=====================================================
[ BUG: possible circular locking deadlock detected! ]
-----------------------------------------------------
mount/1219 is trying to acquire lock:
(&ni->mrec_lock){--..}, at: [<c031e4b8>] mutex_lock+0x21/0x24
but task is already holding lock:
(&rl->lock){----}, at: [<f8a98e4d>] ntfs_map_runlist+0x2a/0xb5 [ntfs]
which lock already depends on the new lock,
which could lead to circular deadlocks!
the existing dependency chain (in reverse order) is:
-> #1 (&rl->lock){----}:
[<c012ec64>] lock_acquire+0x58/0x74
[<f8a97619>] ntfs_readpage+0x362/0x8fd [ntfs]
[<c01415b0>] read_cache_page+0x8c/0x137
[<f8a9eeb8>] map_mft_record+0xd7/0x1d2 [ntfs]
[<f8a9d661>] ntfs_read_locked_inode+0x74/0xea9 [ntfs]
[<f8a9eabb>] ntfs_read_inode_mount+0x625/0x846 [ntfs]
[<f8aa2ff8>] ntfs_fill_super+0x8ca/0xd14 [ntfs]
[<c01647c4>] get_sb_bdev+0xed/0x14e
[<f8aa15ef>] ntfs_get_sb+0x10/0x12 [ntfs]
[<c0163c11>] vfs_kern_mount+0x76/0x143
[<c0163d17>] do_kern_mount+0x29/0x3d
[<c0177f9f>] do_mount+0x78a/0x7e4
[<c0178058>] sys_mount+0x5f/0x91
[<c031fb5d>] sysenter_past_esp+0x56/0x8d
-> #0 (&ni->mrec_lock){--..}:
[<c012ec64>] lock_acquire+0x58/0x74
[<c031e321>] __mutex_lock_slowpath+0xa7/0x21d
[<c031e4b8>] mutex_lock+0x21/0x24
[<f8a9edfa>] map_mft_record+0x19/0x1d2 [ntfs]
[<f8a98630>] ntfs_map_runlist_nolock+0x48/0x437 [ntfs]
[<f8a98eaa>] ntfs_map_runlist+0x87/0xb5 [ntfs]
[<f8a97739>] ntfs_readpage+0x482/0x8fd [ntfs]
[<c01415b0>] read_cache_page+0x8c/0x137
[<f8aa20bc>] load_system_files+0x155/0x7c7 [ntfs]
[<f8aa30a7>] ntfs_fill_super+0x979/0xd14 [ntfs]
[<c01647c4>] get_sb_bdev+0xed/0x14e
[<f8aa15ef>] ntfs_get_sb+0x10/0x12 [ntfs]
[<c0163c11>] vfs_kern_mount+0x76/0x143
[<c0163d17>] do_kern_mount+0x29/0x3d
[<c0177f9f>] do_mount+0x78a/0x7e4
[<c0178058>] sys_mount+0x5f/0x91
[<c031fb5d>] sysenter_past_esp+0x56/0x8d
other info that might help us debug this:
2 locks held by mount/1219:
#0: (&s->s_umount#18){--..}, at: [<c0164443>] sget+0x223/0x3a1
#1: (&rl->lock){----}, at: [<f8a98e4d>] ntfs_map_runlist+0x2a/0xb5 [ntfs]
stack backtrace:
[<c0103924>] show_trace_log_lvl+0x54/0xfd
[<c01049a9>] show_trace+0xd/0x10
[<c01049c3>] dump_stack+0x17/0x1c
[<c012cefb>] print_circular_bug_tail+0x59/0x64
[<c012e766>] __lock_acquire+0x7c2/0x97a
[<c012ec64>] lock_acquire+0x58/0x74
[<c031e321>] __mutex_lock_slowpath+0xa7/0x21d
[<c031e4b8>] mutex_lock+0x21/0x24
[<f8a9edfa>] map_mft_record+0x19/0x1d2 [ntfs]
[<f8a98630>] ntfs_map_runlist_nolock+0x48/0x437 [ntfs]
[<f8a98eaa>] ntfs_map_runlist+0x87/0xb5 [ntfs]
[<f8a97739>] ntfs_readpage+0x482/0x8fd [ntfs]
[<c01415b0>] read_cache_page+0x8c/0x137
[<f8aa20bc>] load_system_files+0x155/0x7c7 [ntfs]
[<f8aa30a7>] ntfs_fill_super+0x979/0xd14 [ntfs]
[<c01647c4>] get_sb_bdev+0xed/0x14e
[<f8aa15ef>] ntfs_get_sb+0x10/0x12 [ntfs]
[<c0163c11>] vfs_kern_mount+0x76/0x143
[<c0163d17>] do_kern_mount+0x29/0x3d
[<c0177f9f>] do_mount+0x78a/0x7e4
[<c0178058>] sys_mount+0x5f/0x91
[<c031fb5d>] sysenter_past_esp+0x56/0x8d
NTFS volume version 3.1.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]