Hi Here is a boot process. udev: starting version 141 [ INFO: possible circular locking dependency detected ] 2.6.30-rc7-next-20090529-06589-g7701864 #6 ------------------------------------------------------- udevadm/708 is trying to acquire lock: (&mm->mmap_sem){++++++}, at: [<c0175962>] might_fault+0x52/0xa0 but task is already holding lock: (sysfs_mutex){+.+.+.}, at: [<c01d05e6>] sysfs_readdir+0x56/0x200 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (sysfs_mutex){+.+.+.}: [<c01503da>] __lock_acquire+0xcca/0x10b0 [<c0150834>] lock_acquire+0x74/0x90 [<c044f860>] __mutex_lock_common+0x50/0x430 [<c044fcf3>] mutex_lock_nested+0x33/0x40 [<c01d0a1c>] sysfs_addrm_start+0x2c/0xb0 [<c01d15b0>] create_dir+0x40/0x80 [<c01d161b>] sysfs_create_dir+0x2b/0x50 [<c02c7bc1>] kobject_add_internal+0xc1/0x220 [<c02c7e21>] kobject_add_varg+0x31/0x50 [<c02c7e9c>] kobject_add+0x2c/0x60 [<c033c321>] device_add+0xf1/0x560 [<c01ce485>] add_partition+0x135/0x240 [<c01ceb7f>] rescan_partitions+0x23f/0x320 [<c01b3103>] __blkdev_get+0x153/0x330 [<c01b32ea>] blkdev_get+0xa/0x10 [<c01ce32a>] register_disk+0x10a/0x130 [<c02c1e09>] add_disk+0xd9/0x130 [<c03531ca>] sd_probe_async+0x19a/0x280 [<c01444b0>] async_thread+0xd0/0x230 [<c013e3f3>] kthread+0x43/0x80 [<c0103677>] kernel_thread_helper+0x7/0x10 [<ffffffff>] 0xffffffff -> #2 (&bdev->bd_mutex){+.+.+.}: [<c01503da>] __lock_acquire+0xcca/0x10b0 [<c0150834>] lock_acquire+0x74/0x90 [<c044f860>] __mutex_lock_common+0x50/0x430 [<c044fcf3>] mutex_lock_nested+0x33/0x40 [<c01b2fe3>] __blkdev_get+0x33/0x330 [<c01b32ea>] blkdev_get+0xa/0x10 [<c01b3451>] open_by_devnum+0x21/0x50 [<c02027ae>] journal_init+0x22e/0x19a0 [<c01ee1c1>] reiserfs_fill_super+0x3b1/0x1020 [<c018ebab>] get_sb_bdev+0x12b/0x150 [<c01ec441>] get_super_block+0x21/0x30 [<c018db6a>] vfs_kern_mount+0x3a/0xa0 [<c018dc29>] do_kern_mount+0x39/0xd0 [<c01a3cf8>] do_mount+0x3b8/0x770 [<c01a4134>] sys_mount+0x84/0xb0 [<c0706c5e>] mount_block_root+0xd1/0x25e [<c0706e44>] mount_root+0x59/0x5f [<c0706f3a>] prepare_namespace+0xf0/0x16c [<c070650b>] kernel_init+0xd8/0xf1 [<c0103677>] kernel_thread_helper+0x7/0x10 [<ffffffff>] 0xffffffff -> #1 (&REISERFS_SB(s)->lock){+.+.+.}: [<c01503da>] __lock_acquire+0xcca/0x10b0 [<c0150834>] lock_acquire+0x74/0x90 [<c044f860>] __mutex_lock_common+0x50/0x430 [<c044fcf3>] mutex_lock_nested+0x33/0x40 [<c02072ae>] reiserfs_write_lock_once+0x1e/0x40 [<c01e2b46>] reiserfs_get_block+0x66/0x1530 [<c01b54d0>] do_mpage_readpage+0x340/0x490 [<c01b5726>] mpage_readpages+0xa6/0xe0 [<c01dff19>] reiserfs_readpages+0x19/0x20 [<c016b21f>] __do_page_cache_readahead+0x13f/0x200 [<c016b32e>] do_page_cache_readahead+0x4e/0x70 [<c01647ff>] filemap_fault+0x30f/0x430 [<c017797d>] __do_fault+0x3d/0x3a0 [<c0178590>] handle_mm_fault+0x100/0x590 [<c011be51>] do_page_fault+0x121/0x280 [<c0451bfa>] error_code+0x6a/0x70 [<c01c2fc0>] load_elf_binary+0x9d0/0x19f0 [<c0191913>] search_binary_handler+0x163/0x2f0 [<c0191c9d>] do_execve+0x1fd/0x270 [<c01016de>] sys_execve+0x3e/0x70 [<c0102ec9>] syscall_call+0x7/0xb [<ffffffff>] 0xffffffff -> #0 (&mm->mmap_sem){++++++}: [<c015048e>] __lock_acquire+0xd7e/0x10b0 [<c0150834>] lock_acquire+0x74/0x90 [<c0175993>] might_fault+0x83/0xa0 [<c02cef26>] copy_to_user+0x36/0x130 [<c0199a34>] filldir64+0xa4/0xf0 [<c01d06a6>] sysfs_readdir+0x116/0x200 [<c0199cae>] vfs_readdir+0x7e/0xa0 [<c0199d39>] sys_getdents64+0x69/0xb0 [<c0102e48>] sysenter_do_call+0x12/0x36 [<ffffffff>] 0xffffffff other info that might help us debug this: 2 locks held by udevadm/708: #0: (&type->i_mutex_dir_key){+.+.+.}, at: [<c0199c7f>] vfs_readdir+0x4f/0xa0 #1: (sysfs_mutex){+.+.+.}, at: [<c01d05e6>] sysfs_readdir+0x56/0x200 stack backtrace: Pid: 708, comm: udevadm Not tainted 2.6.30-rc7-next-20090529-06589-g7701864 #6 Call Trace: [<c044e812>] ? printk+0x18/0x1e [<c014e53c>] print_circular_bug_tail+0x8c/0xe0 [<c014ce8b>] ? print_circular_bug_entry+0x4b/0x50 [<c015048e>] __lock_acquire+0xd7e/0x10b0 [<c0175962>] ? might_fault+0x52/0xa0 [<c0150834>] lock_acquire+0x74/0x90 [<c0175962>] ? might_fault+0x52/0xa0 [<c0175993>] might_fault+0x83/0xa0 [<c0175962>] ? might_fault+0x52/0xa0 [<c02cef26>] copy_to_user+0x36/0x130 [<c0199a34>] filldir64+0xa4/0xf0 [<c01d06a6>] sysfs_readdir+0x116/0x200 [<c0199990>] ? filldir64+0x0/0xf0 [<c0199cae>] vfs_readdir+0x7e/0xa0 [<c0199990>] ? filldir64+0x0/0xf0 [<c0199d39>] sys_getdents64+0x69/0xb0 [<c0102e48>] sysenter_do_call+0x12/0x36 -- To unsubscribe from this list: send the line "unsubscribe linux-next" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html