Report in unix_stream_sendmsg()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[    7.008968] ===================================================
[    7.008973] DEPT: Circular dependency has been detected.
[    7.008974] 5.17.0-rc1-00014-gcf3441bb2012 #2 Tainted: G        W        
[    7.008975] ---------------------------------------------------
[    7.008976] summary
[    7.008976] ---------------------------------------------------
[    7.008980] *** DEADLOCK ***
[    7.008980] 
[    7.008981] context A
[    7.008982]     [S] (unknown)(&(&ei->socket.wq.wait)->dmap:0)
[    7.008983]     [W] __raw_spin_lock(&u->lock:0)
[    7.008984]     [E] event(&(&ei->socket.wq.wait)->dmap:0)
[    7.008986] 
[    7.008986] context B
[    7.008987]     [S] __raw_spin_lock(&u->lock:0)
[    7.008988]     [W] wait(&(&ei->socket.wq.wait)->dmap:0)
[    7.008989]     [E] spin_unlock(&u->lock:0)
[    7.008990] 
[    7.008991] [S]: start of the event context
[    7.008991] [W]: the wait blocked
[    7.008992] [E]: the event not reachable
[    7.008992] ---------------------------------------------------
[    7.008993] context A's detail
[    7.008994] ---------------------------------------------------
[    7.008994] context A
[    7.008995]     [S] (unknown)(&(&ei->socket.wq.wait)->dmap:0)
[    7.008996]     [W] __raw_spin_lock(&u->lock:0)
[    7.008997]     [E] event(&(&ei->socket.wq.wait)->dmap:0)
[    7.008998] 
[    7.008999] [S] (unknown)(&(&ei->socket.wq.wait)->dmap:0):
[    7.009000] (N/A)
[    7.009000] 
[    7.009001] [W] __raw_spin_lock(&u->lock:0):
[    7.009002] [<ffffffff81aa5c24>] unix_stream_sendmsg+0x294/0x590
[    7.009006] stacktrace:
[    7.009007]       _raw_spin_lock+0x4b/0x90
[    7.009010]       unix_stream_sendmsg+0x294/0x590
[    7.009011]       sock_sendmsg+0x56/0x60
[    7.009015]       sock_write_iter+0x82/0xe0
[    7.009017]       new_sync_write+0x16d/0x190
[    7.009020]       vfs_write+0x134/0x360
[    7.009022]       ksys_write+0xa6/0xc0
[    7.009023]       do_syscall_64+0x3a/0x90
[    7.009026]       entry_SYSCALL_64_after_hwframe+0x44/0xae
[    7.009028] 
[    7.009028] [E] event(&(&ei->socket.wq.wait)->dmap:0):
[    7.009029] [<ffffffff810baa53>] __wake_up_common+0x93/0x1a0
[    7.009031] stacktrace:
[    7.009032]       dept_event+0x12b/0x1f0
[    7.009035]       __wake_up_common+0xb0/0x1a0
[    7.009036]       __wake_up_common_lock+0x65/0x90
[    7.009037]       sock_def_readable+0x5c/0xe0
[    7.009040]       unix_stream_sendmsg+0x19a/0x590
[    7.009041]       sock_sendmsg+0x56/0x60
[    7.009043]       sock_write_iter+0x82/0xe0
[    7.009045]       new_sync_write+0x16d/0x190
[    7.009047]       vfs_write+0x134/0x360
[    7.009049]       ksys_write+0xa6/0xc0
[    7.009050]       do_syscall_64+0x3a/0x90
[    7.009052]       entry_SYSCALL_64_after_hwframe+0x44/0xae
[    7.009054] ---------------------------------------------------
[    7.009054] context B's detail
[    7.009055] ---------------------------------------------------
[    7.009057] context B
[    7.009057]     [S] __raw_spin_lock(&u->lock:0)
[    7.009059]     [W] wait(&(&ei->socket.wq.wait)->dmap:0)
[    7.009060]     [E] spin_unlock(&u->lock:0)
[    7.009061] 
[    7.009061] [S] __raw_spin_lock(&u->lock:0):
[    7.009062] [<ffffffff81aa451f>] unix_stream_read_generic+0x6bf/0xb60
[    7.009066] stacktrace:
[    7.009067]       _raw_spin_lock+0x6e/0x90
[    7.009068]       unix_stream_read_generic+0x6bf/0xb60
[    7.009071]       unix_stream_recvmsg+0x40/0x50
[    7.009073]       sock_read_iter+0x85/0xd0
[    7.009074]       new_sync_read+0x162/0x180
[    7.009076]       vfs_read+0xf3/0x190
[    7.009078]       ksys_read+0xa6/0xc0
[    7.009079]       do_syscall_64+0x3a/0x90
[    7.009081]       entry_SYSCALL_64_after_hwframe+0x44/0xae
[    7.009083] 
[    7.009084] [W] wait(&(&ei->socket.wq.wait)->dmap:0):
[    7.009085] [<ffffffff810bb017>] prepare_to_wait+0x47/0xd0
[    7.009087] stacktrace:
[    7.009087]       unix_stream_read_generic+0x6fa/0xb60
[    7.009089]       unix_stream_recvmsg+0x40/0x50
[    7.009091]       sock_read_iter+0x85/0xd0
[    7.009093]       new_sync_read+0x162/0x180
[    7.009095]       vfs_read+0xf3/0x190
[    7.009097]       ksys_read+0xa6/0xc0
[    7.009098]       do_syscall_64+0x3a/0x90
[    7.009100]       entry_SYSCALL_64_after_hwframe+0x44/0xae
[    7.009102] 
[    7.009102] [E] spin_unlock(&u->lock:0):
[    7.009103] [<ffffffff81aa45df>] unix_stream_read_generic+0x77f/0xb60
[    7.009106] stacktrace:
[    7.009107]       _raw_spin_unlock+0x30/0x70
[    7.009108]       unix_stream_read_generic+0x77f/0xb60
[    7.009110]       unix_stream_recvmsg+0x40/0x50
[    7.009113]       sock_read_iter+0x85/0xd0
[    7.009114]       new_sync_read+0x162/0x180
[    7.009116]       vfs_read+0xf3/0x190
[    7.009118]       ksys_read+0xa6/0xc0
[    7.009119]       do_syscall_64+0x3a/0x90
[    7.009121]       entry_SYSCALL_64_after_hwframe+0x44/0xae
[    7.009123] ---------------------------------------------------
[    7.009124] information that might be helpful
[    7.009124] ---------------------------------------------------
[    7.009125] CPU: 2 PID: 641 Comm: avahi-daemon Tainted: G        W         5.17.0-rc1-00014-gcf3441bb2012 #2
[    7.009128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
[    7.009129] Call Trace:
[    7.009130]  <TASK>
[    7.009131]  dump_stack_lvl+0x44/0x57
[    7.009134]  print_circle+0x384/0x510
[    7.009136]  ? print_circle+0x510/0x510
[    7.009138]  cb_check_dl+0x58/0x60
[    7.009139]  bfs+0xdc/0x1b0
[    7.009142]  add_dep+0x94/0x120
[    7.009144]  do_event.isra.22+0x284/0x300
[    7.009146]  ? __wake_up_common+0x93/0x1a0
[    7.009147]  dept_event+0x12b/0x1f0
[    7.009149]  __wake_up_common+0xb0/0x1a0
[    7.009151]  __wake_up_common_lock+0x65/0x90
[    7.009153]  sock_def_readable+0x5c/0xe0
[    7.009155]  unix_stream_sendmsg+0x19a/0x590
[    7.009158]  sock_sendmsg+0x56/0x60
[    7.009160]  sock_write_iter+0x82/0xe0
[    7.009163]  new_sync_write+0x16d/0x190
[    7.009166]  vfs_write+0x134/0x360
[    7.009169]  ksys_write+0xa6/0xc0
[    7.009170]  ? trace_hardirqs_on+0x38/0xe0
[    7.009173]  do_syscall_64+0x3a/0x90
[    7.009175]  entry_SYSCALL_64_after_hwframe+0x44/0xae



[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux