[Bug 103856] New: [CI] igt at perf_pmu - dmesg-warn - WARNING: possible circular locking dependency detected
bugzilla-daemon at freedesktop.org
bugzilla-daemon at freedesktop.org
Thu Nov 23 07:17:56 UTC 2017
https://bugs.freedesktop.org/show_bug.cgi?id=103856
Bug ID: 103856
Summary: [CI] igt at perf_pmu - dmesg-warn - WARNING: possible
circular locking dependency detected
Product: DRI
Version: DRI git
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: medium
Component: DRM/Intel
Assignee: intel-gfx-bugs at lists.freedesktop.org
Reporter: marta.lofstedt at intel.com
QA Contact: intel-gfx-bugs at lists.freedesktop.org
CC: intel-gfx-bugs at lists.freedesktop.org
https://intel-gfx-ci.01.org/tree/drm-tip/IGT_4004/shard-snb3/igt@perf_pmu@other-read-0.html
https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_3372/shard-apl7/igt@perf_pmu@other-read-0.html
https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_3372/shard-glkb6/igt@perf_pmu@other-read-0.html
https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_3372/shard-hsw4/igt@perf_pmu@other-read-0.html
https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_3372/shard-kbl3/igt@perf_pmu@other-read-0.html
[ 376.994271] ======================================================
[ 376.994277] WARNING: possible circular locking dependency detected
[ 376.994285] 4.14.0-CI-CI_DRM_3372+ #1 Tainted: G U
[ 376.994290] ------------------------------------------------------
[ 376.994296] perf_pmu/1704 is trying to acquire lock:
[ 376.994301] (&mm->mmap_sem){++++}, at: [<ffffffff811bfe1e>]
__might_fault+0x3e/0x90
[ 376.994318]
but task is already holding lock:
[ 376.994323] (&cpuctx_mutex){+.+.}, at: [<ffffffff8116fe8c>]
perf_event_ctx_lock_nested+0xbc/0x1d0
[ 376.994337]
which lock already depends on the new lock.
[ 376.994344]
the existing dependency chain (in reverse order) is:
[ 376.994351]
-> #4 (&cpuctx_mutex){+.+.}:
[ 376.994363] __mutex_lock+0x86/0x9b0
[ 376.994369] perf_event_init_cpu+0x5a/0x90
[ 376.994376] perf_event_init+0x178/0x1a4
[ 376.994384] start_kernel+0x27f/0x3f1
[ 376.994391] verify_cpu+0x0/0xfb
[ 376.994395]
-> #3 (pmus_lock){+.+.}:
[ 376.994405] __mutex_lock+0x86/0x9b0
[ 376.994412] perf_event_init_cpu+0x21/0x90
[ 376.994418] cpuhp_invoke_callback+0xca/0xc00
[ 376.994424] _cpu_up+0xa7/0x170
[ 376.994429] do_cpu_up+0x57/0x70
[ 376.994435] smp_init+0x62/0xa6
[ 376.994441] kernel_init_freeable+0x97/0x193
[ 376.994448] kernel_init+0xa/0x100
[ 376.994454] ret_from_fork+0x27/0x40
[ 376.994458]
-> #2 (cpu_hotplug_lock.rw_sem){++++}:
[ 376.994469] cpus_read_lock+0x39/0xa0
[ 376.994476] apply_workqueue_attrs+0x12/0x50
[ 376.994483] __alloc_workqueue_key+0x1d8/0x4d8
[ 376.994548] i915_gem_init_userptr+0x5f/0x80 [i915]
[ 376.994600] i915_gem_init+0x7c/0x390 [i915]
[ 376.994645] i915_driver_load+0x99e/0x15c0 [i915]
[ 376.994691] i915_pci_probe+0x33/0x90 [i915]
[ 376.994700] pci_device_probe+0xa1/0x130
[ 376.994707] driver_probe_device+0x293/0x440
[ 376.994713] __driver_attach+0xde/0xe0
[ 376.994719] bus_for_each_dev+0x5c/0x90
[ 376.994726] bus_add_driver+0x16d/0x260
[ 376.994732] driver_register+0x57/0xc0
[ 376.994737] do_one_initcall+0x3e/0x160
[ 376.994744] do_init_module+0x5b/0x1fa
[ 376.994750] load_module+0x2374/0x2dc0
[ 376.994756] SyS_finit_module+0xaa/0xe0
[ 376.994762] do_syscall_64+0x5e/0x170
[ 376.994768] return_from_SYSCALL_64+0x0/0x7a
[ 376.994772]
-> #1 (&dev->struct_mutex){+.+.}:
[ 376.994784] __mutex_lock+0x86/0x9b0
[ 376.994833] i915_mutex_lock_interruptible+0x4c/0x130 [i915]
[ 376.994908] i915_gem_fault+0x206/0x760 [i915]
[ 376.994920] __do_fault+0x1a/0x70
[ 376.994927] __handle_mm_fault+0x9b0/0xdb0
[ 376.994935] handle_mm_fault+0x154/0x300
[ 376.994943] __do_page_fault+0x2d6/0x570
[ 376.994951] page_fault+0x22/0x30
[ 376.994957]
-> #0 (&mm->mmap_sem){++++}:
[ 376.994973] lock_acquire+0xaf/0x200
[ 376.994981] __might_fault+0x68/0x90
[ 376.994989] _copy_to_user+0x1e/0x70
[ 376.994997] perf_read+0x1aa/0x290
[ 376.995005] __vfs_read+0x23/0x120
[ 376.995012] vfs_read+0xa3/0x150
[ 376.995019] SyS_read+0x45/0xb0
[ 376.995027] entry_SYSCALL_64_fastpath+0x1c/0xb1
[ 376.995033]
other info that might help us debug this:
[ 376.995045] Chain exists of:
&mm->mmap_sem --> pmus_lock --> &cpuctx_mutex
[ 376.995064] Possible unsafe locking scenario:
[ 376.995072] CPU0 CPU1
[ 376.995078] ---- ----
[ 376.995084] lock(&cpuctx_mutex);
[ 376.995092] lock(pmus_lock);
[ 376.995104] lock(&cpuctx_mutex);
[ 376.995113] lock(&mm->mmap_sem);
[ 376.995121]
*** DEADLOCK ***
[ 376.995131] 1 lock held by perf_pmu/1704:
[ 376.995137] #0: (&cpuctx_mutex){+.+.}, at: [<ffffffff8116fe8c>]
perf_event_ctx_lock_nested+0xbc/0x1d0
[ 376.995155]
stack backtrace:
[ 376.995165] CPU: 1 PID: 1704 Comm: perf_pmu Tainted: G U
4.14.0-CI-CI_DRM_3372+ #1
[ 376.995176] Hardware name: /NUC6CAYB, BIOS
AYAPLCEL.86A.0040.2017.0619.1722 06/19/2017
[ 376.995187] Call Trace:
[ 376.995197] dump_stack+0x5f/0x86
[ 376.995207] print_circular_bug.isra.18+0x1d0/0x2c0
[ 376.995217] __lock_acquire+0x19c3/0x1b60
[ 376.995227] ? generic_exec_single+0x77/0xe0
[ 376.995237] ? lock_acquire+0xaf/0x200
[ 376.995245] lock_acquire+0xaf/0x200
[ 376.995254] ? __might_fault+0x3e/0x90
[ 376.995263] __might_fault+0x68/0x90
[ 376.995271] ? __might_fault+0x3e/0x90
[ 376.995280] _copy_to_user+0x1e/0x70
[ 376.995288] perf_read+0x1aa/0x290
[ 376.995298] __vfs_read+0x23/0x120
[ 376.995307] ? entry_SYSCALL_64_fastpath+0x5/0xb1
[ 376.995316] vfs_read+0xa3/0x150
[ 376.995324] SyS_read+0x45/0xb0
[ 376.995332] entry_SYSCALL_64_fastpath+0x1c/0xb1
[ 376.995341] RIP: 0033:0x7f4bf6e9a6d0
[ 376.995347] RSP: 002b:00007fffbff1f938 EFLAGS: 00000246 ORIG_RAX:
0000000000000000
[ 376.995359] RAX: ffffffffffffffda RBX: ffffc900006bfff0 RCX:
00007f4bf6e9a6d0
[ 376.995368] RDX: 0000000000000010 RSI: 00007fffbff1f940 RDI:
0000000000000005
[ 376.995377] RBP: 0000000000000005 R08: 0000565219788560 R09:
0000000000000000
[ 376.995386] R10: 0000000000000073 R11: 0000000000000246 R12:
0000000000000046
[ 376.995395] R13: 00007fffbff21100 R14: 0000000000000000 R15:
0000000000000000
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.freedesktop.org/archives/intel-gfx-bugs/attachments/20171123/c1c66c0d/attachment-0001.html>
More information about the intel-gfx-bugs
mailing list