From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3EA85C07E9C for ; Wed, 14 Jul 2021 14:26:57 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2967D61260 for ; Wed, 14 Jul 2021 14:26:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232265AbhGNO3r (ORCPT ); Wed, 14 Jul 2021 10:29:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:53170 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231977AbhGNO3q (ORCPT ); Wed, 14 Jul 2021 10:29:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A6377611AD; Wed, 14 Jul 2021 14:26:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626272815; bh=3v5ilymBybdRvRvSEDJA+KRVQFXBDlKQaJO3h7AHNns=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=J5A//K4QYzuaoQXYksR17krj680x/1plUUKO9URyxTJNCbhfAr3F1EKWaCa3Hwn/1 226rI+IMe6/JK/l3ieIXqFdP1sXvgEzwYelpuIFrj8Ch3z2XmWHwXyBBMYnx6aC759 vGd3KqAVHCmcIE9OKDbGObHd+yeubuKOg6d5hI1Q= Date: Wed, 14 Jul 2021 16:26:52 +0200 From: Greg Kroah-Hartman To: Naresh Kamboju Cc: Holger Kiehl , Jan Kara , linux-kernel , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Pavel Machek , Jon Hunter , Florian Fainelli , linux-stable , Paolo Valente , Jens Axboe Subject: Re: [PATCH 5.13 000/800] 5.13.2-rc1 review Message-ID: References: <20210712060912.995381202@linuxfoundation.org> <68b6051-09c-9dc8-4b52-c4e766fee5@praktifix.dwd.de> <50fb4713-6b5d-b5e0-786a-6ece57896d2f@praktifix.dwd.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 14, 2021 at 07:29:26PM +0530, Naresh Kamboju wrote: > On Wed, 14 Jul 2021 at 19:22, Naresh Kamboju wrote: > > > > On Wed, 14 Jul 2021 at 19:01, Greg Kroah-Hartman > > wrote: > > > > > > > > My two cents, > > While running ssuite long running stress testing we have noticed deadlock. > > > > > So if you drop that, all works well? I'll go drop that from the queues > > > now. > > > > Let me drop that patch and test it again. > > > > Crash log, > > > > [ 1957.278399] ============================================ > > [ 1957.283717] WARNING: possible recursive locking detected > > [ 1957.289031] 5.13.2-rc1 #1 Not tainted > > [ 1957.292703] -------------------------------------------- > > [ 1957.298016] kworker/u8:7/236 is trying to acquire lock: > > [ 1957.303241] ffff8cc203f92c38 (&bfqd->lock){-.-.}-{2:2}, at: > > bfq_finish_requeue_request+0x55/0x500 [bfq] > > [ 1957.312643] > > [ 1957.312643] but task is already holding lock: > > [ 1957.318467] ffff8cc203f92c38 (&bfqd->lock){-.-.}-{2:2}, at: > > bfq_insert_requests+0x81/0x1750 [bfq] > > [ 1957.327334] > > [ 1957.327334] other info that might help us debug this: > > [ 1957.333852] Possible unsafe locking scenario: > > [ 1957.333852] > > [ 1957.339762] CPU0 > > [ 1957.342206] ---- > > [ 1957.344651] lock(&bfqd->lock); > > [ 1957.347873] lock(&bfqd->lock); > > [ 1957.351097] > > [ 1957.351097] *** DEADLOCK *** > > [ 1957.351097] > > Also noticed on stable-rc 5.12.17-rc1. I dropped the same patch from there as well already, thanks. greg k-h