[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen Linux deadlock
On 07/06/17 17:05, Andre Przywara wrote: > Hi, > > when booting Linux 4.12-rc4 as Dom0 under a recent Xen HV I saw the > following lockdep splat after running xencommons start: > > root@junor1:~# bash /etc/init.d/xencommons start > Setting domain 0 name, domid and JSON config... > [ 247.979498] ====================================================== > [ 247.985688] WARNING: possible circular locking dependency detected > [ 247.991882] 4.12.0-rc4-00022-gc4b25c0 #575 Not tainted > [ 247.997040] ------------------------------------------------------ > [ 248.003232] xenbus/91 is trying to acquire lock: > [ 248.007875] (&u->msgbuffer_mutex){+.+.+.}, at: [<ffff00000863e904>] > xenbus_dev_queue_reply+0x3c/0x230 > [ 248.017163] > [ 248.017163] but task is already holding lock: > [ 248.023096] (xb_write_mutex){+.+...}, at: [<ffff00000863a940>] > xenbus_thread+0x5f0/0x798 > [ 248.031267] > [ 248.031267] which lock already depends on the new lock. > [ 248.031267] > [ 248.039615] > [ 248.039615] the existing dependency chain (in reverse order) is: > [ 248.047176] > [ 248.047176] -> #1 (xb_write_mutex){+.+...}: > [ 248.052943] __lock_acquire+0x1728/0x1778 > [ 248.057498] lock_acquire+0xc4/0x288 > [ 248.061630] __mutex_lock+0x84/0x868 > [ 248.065755] mutex_lock_nested+0x3c/0x50 > [ 248.070227] xs_send+0x164/0x1f8 > [ 248.074015] xenbus_dev_request_and_reply+0x6c/0x88 > [ 248.079427] xenbus_file_write+0x260/0x420 > [ 248.084073] __vfs_write+0x48/0x138 > [ 248.088113] vfs_write+0xa8/0x1b8 > [ 248.091983] SyS_write+0x54/0xb0 > [ 248.095768] el0_svc_naked+0x24/0x28 > [ 248.099897] > [ 248.099897] -> #0 (&u->msgbuffer_mutex){+.+.+.}: > [ 248.106088] print_circular_bug+0x80/0x2e0 > [ 248.110730] __lock_acquire+0x1768/0x1778 > [ 248.115288] lock_acquire+0xc4/0x288 > [ 248.119417] __mutex_lock+0x84/0x868 > [ 248.123545] mutex_lock_nested+0x3c/0x50 > [ 248.128016] xenbus_dev_queue_reply+0x3c/0x230 > [ 248.133005] xenbus_thread+0x788/0x798 > [ 248.137306] kthread+0x110/0x140 > [ 248.141087] ret_from_fork+0x10/0x40 > [ 248.145214] > [ 248.145214] other info that might help us debug this: > [ 248.145214] > [ 248.153383] Possible unsafe locking scenario: > [ 248.153383] > [ 248.159403] CPU0 CPU1 > [ 248.163960] ---- ---- > [ 248.168518] lock(xb_write_mutex); > [ 248.172045] lock(&u->msgbuffer_mutex); > [ 248.178500] lock(xb_write_mutex); > [ 248.184514] lock(&u->msgbuffer_mutex); > [ 248.188470] > [ 248.188470] *** DEADLOCK *** > [ 248.188470] > [ 248.194578] 2 locks held by xenbus/91: > [ 248.198360] #0: (xs_response_mutex){+.+...}, at: > [<ffff00000863a7b0>] xenbus_thread+0x460/0x798 > [ 248.207218] #1: (xb_write_mutex){+.+...}, at: [<ffff00000863a940>] > xenbus_thread+0x5f0/0x798 > [ 248.215818] > [ 248.215818] stack backtrace: > [ 248.220293] CPU: 0 PID: 91 Comm: xenbus Not tainted > 4.12.0-rc4-00022-gc4b25c0 #575 > [ 248.227858] Hardware name: ARM Juno development board (r1) (DT) > [ 248.233792] Call trace: > [ 248.236289] [<ffff00000808a748>] dump_backtrace+0x0/0x270 > [ 248.241707] [<ffff00000808aa94>] show_stack+0x24/0x30 > [ 248.246782] [<ffff0000084caa98>] dump_stack+0xb8/0xf0 > [ 248.251859] [<ffff000008139068>] print_circular_bug+0x1f8/0x2e0 > [ 248.257787] [<ffff00000813c090>] __lock_acquire+0x1768/0x1778 > [ 248.263548] [<ffff00000813c90c>] lock_acquire+0xc4/0x288 > [ 248.268882] [<ffff000008bdb28c>] __mutex_lock+0x84/0x868 > [ 248.274219] [<ffff000008bdbaac>] mutex_lock_nested+0x3c/0x50 > [ 248.279889] [<ffff00000863e904>] xenbus_dev_queue_reply+0x3c/0x230 > [ 248.286081] [<ffff00000863aad8>] xenbus_thread+0x788/0x798 > [ 248.291585] [<ffff000008108070>] kthread+0x110/0x140 > [ 248.296572] [<ffff000008083710>] ret_from_fork+0x10/0x40 > > Apparently it's not easily reproducible, but Julien confirmed that the > dead lock condition as reported above is indeed in the Linux code. > > Does anyone has an idea of how to fix this? Shouldn't be too hard. The xb_write_mutex can be dropped earlier in the critical path. I'll send a patch. Juergen _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |