lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 25 Oct 2011 14:48:01 +0200
From:	Pawel Sikora <pluto@...k.net>
To:	linux-kernel@...r.kernel.org
Cc:	torvalds@...ux-foundation.org, viro@...iv.linux.org.uk,
	raven@...maw.net, arekm@...-linux.org
Subject: INFO: possible recursive locking detected: autofs4_expire_indirect()

Hi,

the nfs client/server with fresh 3.0.8 + vserver + enabled debug options reports attached info.
afaics, the vserver doesn't change autofs code, so it looks like a pure vanilla problem.

BR,
Paweł.

[ 3708.715749] =============================================
[ 3708.715940] [ INFO: possible recursive locking detected ]
[ 3708.716040] 3.0.8-vs2.3.1-dirty #6
[ 3708.716131] ---------------------------------------------
[ 3708.716230] automount/29215 is trying to acquire lock:
[ 3708.716301]  (&(&dentry->d_lock)->rlock/1){+.+...}, at: [<ffffffffa0214fb0>] autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]
[ 3708.716301] but task is already holding lock:
[ 3708.716301]  (&(&dentry->d_lock)->rlock/1){+.+...}, at: [<ffffffffa0214fb0>] autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]
[ 3708.716301] other info that might help us debug this:
[ 3708.716301]  Possible unsafe locking scenario:
[ 3708.716301]
[ 3708.716301]        CPU0
[ 3708.716301]        ----
[ 3708.716301]   lock(&(&dentry->d_lock)->rlock);
[ 3708.716301]   lock(&(&dentry->d_lock)->rlock);
[ 3708.716301]
[ 3708.716301]  *** DEADLOCK ***
[ 3708.716301]
[ 3708.716301]  May be due to missing lock nesting notation
[ 3708.716301]
[ 3708.716301] 2 locks held by automount/29215:
[ 3708.716301]  #0:  (&(&sbi->lookup_lock)->rlock){+.+...}, at: [<ffffffffa0214f61>] autofs4_expire_indirect+0x91/0x4e0 [autofs4]
[ 3708.716301]  #1:  (&(&dentry->d_lock)->rlock/1){+.+...}, at: [<ffffffffa0214fb0>] autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]
[ 3708.716301] stack backtrace:
[ 3708.716301] Pid: 29215, comm: automount Not tainted 3.0.8-vs2.3.1-dirty #6
[ 3708.716301] Call Trace:
[ 3708.716301]  [<ffffffff810925d6>] __lock_acquire+0x1606/0x1b50
[ 3708.716301]  [<ffffffffa0214fb0>] ? autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffff81092c6a>] ? lock_release_non_nested+0x14a/0x310
[ 3708.716301]  [<ffffffffa0214fb0>] ? autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffffa0214fb0>] ? autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffff810930c5>] lock_acquire+0x85/0x110
[ 3708.716301]  [<ffffffffa0214fb0>] ? autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffffa02151bd>] ? autofs4_expire_indirect+0x2ed/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffff81453c1a>] _raw_spin_lock_nested+0x2a/0x40
[ 3708.716301]  [<ffffffffa0214fb0>] ? autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffff81454386>] ? _raw_spin_unlock+0x26/0x30
[ 3708.716301]  [<ffffffff8110f830>] ? might_fault+0x40/0x90
[ 3708.716301]  [<ffffffffa0214fb0>] autofs4_expire_indirect+0xe0/0x4e0 [autofs4]
[ 3708.716301]  [<ffffffffa021568d>] autofs4_do_expire_multi+0xed/0x130 [autofs4]
[ 3708.716301]  [<ffffffffa0215a70>] ? autofs_dev_ioctl_askumount+0x30/0x30 [autofs4]
[ 3708.716301]  [<ffffffffa0215a8a>] autofs_dev_ioctl_expire+0x1a/0x20 [autofs4]
[ 3708.716301]  [<ffffffffa0216063>] _autofs_dev_ioctl+0x273/0x360 [autofs4]
[ 3708.716301]  [<ffffffffa021615e>] autofs_dev_ioctl+0xe/0x20 [autofs4]
[ 3708.716301]  [<ffffffff8115dc56>] do_vfs_ioctl+0x96/0x560
[ 3708.716301]  [<ffffffff8114c289>] ? fget_light+0x99/0x130
[ 3708.716301]  [<ffffffff8114c227>] ? fget_light+0x37/0x130
[ 3708.716301]  [<ffffffff8115e1b1>] sys_ioctl+0x91/0xa0
[ 3708.716301]  [<ffffffff8145bdbb>] system_call_fastpath+0x16/0x1b

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ