>] ? retint_restore_args+0x13/0x13 Aug 7 22:24:22 pete kernel: [ 1502.979956] [<ffffffff81079f9d>] ? __init_kthread_worker+0x5a/0x5a Aug 7 22:24:22 pete kernel: [ 1502.979965] [<ffffffff814fd2e0>] ? gs_change+0x13/0x13
That one is unrelated to the original report. The battery one got fixed with commit 69d94ec6d83d84044252d9ba03f6a8970816e350. I'll close this out for now. If you see another lockdep report about btrfs, please reopen or file a new bug.