https://bugzilla.kernel.org/show_bug.cgi?id=204243
Bug ID: 204243
Summary: WARNING: possible circular locking dependency detected
[sr_mod]
Product: IO/Storage
Version: 2.5
Kernel Version: 5.2.1
Hardware: All
OS: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: SCSI
Assignee: [email protected]
Reporter: [email protected]
Regression: No
Created attachment 283867
--> https://bugzilla.kernel.org/attachment.cgi?id=283867&action=edit
dmesg output
Encountered this during writing an .iso to a DVD-RW media:
[...]
[ 6908.678745] ======================================================
[ 6908.678746] WARNING: possible circular locking dependency detected
[ 6908.678749] 5.2.1-gentoo #1 Not tainted
[ 6908.678750] ------------------------------------------------------
[ 6908.678752] brasero/1066 is trying to acquire lock:
[ 6908.678754] 0000000087aec994 (&mm->mmap_sem#2){++++}, at:
__do_page_fault+0x387/0x420
[ 6908.678761]
but task is already holding lock:
[ 6908.678762] 0000000056293ac4 (sr_mutex){+.+.}, at: sr_block_ioctl+0x3a/0xc0
[sr_mod]
[ 6908.678768]
which lock already depends on the new lock.
[ 6908.678769]
the existing dependency chain (in reverse order) is:
[ 6908.678770]
-> #6 (sr_mutex){+.+.}:
[ 6908.678773]
-> #5 (&bdev->bd_mutex){+.+.}:
[ 6908.678775]
-> #4 (&fs_devs->device_list_mutex){+.+.}:
[ 6908.678777]
-> #3 (&fs_info->tree_log_mutex){+.+.}:
[ 6908.678780]
-> #2 (&fs_info->reloc_mutex){+.+.}:
[ 6908.678782]
-> #1 (sb_pagefaults){.+.+}:
[ 6908.678784]
-> #0 (&mm->mmap_sem#2){++++}:
[ 6908.678786]
other info that might help us debug this:
[ 6908.678787] Chain exists of:
&mm->mmap_sem#2 --> &bdev->bd_mutex --> sr_mutex
[ 6908.678790] Possible unsafe locking scenario:
[ 6908.678791] CPU0 CPU1
[ 6908.678793] ---- ----
[ 6908.678794] lock(sr_mutex);
[ 6908.678795] lock(&bdev->bd_mutex);
[ 6908.678797] lock(sr_mutex);
[ 6908.678798] lock(&mm->mmap_sem#2);
[ 6908.678800]
*** DEADLOCK ***
[ 6908.678801] 1 lock held by brasero/1066:
[ 6908.678802] #0: 0000000056293ac4 (sr_mutex){+.+.}, at:
sr_block_ioctl+0x3a/0xc0 [sr_mod]
[ 6908.678806]
stack backtrace:
[ 6908.678809] CPU: 1 PID: 1066 Comm: brasero Not tainted 5.2.1-gentoo #1
[ 6908.678810] Hardware name: System manufacturer System Product Name/M5A78L-M
LX3, BIOS 1401 05/05/2016
[ 6908.678812] Call Trace:
[ 6908.678816] dump_stack+0x67/0x98
[ 6908.678820] print_circular_bug.cold.60+0x15c/0x195
[ 6908.678823] __lock_acquire+0x17c0/0x1d18
[ 6908.678826] lock_acquire+0xaa/0x168
[ 6908.678828] ? __do_page_fault+0x387/0x420
[ 6908.678831] ? copy_user_generic_string+0x29/0x40
[ 6908.678833] down_read+0x28/0xc0
[ 6908.678836] ? __do_page_fault+0x387/0x420
[ 6908.678838] __do_page_fault+0x387/0x420
[ 6908.678841] ? page_fault+0x1b/0x20
[ 6908.678843] ? copy_user_generic_string+0x29/0x40
[ 6908.678846] ? copyout+0x25/0x30
[ 6908.678847] ? copy_page_to_iter+0xd0/0x330
[ 6908.678850] ? bio_uncopy_user+0x124/0x168
[ 6908.678852] ? blk_rq_unmap_user+0x22/0x60
[ 6908.678855] ? sg_io+0x268/0x440
[ 6908.678857] ? scsi_cmd_ioctl+0x2b2/0x498
[ 6908.678861] ? cdrom_ioctl+0x36/0xde4 [cdrom]
[ 6908.678864] ? _raw_spin_unlock_irqrestore+0x37/0x40
[ 6908.678866] ? __pm_runtime_resume+0x4f/0x70
[ 6908.678869] ? sr_block_ioctl+0x9d/0xc0 [sr_mod]
[ 6908.678872] ? blkdev_ioctl+0x52e/0xa80
[ 6908.678874] ? find_held_lock+0x2d/0x90
[ 6908.678876] ? block_ioctl+0x2d/0x38
[ 6908.678879] ? do_vfs_ioctl+0xa8/0x718
[ 6908.678881] ? __fget+0x101/0x1e0
[ 6908.678883] ? ksys_ioctl+0x35/0x70
[ 6908.678884] ? __x64_sys_ioctl+0x11/0x18
[ 6908.678887] ? do_syscall_64+0x4b/0x198
[ 6908.678889] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 6984.804171] capability: warning: `growisofs' uses 32-bit capabilities
(legacy support in use)
--
You are receiving this mail because:
You are the assignee for the bug.