Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp3660655iog; Mon, 27 Jun 2022 23:16:24 -0700 (PDT) X-Google-Smtp-Source: AGRyM1u7SXPtQM056qxTqQU491hMjP2MymcVRGYsY/qQx5e03rDhdB835yMXg2Lff2MbSAepM7V/ X-Received: by 2002:a17:90b:4b84:b0:1ef:27b:d3d1 with SMTP id lr4-20020a17090b4b8400b001ef027bd3d1mr1814126pjb.30.1656396983706; Mon, 27 Jun 2022 23:16:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656396983; cv=none; d=google.com; s=arc-20160816; b=wStOG+lXzyow0eoKuLxLKLBHDza4D2u19ljNQhZVrwmdAH3UKz8Co6WZ78JWbrUoZK tuypO4l/Fy/mr2NgsbGj8xHMCDtxzpylpDk7CrglAM1VEyXcBOYa8x5fPANnfo3Lvd8A qG7aeIuw2/gRhQmKq7xyD+RWfR3ojrG0BYUUztCnn0ahSmI5vqOhU7VoP8IifZf6JOkr PU0vnWksh2swAvCKW7ErBZRp39taaNkLZwhDFL352I2vCNR0NYJ7kMRSENpqKPrhjBmg /8vCDg2ndLWS38BxclNSgKFcypTbKRsmlQviPeSDAqf2v96krHRwu87t1DhaKObZe0wM D78g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=cNU2RwxwrVExto+J1thBG6XhLluv06nYdfwbag64hKE=; b=Mnv1wNIjeEVCoy/T9DOWsNnDyvqeeVxr/lp9lZh9T8Vfw1yDJgzo4/alHODNYA3OAm ds2qfV6QTI7xWg6RNsEqgqkfY+4UU4hIA8eA5dP72Y09X1t46N5c+ecBK+OVY2Oh+m1b n1BIog00/gt09IiSGozYG3iY1cXusXwbctr4ZvwCzlHbM5199kdhXsXus1uVq4TVu/k8 q0pe4zPl7oYnuj1yXt3i5axDZ5SYpVOI1TSBnb5UT/C0miHQPuBBRAt58IQyLUSIzl8i aE9Lneh030xr96Cv1Y/P1ygCDrGpSPbTy2ZYDSW4L03Du7Gn4diAguXOVPal/4H7HifE 0gdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pwderX56; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n16-20020a170902e55000b0016a3f9a66ccsi19729187plf.222.2022.06.27.23.16.11; Mon, 27 Jun 2022 23:16:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pwderX56; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245345AbiF1GID (ORCPT + 99 others); Tue, 28 Jun 2022 02:08:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44356 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245325AbiF1GIC (ORCPT ); Tue, 28 Jun 2022 02:08:02 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 03B032315F; Mon, 27 Jun 2022 23:07:57 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 99A4DB81C0C; Tue, 28 Jun 2022 06:07:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DF718C341C6; Tue, 28 Jun 2022 06:07:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1656396475; bh=qXz5gzlfeJcLBrqesZHeSe5DJNs8xr/HiIO/kMPwVds=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pwderX56PSSyBiEfcUkhi+AmhLzOyvZB5HrHb2xytVF9/v1Duprb5b9IsVGdKEhnE LYEvUfJnb3s49tKuJxLm7+LAQ0sgYD2W8dEiNRQ3xRtdh8U+tQPeDykWm6TB/78Tp5 HgLr1coWgYJ1JqwGnIdeWDMgYKzyrf9dsVlmpA4Y= Date: Tue, 28 Jun 2022 08:07:52 +0200 From: Greg Kroah-Hartman To: "yangx.jy@fujitsu.com" Cc: Tejun Heo , Bjorn Helgaas , Jason Gunthorpe , Leon Romanovsky , "linux-kernel@vger.kernel.org" , "linux-rdma@vger.kernel.org" , "linux-block@vger.kernel.org" Subject: Re: [bug report from blktests nvme/032] WARNING: possible circular locking dependency detected Message-ID: References: <4ed3028b-2d2f-8755-fec2-0b9cb5ad42d2@fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4ed3028b-2d2f-8755-fec2-0b9cb5ad42d2@fujitsu.com> X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 28, 2022 at 04:03:55AM +0000, yangx.jy@fujitsu.com wrote: > Hi everyone, > > Running blktests nvme/032 on kernel v5.19-rc2+ which enables > CONFIG_LOCKDEP and CONFIG_PROVE_LOCKING triggered the below WARNING. What was happening when this trace was created? It looks like you were manually removing a PCI device from the system through sysfs? Why would blktests do that? thanks, greg k-h