[Bugme-new] [Bug 10924] New: if cdrom is in cd-drive on wakeup -> "possible circular locking dependency detected"

bugme-daemon at bugzilla.kernel.org bugme-daemon at bugzilla.kernel.org
Sun Jun 15 23:12:37 PDT 2008


http://bugzilla.kernel.org/show_bug.cgi?id=10924

           Summary: if cdrom is in cd-drive on wakeup -> "possible circular
                    locking dependency detected"
           Product: ACPI
           Version: 2.5
     KernelVersion: 2.6.26-rc6-00028-gc6d8f40
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: Power-Sleep-Wake
        AssignedTo: acpi_power-sleep-wake at kernel-bugs.osdl.org
        ReportedBy: bug-track at fisher-privat.net


Latest working kernel version: none due other suspend related bugs 

Distribution: ubuntu 8.04

Problem Description:
if you leave cdrom inside cd drive before suspend, on wakeup you'll get this
message:

[ 3318.563397] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 3323.020004] VFS: busy inodes on changed media.
[ 3323.145401] VFS: busy inodes on changed media.
[ 3323.443158] VFS: busy inodes on changed media.
[ 3323.567484] VFS: busy inodes on changed media.
[ 3323.703937] VFS: busy inodes on changed media.
[ 3323.830314] VFS: busy inodes on changed media.
[ 3333.712739] VFS: busy inodes on changed media.
[ 3335.568628] 
[ 3335.568628] =======================================================
[ 3335.568628] [ INFO: possible circular locking dependency detected ]
[ 3335.568628] 2.6.26-rc6-testing-00028-gc6d8f40 #68
[ 3335.568628] -------------------------------------------------------
[ 3335.568628] mount/5781 is trying to acquire lock:
[ 3335.568628]  (&bdev->bd_mutex){--..}, at: [<c0197765>]
__blkdev_put+0x24/0x10f
[ 3335.568628] 
[ 3335.568628] but task is already holding lock:
[ 3335.568628]  (&type->s_umount_key#20){----}, at: [<c0177722>]
sget+0x68/0x339
[ 3335.568628] 
[ 3335.568628] which lock already depends on the new lock.
[ 3335.568628] 
[ 3335.568628] 
[ 3335.568628] the existing dependency chain (in reverse order) is:
[ 3335.568628] 
[ 3335.568628] -> #1 (&type->s_umount_key#20){----}:
[ 3335.568628]        [<c013e0af>] __lock_acquire+0x9e4/0xb91
[ 3335.568628]        [<c013e2c8>] lock_acquire+0x6c/0x89
[ 3335.568628]        [<c035775e>] down_read+0x2b/0x65
[ 3335.568628]        [<c01781d5>] get_super+0x42/0x87
[ 3335.568628]        [<c0197354>] __invalidate_device+0xf/0x38
[ 3335.568628]        [<c01973a1>] check_disk_change+0x24/0x6a
[ 3335.568628]        [<c02b0af0>] cdrom_open+0x850/0x89d
[ 3335.568628]        [<c02943ec>] sr_block_open+0x75/0x8a
[ 3335.568628]        [<c0197b23>] do_open+0x1c0/0x273
[ 3335.568628]        [<c0197d98>] blkdev_open+0x28/0x51
[ 3335.568628]        [<c0174bf9>] __dentry_open+0x147/0x236
[ 3335.568628]        [<c0174d07>] nameidata_to_filp+0x1f/0x33
[ 3335.568628]        [<c017fd66>] do_filp_open+0x347/0x695
[ 3335.568628]        [<c01749d1>] do_sys_open+0x40/0xb6
[ 3335.568628]        [<c0174a89>] sys_open+0x1e/0x26
[ 3335.568628]        [<c0102d4d>] sysenter_past_esp+0x6a/0xb1
[ 3335.568628]        [<ffffffff>] 0xffffffff
[ 3335.568628] 
[ 3335.568628] -> #0 (&bdev->bd_mutex){--..}:
[ 3335.568628]        [<c013dfd6>] __lock_acquire+0x90b/0xb91
[ 3335.568628]        [<c013e2c8>] lock_acquire+0x6c/0x89
[ 3335.568628]        [<c0357211>] mutex_lock_nested+0xc5/0x23c
[ 3335.568628]        [<c0197765>] __blkdev_put+0x24/0x10f
[ 3335.568628]        [<c019785a>] blkdev_put+0xa/0xc
[ 3335.568628]        [<c019786e>] close_bdev_excl+0x12/0x15
[ 3335.568628]        [<c01782a5>] get_sb_bdev+0x8b/0x10b
[ 3335.568628]        [<f93c04a4>] isofs_get_sb+0x13/0x15 [isofs]
[ 3335.568642]        [<c0177ecf>] vfs_kern_mount+0x81/0xf7
[ 3335.568642]        [<c0177f89>] do_kern_mount+0x32/0xba
[ 3335.568642]        [<c018b1c8>] do_new_mount+0x46/0x74
[ 3335.568642]        [<c018b38d>] do_mount+0x197/0x1b5
[ 3335.568642]        [<c018b40f>] sys_mount+0x64/0x9b
[ 3335.568642]        [<c0102d4d>] sysenter_past_esp+0x6a/0xb1
[ 3335.568642]        [<ffffffff>] 0xffffffff
[ 3335.568642] 
[ 3335.568642] other info that might help us debug this:
[ 3335.568642] 
[ 3335.568642] 1 lock held by mount/5781:
[ 3335.568642]  #0:  (&type->s_umount_key#20){----}, at: [<c0177722>]
sget+0x68/0x339
[ 3335.568642] 
[ 3335.568642] stack backtrace:
[ 3335.568642] Pid: 5781, comm: mount Not tainted
2.6.26-rc6-testing-00028-gc6d8f40 #68
[ 3335.568642]  [<c013c1ab>] print_circular_bug_tail+0x5b/0x66
[ 3335.568642]  [<c013cb57>] ? print_circular_bug_header+0xa5/0xb0
[ 3335.568642]  [<c013dfd6>] __lock_acquire+0x90b/0xb91
[ 3335.568642]  [<c013e2c8>] lock_acquire+0x6c/0x89
[ 3335.568642]  [<c0197765>] ? __blkdev_put+0x24/0x10f
[ 3335.568642]  [<c0357211>] mutex_lock_nested+0xc5/0x23c
[ 3335.568642]  [<c0197765>] ? __blkdev_put+0x24/0x10f
[ 3335.568642]  [<c0197765>] ? __blkdev_put+0x24/0x10f
[ 3335.568642]  [<c0197765>] __blkdev_put+0x24/0x10f
[ 3335.568642]  [<c019785a>] blkdev_put+0xa/0xc
[ 3335.568642]  [<c019786e>] close_bdev_excl+0x12/0x15
[ 3335.568642]  [<c01782a5>] get_sb_bdev+0x8b/0x10b
[ 3335.568642]  [<c018a194>] ? alloc_vfsmnt+0xe3/0x10b
[ 3335.568642]  [<f93c04a4>] isofs_get_sb+0x13/0x15 [isofs]
[ 3335.568642]  [<f93c0fbe>] ? isofs_fill_super+0x0/0x8ea [isofs]
[ 3335.568642]  [<c0177ecf>] vfs_kern_mount+0x81/0xf7
[ 3335.568642]  [<c0177f89>] do_kern_mount+0x32/0xba
[ 3335.568642]  [<c018b1c8>] do_new_mount+0x46/0x74
[ 3335.568642]  [<c018b38d>] do_mount+0x197/0x1b5
[ 3335.568642]  [<c017dd35>] ? getname+0x1a/0xb4
[ 3335.568642]  [<c015cd1a>] ? __get_free_pages+0x1b/0x21
[ 3335.568642]  [<c0189436>] ? copy_mount_options+0x27/0x10e
[ 3335.568642]  [<c018b40f>] sys_mount+0x64/0x9b
[ 3335.568642]  [<c0102d4d>] sysenter_past_esp+0x6a/0xb1
[ 3335.568642]  =======================


Steps to reproduce:
1. insert cdrom in cddrive
2. wait until automount
3. suspend (s3) && resume


-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


More information about the Bugme-new mailing list