possible circular locking dependency detected in 2.6.24-rc3-git6

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Only saw this once, but it's a relatively short time since I moved
 to Fedora 8 (i686, UP) and began building my custom kernels
 there... apparently starting my 11.1.0.6 Oracle instance caused
 lockdep to trigger this (hoping GMail doesn't mangle the
 text too badly):

 =======================================================
 [ INFO: possible circular locking dependency detected ]
 2.6.24-rc3-git6 #7
 -------------------------------------------------------
 oracle/4715 is trying to acquire lock:
  (&mm->mmap_sem){----}, at: [<c0182489>] dio_get_page+0x4d/0x159

 but task is already holding lock:
  (jbd_handle){--..}, at: [<c01a825e>] journal_start+0xc8/0xf5

 which lock already depends on the new lock.


 the existing dependency chain (in reverse order) is:

 -> #1 (jbd_handle){--..}:
        [<c01331e2>] __lock_acquire+0xa08/0xc06
        [<c013344f>] lock_acquire+0x6f/0x88
        [<c01a8281>] journal_start+0xeb/0xf5
        [<c01a1220>] ext3_journal_start_sb+0x48/0x4a
        [<c019cd75>] ext3_dirty_inode+0x26/0x6b
        [<c017a1fe>] __mark_inode_dirty+0x26/0x158
        [<c0172a83>] touch_atime+0xb7/0xbc
        [<c0145266>] generic_file_mmap+0x2d/0x42
        [<c01543fc>] mmap_region+0x1d8/0x3a4
        [<c01548f3>] do_mmap_pgoff+0x257/0x2b6
        [<c010728a>] sys_mmap2+0x9a/0xb4
        [<c0103e7a>] syscall_call+0x7/0xb
        [<ffffffff>] 0xffffffff

 -> #0 (&mm->mmap_sem){----}:
        [<c01330d2>] __lock_acquire+0x8f8/0xc06
        [<c013344f>] lock_acquire+0x6f/0x88
        [<c012bd13>] down_read+0x3f/0x50
        [<c0182489>] dio_get_page+0x4d/0x159
        [<c0182f73>] __blockdev_direct_IO+0x3f7/0xad1
        [<c019cb6f>] ext3_direct_IO+0x10c/0x195
        [<c0146367>] generic_file_direct_IO+0x124/0x139
        [<c01463d2>] generic_file_direct_write+0x56/0xed
        [<c0146c79>] __generic_file_aio_write_nolock+0x2f6/0x43e
        [<c0146e19>] generic_file_aio_write+0x58/0xb6
        [<c0198d13>] ext3_file_write+0x27/0x99
        [<c0161283>] do_sync_write+0xc4/0x101
        [<c0161a24>] vfs_write+0xa8/0x131
        [<c0161fb6>] sys_pwrite64+0x45/0x5c
        [<c0103e7a>] syscall_call+0x7/0xb
        [<ffffffff>] 0xffffffff

 other info that might help us debug this:

 2 locks held by oracle/4715:
  #0:  (&sb->s_type->i_mutex_key#7){--..}, at: [<c0146e06>]
generic_file_aio_write+0x45/0xb6
  #1:  (jbd_handle){--..}, at: [<c01a825e>] journal_start+0xc8/0xf5

 stack backtrace:
 Pid: 4715, comm: oracle Not tainted 2.6.24-rc3-git6 #7
  [<c010448a>] show_trace_log_lvl+0x1a/0x2f
  [<c0104df7>] show_trace+0x12/0x14
  [<c010568a>] dump_stack+0x6a/0x70
  [<c01318a5>] print_circular_bug_tail+0x5e/0x67
  [<c01330d2>] __lock_acquire+0x8f8/0xc06
  [<c013344f>] lock_acquire+0x6f/0x88
  [<c012bd13>] down_read+0x3f/0x50
  [<c0182489>] dio_get_page+0x4d/0x159
  [<c0182f73>] __blockdev_direct_IO+0x3f7/0xad1
  [<c019cb6f>] ext3_direct_IO+0x10c/0x195
  [<c0146367>] generic_file_direct_IO+0x124/0x139
  [<c01463d2>] generic_file_direct_write+0x56/0xed
  [<c0146c79>] __generic_file_aio_write_nolock+0x2f6/0x43e
  [<c0146e19>] generic_file_aio_write+0x58/0xb6
  [<c0198d13>] ext3_file_write+0x27/0x99
  [<c0161283>] do_sync_write+0xc4/0x101
  [<c0161a24>] vfs_write+0xa8/0x131
  [<c0161fb6>] sys_pwrite64+0x45/0x5c
  [<c0103e7a>] syscall_call+0x7/0xb
  =======================


Let me know whether this is enough info or I should try
 and hammer the thing further to see if this reproduces.


Thanks, ciao,

--alessandro

 "Damaged people are dangerous. They know they can survive."

   (Anna Barton/Juliette Binoche, 'Damage')
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux