Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753781Ab0D0BmV (ORCPT ); Mon, 26 Apr 2010 21:42:21 -0400 Received: from mx1.redhat.com ([209.132.183.28]:32176 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752755Ab0D0BmT (ORCPT ); Mon, 26 Apr 2010 21:42:19 -0400 Date: Mon, 26 Apr 2010 21:41:37 -0400 From: Dave Jones To: Miles Lane Cc: Greg Kroah-Hartman , LKML , Len Brown , Pavel Machek , "Rafael J. Wysocki" , Amerigo Wang Subject: Re: 2.6.34-rc5-git7 -- INFO: possible circular locking dependency detected - &per_cpu(cpu_policy_rwsem, cpu)){+++++.}, at: [] lock_policy_rwsem_read+0x4a/0x7a Message-ID: <20100427014136.GA14719@redhat.com> Mail-Followup-To: Dave Jones , Miles Lane , Greg Kroah-Hartman , LKML , Len Brown , Pavel Machek , "Rafael J. Wysocki" , Amerigo Wang References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-08-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6421 Lines: 111 On Mon, Apr 26, 2010 at 09:30:41PM -0400, Miles Lane wrote: > Dave, is this the same? http://marc.info/?l=linux-kernel&m=127207512031810&w=2 looks like it to me. 499bca9b6d3243f9278a1f5a22d00e67acdd844d should have fixed it, but it looks like that's present in -git7, so something is still missing.. Dave > I produced this one by running "find /sys | xargs cat" > > [ 2982.773548] [ INFO: possible circular locking dependency detected ] > [ 2982.773551] 2.6.34-rc5-git7 #33 > [ 2982.773554] ------------------------------------------------------- > [ 2982.773557] head/6335 is trying to acquire lock: > [ 2982.773560] (&per_cpu(cpu_policy_rwsem, cpu)){+++++.}, at: > [] lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773571] > [ 2982.773572] but task is already holding lock: > [ 2982.773575] (s_active#102){++++.+}, at: [] > sysfs_read_file+0x8d/0x139 > [ 2982.773586] > [ 2982.773586] which lock already depends on the new lock. > [ 2982.773587] > [ 2982.773590] > [ 2982.773591] the existing dependency chain (in reverse order) is: > [ 2982.773593] > [ 2982.773594] -> #2 (s_active#102){++++.+}: > [ 2982.773601] [] __lock_acquire+0xb59/0xd11 > [ 2982.773608] [] lock_acquire+0x115/0x150 > [ 2982.773613] [] sysfs_deactivate+0x9b/0xec > [ 2982.773619] [] sysfs_addrm_finish+0x31/0x50 > [ 2982.773624] [] sysfs_hash_and_remove+0x4e/0x65 > [ 2982.773629] [] sysfs_remove_group+0x8c/0xc5 > [ 2982.773634] [] > cpufreq_governor_dbs+0x2a6/0x33c [cpufreq_ondemand] > [ 2982.773642] [] __cpufreq_governor+0x5d/0xa3 > [ 2982.773648] [] __cpufreq_remove_dev+0x231/0x2e2 > [ 2982.773653] [] cpufreq_cpu_callback+0x62/0x7a > [ 2982.773660] [] notifier_call_chain+0x63/0x97 > [ 2982.773666] [] __raw_notifier_call_chain+0x9/0xb > [ 2982.773672] [] _cpu_down+0x90/0x29e > [ 2982.773679] [] disable_nonboot_cpus+0x6f/0x105 > [ 2982.773685] [] suspend_devices_and_enter+0xe8/0x1ec > [ 2982.773691] [] enter_state+0xda/0x12b > [ 2982.773696] [] state_store+0xb1/0xce > [ 2982.773702] [] kobj_attr_store+0x17/0x19 > [ 2982.773708] [] sysfs_write_file+0x103/0x13f > [ 2982.773713] [] vfs_write+0xa9/0x106 > [ 2982.773719] [] sys_write+0x45/0x69 > [ 2982.773723] [] system_call_fastpath+0x16/0x1b > [ 2982.773730] > [ 2982.773731] -> #1 (dbs_mutex){+.+.+.}: > [ 2982.773737] [] __lock_acquire+0xb59/0xd11 > [ 2982.773742] [] lock_acquire+0x115/0x150 > [ 2982.773747] [] __mutex_lock_common+0x57/0x558 > [ 2982.773752] [] mutex_lock_nested+0x34/0x39 > [ 2982.773757] [] > cpufreq_governor_dbs+0x76/0x33c [cpufreq_ondemand] > [ 2982.773763] [] __cpufreq_governor+0x5d/0xa3 > [ 2982.773769] [] __cpufreq_set_policy+0x1a8/0x222 > [ 2982.773774] [] store_scaling_governor+0x19f/0x1ed > [ 2982.773779] [] store+0x56/0x78 > [ 2982.773783] [] sysfs_write_file+0x103/0x13f > [ 2982.773788] [] vfs_write+0xa9/0x106 > [ 2982.773793] [] sys_write+0x45/0x69 > [ 2982.773798] [] system_call_fastpath+0x16/0x1b > [ 2982.773803] > [ 2982.773804] -> #0 (&per_cpu(cpu_policy_rwsem, cpu)){+++++.}: > [ 2982.773810] [] __lock_acquire+0xa03/0xd11 > [ 2982.773815] [] lock_acquire+0x115/0x150 > [ 2982.773820] [] down_read+0x42/0x57 > [ 2982.773825] [] lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773830] [] show+0x30/0x69 > [ 2982.773835] [] sysfs_read_file+0xb4/0x139 > [ 2982.773840] [] vfs_read+0xa6/0x103 > [ 2982.773844] [] sys_read+0x45/0x69 > [ 2982.773849] [] system_call_fastpath+0x16/0x1b > [ 2982.773854] > [ 2982.773855] other info that might help us debug this: > [ 2982.773856] > [ 2982.773860] 2 locks held by head/6335: > [ 2982.773862] #0: (&buffer->mutex){+.+.+.}, at: > [] sysfs_read_file+0x34/0x139 > [ 2982.773871] #1: (s_active#102){++++.+}, at: [] > sysfs_read_file+0x8d/0x139 > [ 2982.773881] > [ 2982.773882] stack backtrace: > [ 2982.773886] Pid: 6335, comm: head Not tainted 2.6.34-rc5-git7 #33 > [ 2982.773889] Call Trace: > [ 2982.773893] [] print_circular_bug+0xa8/0xb7 > [ 2982.773893] [] __lock_acquire+0xa03/0xd11 > [ 2982.773893] [] ? __lock_acquire+0xd02/0xd11 > [ 2982.773893] [] ? lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773893] [] lock_acquire+0x115/0x150 > [ 2982.773893] [] ? lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773893] [] down_read+0x42/0x57 > [ 2982.773893] [] ? lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773893] [] ? _raw_spin_unlock_irqrestore+0x87/0x95 > [ 2982.773893] [] lock_policy_rwsem_read+0x4a/0x7a > [ 2982.773893] [] show+0x30/0x69 > [ 2982.773893] [] sysfs_read_file+0xb4/0x139 > [ 2982.773893] [] vfs_read+0xa6/0x103 > [ 2982.773893] [] ? trace_hardirqs_on_caller+0x127/0x152 > [ 2982.773893] [] sys_read+0x45/0x69 > [ 2982.773893] [] system_call_fastpath+0x16/0x1b -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/