Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [ 57.926059] BUG: sleeping function called from invalid context at net/core/sock.c:2433
- [ 57.926948] in_atomic(): 1, irqs_disabled(): 0, pid: 4, name: kworker/0:0
- [ 58.045835]
- [ 58.046065] ======================================================
- [ 58.046742] [ INFO: possible circular locking dependency detected ]
- [ 58.047406] 4.4.8+ #10 Tainted: G W O
- [ 58.047891] -------------------------------------------------------
- [ 58.048559] runTests/1286 is trying to acquire lock:
- [ 58.049191] (&pipe->mutex/1){+.+.+.}, at: [<ffffffff81277fd7>] pipe_lock_nested+0x17/0x1a
- [ 58.050437]
- [ 58.050437] but task is already holding lock:
- [ 58.051255] (sk_lock-AF_DECnet){+.+.+.}, at: [<ffffffffc0000840>] lock_sock+0x1d/0x20 [af_ktls]
- [ 58.052545]
- [ 58.052545] which lock already depends on the new lock.
- [ 58.052545]
- [ 58.053585]
- [ 58.053585] the existing dependency chain (in reverse order) is:
- [ 58.054369]
- -> #1 (sk_lock-AF_DECnet){+.+.+.}:
- [ 58.054920] [<ffffffff81107d7e>] check_prevs_add+0xb7/0x17f
- [ 58.055580] [<ffffffff81108366>] validate_chain+0x520/0x5cf
- [ 58.056237] [<ffffffff8110b901>] __lock_acquire+0xa5c/0xb5d
- [ 58.056896] [<ffffffff8110bbd5>] lock_acquire+0x1d3/0x200
- [ 58.057536] [<ffffffff817f40a7>] lock_sock_nested+0x92/0xae
- [ 58.058209] [<ffffffffc0000840>] lock_sock+0x1d/0x20 [af_ktls]
- [ 58.058899] [<ffffffffc0003be7>] tls_sendpage+0x4b/0x2bd [af_ktls]
- [ 58.059613] [<ffffffff817f0b1b>] kernel_sendpage+0x1b/0x24
- [ 58.060260] [<ffffffff817f0b56>] sock_sendpage+0x32/0x36
- [ 58.060888] [<ffffffff812a6127>] pipe_to_sendpage+0x73/0x90
- [ 58.061542] [<ffffffff812a6007>] splice_from_pipe_feed+0x81/0x12e
- [ 58.062226] [<ffffffff812a67ea>] __splice_from_pipe+0x5b/0x82
- [ 58.062879] [<ffffffff812a86d1>] splice_from_pipe+0x5e/0x89
- [ 58.063511] [<ffffffff812a8711>] generic_splice_sendpage+0x15/0x17
- [ 58.064248] [<ffffffff812a5f62>] do_splice_from+0x22/0x24
- [ 58.064863] [<ffffffff812a78e7>] do_splice+0x185/0x362
- [ 58.065479] [<ffffffff812a89c4>] SyS_splice+0x92/0xf2
- [ 58.066048] [<ffffffff819460f6>] entry_SYSCALL_64_fastpath+0x16/0x76
- [ 58.066739]
- -> #0 (&pipe->mutex/1){+.+.+.}:
- [ 58.067227] [<ffffffff81107526>] check_prev_add+0x174/0x915
- [ 58.067841] [<ffffffff81107d7e>] check_prevs_add+0xb7/0x17f
- [ 58.068461] [<ffffffff81108366>] validate_chain+0x520/0x5cf
- [ 58.069072] [<ffffffff8110b901>] __lock_acquire+0xa5c/0xb5d
- [ 58.069685] [<ffffffff8110bbd5>] lock_acquire+0x1d3/0x200
- [ 58.070298] [<ffffffff81941dd1>] mutex_lock_nested+0x92/0x3e3
- [ 58.070912] [<ffffffff81277fd7>] pipe_lock_nested+0x17/0x1a
- [ 58.071507] [<ffffffff81277fed>] pipe_lock+0x13/0x15
- [ 58.072046] [<ffffffff812a6365>] splice_to_pipe+0x2e/0x25a
- [ 58.072634] [<ffffffffc0003314>] tls_splice_read+0x643/0x723 [af_ktls]
- [ 58.073316] [<ffffffff817edd54>] sock_splice_read+0x22/0x2e
- [ 58.073913] [<ffffffff812a6cc2>] do_splice_to+0x6f/0x84
- [ 58.074475] [<ffffffff812a79cb>] do_splice+0x269/0x362
- [ 58.075031] [<ffffffff812a89c4>] SyS_splice+0x92/0xf2
- [ 58.075581] [<ffffffff819460f6>] entry_SYSCALL_64_fastpath+0x16/0x76
- [ 58.076225]
- [ 58.076225] other info that might help us debug this:
- [ 58.076225]
- [ 58.076952] Possible unsafe locking scenario:
- [ 58.076952]
- [ 58.077490] CPU0 CPU1
- [ 58.077944] ---- ----
- [ 58.078362] lock(sk_lock-AF_DECnet);
- [ 58.078740] lock(&pipe->mutex/1);
- [ 58.079339] lock(sk_lock-AF_DECnet);
- [ 58.079947] lock(&pipe->mutex/1);
- [ 58.080333]
- [ 58.080333] *** DEADLOCK ***
- [ 58.080333]
- [ 58.080878] 2 locks held by runTests/1286:
- [ 58.081256] #0: (&tsk->rx_lock){+.+.+.}, at: [<ffffffffc0002d99>] tls_splice_read+0xc8/0x723 [af_ktls]
- [ 58.082175] #1: (sk_lock-AF_DECnet){+.+.+.}, at: [<ffffffffc0000840>] lock_sock+0x1d/0x20 [af_ktls]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement