linux
linux copied to clipboard
jffs2: possible circular locking dependency detected
[ 20.060942] WARNING: possible circular locking dependency detected
[ 20.067134] 4.17.2-00135-gf0be3e98c928 #21 Not tainted
[ 20.072276] ------------------------------------------------------
[ 20.078466] systemd-tmpfile/554 is trying to acquire lock:
[ 20.083966] 3c2944ca (&f->sem){+.+.}, at: jffs2_readpage+0x30/0x5c
[ 20.090219]
[ 20.090219] but task is already holding lock:
[ 20.096061] 91192e34 (&mm->mmap_sem){++++}, at: do_page_fault+0xb4/0x394
[ 20.102818]
[ 20.102818] which lock already depends on the new lock.
[ 20.102818]
[ 20.110998]
[ 20.110998] the existing dependency chain (in reverse order) is:
[ 20.118484]
[ 20.118484] -> #1 (&mm->mmap_sem){++++}:
[ 20.123945] __might_fault+0x8c/0xc0
[ 20.128069] filldir+0xa4/0x2dc
[ 20.131751] jffs2_readdir+0x13c/0x1dc
[ 20.136038] iterate_dir+0x84/0x160
[ 20.140057] sys_getdents+0x90/0x16c
[ 20.144167] ret_fast_syscall+0x0/0x28
[ 20.148452] 0x7e8d0c68
[ 20.151429]
[ 20.151429] -> #0 (&f->sem){+.+.}:
[ 20.156362] lock_acquire+0xd8/0x204
[ 20.160494] __mutex_lock+0x90/0x678
[ 20.164607] mutex_lock_nested+0x2c/0x34
[ 20.169072] jffs2_readpage+0x30/0x5c
[ 20.173280] filemap_fault+0x2cc/0x5d8
[ 20.177569] __do_fault+0x28/0xd4
[ 20.181426] handle_mm_fault+0x57c/0xfb8
[ 20.185891] do_page_fault+0x128/0x394
[ 20.190178] do_DataAbort+0x54/0xec
[ 20.194208] __dabt_usr+0x44/0x60
[ 20.198057] 0x76c2cb04
[ 20.201026]
[ 20.201026] other info that might help us debug this:
[ 20.201026]
[ 20.209033] Possible unsafe locking scenario:
[ 20.209033]
[ 20.214962] CPU0 CPU1
[ 20.219493] ---- ----
[ 20.224025] lock(&mm->mmap_sem);
[ 20.227450] lock(&f->sem);
[ 20.232865] lock(&mm->mmap_sem);
[ 20.238802] lock(&f->sem);
[ 20.241697]
[ 20.241697] *** DEADLOCK ***
[ 20.241697]
[ 20.247631] 1 lock held by systemd-tmpfile/554:
[ 20.252167] #0: 91192e34 (&mm->mmap_sem){++++}, at: do_page_fault+0xb4/0x394
[ 20.259362]
[ 20.259362] stack backtrace:
[ 20.263744] CPU: 0 PID: 554 Comm: systemd-tmpfile Not tainted 4.17.2-00135-gf0be3e98c928 #21
[ 20.272181] Hardware name: Generic DT based system
[ 20.277016] [<8010a650>] (unwind_backtrace) from [<80107ecc>] (show_stack+0x20/0x24)
[ 20.284795] [<80107ecc>] (show_stack) from [<806b6f20>] (dump_stack+0x20/0x28)
[ 20.292049] [<806b6f20>] (dump_stack) from [<80159730>] (print_circular_bug.constprop.20+0x26c/0x2c4)
[ 20.301292] [<80159730>] (print_circular_bug.constprop.20) from [<80158024>] (__lock_acquire+0x14fc/0x18f0)
[ 20.311054] [<80158024>] (__lock_acquire) from [<80158f44>] (lock_acquire+0xd8/0x204)
[ 20.318919] [<80158f44>] (lock_acquire) from [<806d0c34>] (__mutex_lock+0x90/0x678)
[ 20.326609] [<806d0c34>] (__mutex_lock) from [<806d1fa4>] (mutex_lock_nested+0x2c/0x34)
[ 20.334644] [<806d1fa4>] (mutex_lock_nested) from [<802ea16c>] (jffs2_readpage+0x30/0x5c)
[ 20.342856] [<802ea16c>] (jffs2_readpage) from [<80208d38>] (filemap_fault+0x2cc/0x5d8)
[ 20.350896] [<80208d38>] (filemap_fault) from [<8023d2c8>] (__do_fault+0x28/0xd4)
[ 20.358404] [<8023d2c8>] (__do_fault) from [<80240a68>] (handle_mm_fault+0x57c/0xfb8)
[ 20.366267] [<80240a68>] (handle_mm_fault) from [<8010d490>] (do_page_fault+0x128/0x394)
[ 20.374384] [<8010d490>] (do_page_fault) from [<8010d8bc>] (do_DataAbort+0x54/0xec)
[ 20.382062] [<8010d8bc>] (do_DataAbort) from [<80101d64>] (__dabt_usr+0x44/0x60)
[ 20.389462] Exception stack(0x965fbfb0 to 0x965fbff8)
[ 20.394530] bfa0: 018bb220 76f292c6 76f29000 76c2caf4
[ 20.402723] bfc0: 018bb220 76cffc8c 018bb220 018bae18 0000000a 018bae18 00000000 00000000
[ 20.410911] bfe0: fbada489 7ec431a8 76c2ea2c 76c2cb04 80000010 ffffffff
[ 20.060942] WARNING: possible circular locking dependency detected
[ 20.067134] 4.17.2-00135-gf0be3e98c928 #21 Not tainted
[ 20.072276] ------------------------------------------------------
[ 20.078466] systemd-tmpfile/554 is trying to acquire lock:
[ 20.083966] 3c2944ca (&f->sem){+.+.}, at: jffs2_readpage+0x30/0x5c
[ 20.090219]
[ 20.090219] but task is already holding lock:
[ 20.096061] 91192e34 (&mm->mmap_sem){++++}, at: do_page_fault+0xb4/0x394
[ 20.102818]
[ 20.102818] which lock already depends on the new lock.
[ 20.102818]
[ 20.110998]
[ 20.110998] the existing dependency chain (in reverse order) is:
[ 20.118484]
[ 20.118484] -> #1 (&mm->mmap_sem){++++}:
[ 20.123945] __might_fault+0x8c/0xc0
[ 20.128069] filldir+0xa4/0x2dc
[ 20.131751] jffs2_readdir+0x13c/0x1dc
[ 20.136038] iterate_dir+0x84/0x160
[ 20.140057] sys_getdents+0x90/0x16c
[ 20.144167] ret_fast_syscall+0x0/0x28
[ 20.148452] 0x7e8d0c68
[ 20.151429]
[ 20.151429] -> #0 (&f->sem){+.+.}:
[ 20.156362] lock_acquire+0xd8/0x204
[ 20.160494] __mutex_lock+0x90/0x678
[ 20.164607] mutex_lock_nested+0x2c/0x34
[ 20.169072] jffs2_readpage+0x30/0x5c
[ 20.173280] filemap_fault+0x2cc/0x5d8
[ 20.177569] __do_fault+0x28/0xd4
[ 20.181426] handle_mm_fault+0x57c/0xfb8
[ 20.185891] do_page_fault+0x128/0x394
[ 20.190178] do_DataAbort+0x54/0xec
[ 20.194208] __dabt_usr+0x44/0x60
[ 20.198057] 0x76c2cb04
[ 20.201026]
[ 20.201026] other info that might help us debug this:
[ 20.201026]
[ 20.209033] Possible unsafe locking scenario:
[ 20.209033]
[ 20.214962] CPU0 CPU1
[ 20.219493] ---- ----
[ 20.224025] lock(&mm->mmap_sem);
[ 20.227450] lock(&f->sem);
[ 20.232865] lock(&mm->mmap_sem);
[ 20.238802] lock(&f->sem);
[ 20.241697]
[ 20.241697] *** DEADLOCK ***
[ 20.241697]
[ 20.247631] 1 lock held by systemd-tmpfile/554:
[ 20.252167] #0: 91192e34 (&mm->mmap_sem){++++}, at: do_page_fault+0xb4/0x394
[ 20.259362]
[ 20.259362] stack backtrace:
[ 20.263744] CPU: 0 PID: 554 Comm: systemd-tmpfile Not tainted 4.17.2-00135-gf0be3e98c928 #21
[ 20.272181] Hardware name: Generic DT based system
[ 20.277016] [<8010a650>] (unwind_backtrace) from [<80107ecc>] (show_stack+0x20/0x24)
[ 20.284795] [<80107ecc>] (show_stack) from [<806b6f20>] (dump_stack+0x20/0x28)
[ 20.292049] [<806b6f20>] (dump_stack) from [<80159730>] (print_circular_bug.constprop.20+0x26c/0x2c4)
[ 20.301292] [<80159730>] (print_circular_bug.constprop.20) from [<80158024>] (__lock_acquire+0x14fc/0x18f0)
[ 20.311054] [<80158024>] (__lock_acquire) from [<80158f44>] (lock_acquire+0xd8/0x204)
[ 20.318919] [<80158f44>] (lock_acquire) from [<806d0c34>] (__mutex_lock+0x90/0x678)
[ 20.326609] [<806d0c34>] (__mutex_lock) from [<806d1fa4>] (mutex_lock_nested+0x2c/0x34)
[ 20.334644] [<806d1fa4>] (mutex_lock_nested) from [<802ea16c>] (jffs2_readpage+0x30/0x5c)
[ 20.342856] [<802ea16c>] (jffs2_readpage) from [<80208d38>] (filemap_fault+0x2cc/0x5d8)
[ 20.350896] [<80208d38>] (filemap_fault) from [<8023d2c8>] (__do_fault+0x28/0xd4)
[ 20.358404] [<8023d2c8>] (__do_fault) from [<80240a68>] (handle_mm_fault+0x57c/0xfb8)
[ 20.366267] [<80240a68>] (handle_mm_fault) from [<8010d490>] (do_page_fault+0x128/0x394)
[ 20.374384] [<8010d490>] (do_page_fault) from [<8010d8bc>] (do_DataAbort+0x54/0xec)
[ 20.382062] [<8010d8bc>] (do_DataAbort) from [<80101d64>] (__dabt_usr+0x44/0x60)
[ 20.389462] Exception stack(0x965fbfb0 to 0x965fbff8)
[ 20.394530] bfa0: 018bb220 76f292c6 76f29000 76c2caf4
[ 20.402723] bfc0: 018bb220 76cffc8c 018bb220 018bae18 0000000a 018bae18 00000000 00000000
[ 20.410911] bfe0: fbada489 7ec431a8 76c2ea2c 76c2cb04 80000010 ffffffff