Hello, [ 9.610781] ====================================================== [ 9.610784] WARNING: possible circular locking dependency detected [ 9.610789] 4.12.0-rc2-next-20170523-dbg-dirty #231 Not tainted [ 9.610791] ------------------------------------------------------ [ 9.610795] Xorg/341 is trying to acquire lock: [ 9.610798] (cpu_hotplug_lock.rw_sem){++++++}, at: [<ffffffff8104c4ba>] apply_wqattrs_lock+0x9/0x19 [ 9.610816] but task is already holding lock: [ 9.610818] (&dev_priv->mm_lock){+.+.+.}, at: [<ffffffff81312e75>] i915_gem_userptr_init__mmu_notifier+0x85/0x213 [ 9.610834] which lock already depends on the new lock. [ 9.610837] the existing dependency chain (in reverse order) is: [ 9.610839] -> #5 (&dev_priv->mm_lock){+.+.+.}: [ 9.610854] lock_acquire+0x46/0x60 [ 9.610861] __mutex_lock+0x90/0x7b5 [ 9.610867] mutex_lock_nested+0x16/0x18 [ 9.610872] i915_gem_userptr_init__mmu_notifier+0x85/0x213 [ 9.610878] i915_gem_userptr_ioctl+0x1cd/0x2b6 [ 9.610884] drm_ioctl+0x258/0x373 [ 9.610893] vfs_ioctl+0x13/0x2f [ 9.610899] do_vfs_ioctl+0x5eb/0x5fe [ 9.610905] SyS_ioctl+0x3e/0x5c [ 9.610913] entry_SYSCALL_64_fastpath+0x18/0xad [ 9.610915] -> #4 (&mm->mmap_sem){++++++}: [ 9.610926] lock_acquire+0x46/0x60 [ 9.610933] __might_fault+0x5c/0x7f [ 9.610939] filldir+0xb3/0x125 [ 9.610947] call_filldir+0xb9/0xde [ 9.610952] ext4_readdir+0x1ff/0x676 [ 9.610958] iterate_dir+0x93/0x13d [ 9.610964] SyS_getdents+0xa4/0x117 [ 9.610971] entry_SYSCALL_64_fastpath+0x18/0xad [ 9.610973] -> #3 (&type->i_mutex_dir_key#2){++++++}: [ 9.610986] lock_acquire+0x46/0x60 [ 9.610992] down_read+0x39/0x5d [ 9.610997] lookup_slow+0x7c/0x17f [ 9.611002] walk_component+0xcd/0x214 [ 9.611007] link_path_walk+0xfa/0x44a [ 9.611013] path_openat+0x213/0x6f9 [ 9.611018] do_filp_open+0x48/0x9e [ 9.611024] file_open_name+0xe7/0xe9 [ 9.611028] filp_open+0x2d/0x44 [ 9.611032] kernel_read_file_from_path+0x33/0x6c [ 9.611039] _request_firmware+0x39d/0x629 [ 9.611044] request_firmware_work_func+0x23/0x55 [ 9.611049] process_one_work+0x1c3/0x323 [ 9.611055] worker_thread+0x1ee/0x2c0 [ 9.611060] kthread+0x127/0x12f [ 9.611064] ret_from_fork+0x2e/0x40 [ 9.611066] -> #2 (umhelper_sem){++++.+}: [ 9.611077] lock_acquire+0x46/0x60 [ 9.611083] down_read+0x39/0x5d [ 9.611088] usermodehelper_read_trylock+0x51/0x100 [ 9.611092] _request_firmware+0x2dc/0x629 [ 9.611097] request_firmware_direct+0x36/0x48 [ 9.611103] request_microcode_fw+0x54/0x88 [ 9.611107] reload_store+0xaa/0x114 [ 9.611114] dev_attr_store+0x14/0x1e [ 9.611121] sysfs_kf_write+0x44/0x4b [ 9.611127] kernfs_fop_write+0x117/0x161 [ 9.611132] __vfs_write+0x21/0xe7 [ 9.611137] vfs_write+0xdc/0x165 [ 9.611142] SyS_write+0x4c/0x89 [ 9.611149] entry_SYSCALL_64_fastpath+0x18/0xad [ 9.611151] -> #1 (microcode_mutex){+.+.+.}: [ 9.611162] lock_acquire+0x46/0x60 [ 9.611167] __mutex_lock+0x90/0x7b5 [ 9.611173] mutex_lock_nested+0x16/0x18 [ 9.611181] microcode_init+0xb8/0x1d7 [ 9.611187] do_one_initcall+0x8b/0x121 [ 9.611192] kernel_init_freeable+0x139/0x1c2 [ 9.611197] kernel_init+0x9/0xe6 [ 9.611201] ret_from_fork+0x2e/0x40 [ 9.611203] -> #0 (cpu_hotplug_lock.rw_sem){++++++}: [ 9.611214] __lock_acquire+0xec4/0x1444 [ 9.611219] lock_acquire+0x46/0x60 [ 9.611226] get_online_cpus+0x38/0x98 [ 9.611231] apply_wqattrs_lock+0x9/0x19 [ 9.611237] apply_workqueue_attrs+0x15/0x2f [ 9.611244] __alloc_workqueue_key+0x2b2/0x457 [ 9.611250] i915_gem_userptr_init__mmu_notifier+0xfb/0x213 [ 9.611255] i915_gem_userptr_ioctl+0x1cd/0x2b6 [ 9.611260] drm_ioctl+0x258/0x373 [ 9.611266] vfs_ioctl+0x13/0x2f [ 9.611272] do_vfs_ioctl+0x5eb/0x5fe [ 9.611278] SyS_ioctl+0x3e/0x5c [ 9.611284] entry_SYSCALL_64_fastpath+0x18/0xad [ 9.611287] other info that might help us debug this: [ 9.611290] Chain exists of: cpu_hotplug_lock.rw_sem --> &mm->mmap_sem --> &dev_priv->mm_lock [ 9.611301] Possible unsafe locking scenario: [ 9.611304] CPU0 CPU1 [ 9.611306] ---- ---- [ 9.611308] lock(&dev_priv->mm_lock); [ 9.611314] lock(&mm->mmap_sem); [ 9.611319] lock(&dev_priv->mm_lock); [ 9.611324] lock(cpu_hotplug_lock.rw_sem); [ 9.611329] *** DEADLOCK *** [ 9.611333] 2 locks held by Xorg/341: [ 9.611336] #0: (&mm->mmap_sem){++++++}, at: [<ffffffff81312e62>] i915_gem_userptr_init__mmu_notifier+0x72/0x213 [ 9.611348] #1: (&dev_priv->mm_lock){+.+.+.}, at: [<ffffffff81312e75>] i915_gem_userptr_init__mmu_notifier+0x85/0x213 [ 9.611359] stack backtrace: [ 9.611365] CPU: 1 PID: 341 Comm: Xorg Not tainted 4.12.0-rc2-next-20170523-dbg-dirty #231 [ 9.611369] Call Trace: [ 9.611377] dump_stack+0x70/0x9a [ 9.611384] print_circular_bug+0x272/0x280 [ 9.611389] __lock_acquire+0xec4/0x1444 [ 9.611396] ? __lock_is_held+0x47/0x7a [ 9.611402] lock_acquire+0x46/0x60 [ 9.611408] ? lock_acquire+0x46/0x60 [ 9.611413] ? apply_wqattrs_lock+0x9/0x19 [ 9.611420] get_online_cpus+0x38/0x98 [ 9.611425] ? apply_wqattrs_lock+0x9/0x19 [ 9.611430] apply_wqattrs_lock+0x9/0x19 [ 9.611436] apply_workqueue_attrs+0x15/0x2f [ 9.611443] __alloc_workqueue_key+0x2b2/0x457 [ 9.611449] ? lockdep_init_map+0xb4/0x1a2 [ 9.611456] i915_gem_userptr_init__mmu_notifier+0xfb/0x213 [ 9.611462] i915_gem_userptr_ioctl+0x1cd/0x2b6 [ 9.611467] drm_ioctl+0x258/0x373 [ 9.611473] ? i915_gem_userptr_dmabuf_export+0x1a/0x1a [ 9.611480] ? _raw_spin_unlock+0x2c/0x3f [ 9.611486] ? find_held_lock+0x31/0x77 [ 9.611493] ? __fget+0x157/0x186 [ 9.611500] vfs_ioctl+0x13/0x2f [ 9.611506] do_vfs_ioctl+0x5eb/0x5fe [ 9.611512] ? __fget+0x174/0x186 [ 9.611519] SyS_ioctl+0x3e/0x5c [ 9.611527] entry_SYSCALL_64_fastpath+0x18/0xad [ 9.611531] RIP: 0033:0x7f3398207cb7 [ 9.611535] RSP: 002b:00007fff8f086f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 9.611542] RAX: ffffffffffffffda RBX: 00007f339a2f6460 RCX: 00007f3398207cb7 [ 9.611545] RDX: 00007fff8f087030 RSI: 00000000c0186473 RDI: 000000000000000b [ 9.611549] RBP: 00007fff8f087030 R08: 0000000001672010 R09: 000000000000007c [ 9.611552] R10: 000000000000009f R11: 0000000000000246 R12: 0000000001671000 [ 9.611556] R13: 000000000000000b R14: 00007f339a2f6460 R15: 00007f339a2f6000 -ss _______________________________________________ Intel-gfx mailing list Intel-gfx@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/intel-gfx