Public bug reported: Binary package hint: udev
When the system boots I get the following output at the log terminal: [ 6.513668] [ 6.513672] ======================================================= [ 6.513682] [ INFO: possible circular locking dependency detected ] [ 6.513690] 2.6.30-rc6 #6 [ 6.513695] ------------------------------------------------------- [ 6.513702] udevadm/946 is trying to acquire lock: [ 6.513708] (&mm->mmap_sem){++++++}, at: [<c018f8b1>] might_fault+0x4b/0x88 [ 6.513730] [ 6.513732] but task is already holding lock: [ 6.513738] (sysfs_mutex){+.+.+.}, at: [<c01e84fc>] sysfs_readdir+0xba/0x14b [ 6.513756] [ 6.513758] which lock already depends on the new lock. [ 6.513761] [ 6.513767] [ 6.513768] the existing dependency chain (in reverse order) is: [ 6.513775] [ 6.513777] -> #3 (sysfs_mutex){+.+.+.}: [ 6.513790] [<c014f376>] __lock_acquire+0x971/0xaea [ 6.513803] [<c014f5b1>] lock_acquire+0xc2/0xe5 [ 6.513814] [<c04d45f6>] __mutex_lock_common+0x3e/0x3ba [ 6.513827] [<c04d49fb>] mutex_lock_nested+0x29/0x31 [ 6.513838] [<c01e8826>] sysfs_addrm_start+0x23/0x90 [ 6.513849] [<c01e8cbf>] create_dir+0x3a/0x68 [ 6.513859] [<c01e8d1a>] sysfs_create_dir+0x2d/0x41 [ 6.513870] [<c029d550>] kobject_add_internal+0xb1/0x152 [ 6.513883] [<c029d6aa>] kobject_add_varg+0x35/0x41 [ 6.513894] [<c029d71b>] kobject_add+0x43/0x49 [ 6.513905] [<c03529ae>] device_add+0x9a/0x45e [ 6.513918] [<c0352d84>] device_register+0x12/0x15 [ 6.513929] [<c0352dfc>] device_create_vargs+0x75/0x96 [ 6.513940] [<c0352e38>] device_create+0x1b/0x1d [ 6.513951] [<c031694e>] register_con_driver+0x8f/0xea [ 6.513964] [<c031799b>] take_over_console+0x15/0x35 [ 6.513975] [<c02d04ea>] fbcon_takeover+0x63/0x96 [ 6.513987] [<c02d0b8e>] fbcon_event_notify+0x341/0x6ba [ 6.513998] [<c04d8103>] notifier_call_chain+0x2b/0x4a [ 6.514010] [<c0144811>] __blocking_notifier_call_chain+0x37/0x4c [ 6.514023] [<c0144832>] blocking_notifier_call_chain+0xc/0xe [ 6.514035] [<c02c5a4d>] fb_notifier_call_chain+0x11/0x13 [ 6.514047] [<c02c6880>] register_framebuffer+0x1e9/0x20a [ 6.514058] [<c0342956>] intelfb_probe+0x49f/0x50b [ 6.514069] [<c032f3f6>] drm_helper_initial_config+0x145/0x14f [ 6.514081] [<c0332427>] i915_driver_load+0x8de/0x932 [ 6.514093] [<c0328961>] drm_get_dev+0x301/0x3c3 [ 6.514104] [<c04c7f84>] i915_pci_probe+0xd/0xf [ 6.514115] [<c02b83f4>] local_pci_probe+0xe/0x10 [ 6.514126] [<c02b8e21>] pci_device_probe+0x43/0x66 [ 6.514137] [<c03544e4>] driver_probe_device+0x79/0x105 [ 6.514149] [<c03545b3>] __driver_attach+0x43/0x5f [ 6.514161] [<c0353f56>] bus_for_each_dev+0x3d/0x67 [ 6.514172] [<c03543bb>] driver_attach+0x14/0x16 [ 6.514182] [<c03539df>] bus_add_driver+0xa0/0x1ba [ 6.514182] [<c03547d1>] driver_register+0x8b/0xe8 [ 6.514182] [<c02b9180>] __pci_register_driver+0x4c/0xa8 [ 6.514182] [<c032513d>] drm_init+0x59/0xb1 [ 6.514182] [<c074659a>] i915_init+0x46/0x48 [ 6.514182] [<c010113f>] do_one_initcall+0x4a/0x11a [ 6.514182] [<c07242d0>] kernel_init+0x101/0x152 [ 6.514182] [<c01037e7>] kernel_thread_helper+0x7/0x10 [ 6.514182] [<ffffffff>] 0xffffffff [ 6.514182] [ 6.514182] -> #2 ((fb_notifier_list).rwsem){.+.+.+}: [ 6.514182] [<c014f376>] __lock_acquire+0x971/0xaea [ 6.514182] [<c014f5b1>] lock_acquire+0xc2/0xe5 [ 6.514182] [<c04d4cc5>] down_read+0x2d/0x6a [ 6.514182] [<c01447fe>] __blocking_notifier_call_chain+0x24/0x4c [ 6.514182] [<c0144832>] blocking_notifier_call_chain+0xc/0xe [ 6.514182] [<c02c5a4d>] fb_notifier_call_chain+0x11/0x13 [ 6.514182] [<c02c6880>] register_framebuffer+0x1e9/0x20a [ 6.514182] [<c0342956>] intelfb_probe+0x49f/0x50b [ 6.514182] [<c032f3f6>] drm_helper_initial_config+0x145/0x14f [ 6.514182] [<c0332427>] i915_driver_load+0x8de/0x932 [ 6.514182] [<c0328961>] drm_get_dev+0x301/0x3c3 [ 6.514182] [<c04c7f84>] i915_pci_probe+0xd/0xf [ 6.514182] [<c02b83f4>] local_pci_probe+0xe/0x10 [ 6.514182] [<c02b8e21>] pci_device_probe+0x43/0x66 [ 6.514182] [<c03544e4>] driver_probe_device+0x79/0x105 [ 6.514182] [<c03545b3>] __driver_attach+0x43/0x5f [ 6.514182] [<c0353f56>] bus_for_each_dev+0x3d/0x67 [ 6.514182] [<c03543bb>] driver_attach+0x14/0x16 [ 6.514182] [<c03539df>] bus_add_driver+0xa0/0x1ba [ 6.514182] [<c03547d1>] driver_register+0x8b/0xe8 [ 6.514182] [<c02b9180>] __pci_register_driver+0x4c/0xa8 [ 6.514182] [<c032513d>] drm_init+0x59/0xb1 [ 6.514182] [<c074659a>] i915_init+0x46/0x48 [ 6.514182] [<c010113f>] do_one_initcall+0x4a/0x11a [ 6.514182] [<c07242d0>] kernel_init+0x101/0x152 [ 6.514182] [<c01037e7>] kernel_thread_helper+0x7/0x10 [ 6.514182] [<ffffffff>] 0xffffffff [ 6.514182] [ 6.514182] -> #1 (&fb_info->lock){+.+.+.}: [ 6.514182] [<c014f376>] __lock_acquire+0x971/0xaea [ 6.514182] [<c014f5b1>] lock_acquire+0xc2/0xe5 [ 6.514182] [<c04d45f6>] __mutex_lock_common+0x3e/0x3ba [ 6.514182] [<c04d49fb>] mutex_lock_nested+0x29/0x31 [ 6.514182] [<c02c5fd0>] fb_mmap+0x87/0x156 [ 6.514182] [<c0195a61>] mmap_region+0x23c/0x3f4 [ 6.514182] [<c0195e51>] do_mmap_pgoff+0x238/0x288 [ 6.514182] [<c0105deb>] sys_mmap2+0x5a/0x7b [ 6.514182] [<c0102c35>] syscall_call+0x7/0xb [ 6.514182] [<ffffffff>] 0xffffffff [ 6.514182] [ 6.514182] -> #0 (&mm->mmap_sem){++++++}: [ 6.514182] [<c014f286>] __lock_acquire+0x881/0xaea [ 6.514182] [<c014f5b1>] lock_acquire+0xc2/0xe5 [ 6.514182] [<c018f8ce>] might_fault+0x68/0x88 [ 6.514182] [<c02a29ac>] copy_to_user+0x2c/0xfc [ 6.514182] [<c01b3beb>] filldir64+0x97/0xcd [ 6.514182] [<c01e8559>] sysfs_readdir+0x117/0x14b [ 6.514182] [<c01b3dfd>] vfs_readdir+0x68/0x94 [ 6.514182] [<c01b3e8b>] sys_getdents64+0x62/0xa1 [ 6.514182] [<c0102c35>] syscall_call+0x7/0xb [ 6.514182] [<ffffffff>] 0xffffffff [ 6.514182] [ 6.514182] other info that might help us debug this: [ 6.514182] [ 6.514182] 2 locks held by udevadm/946: [ 6.514182] #0: (&type->i_mutex_dir_key){+.+.+.}, at: [<c01b3ddb>] vfs_readdir+0x46/0x94 [ 6.514182] #1: (sysfs_mutex){+.+.+.}, at: [<c01e84fc>] sysfs_readdir+0xba/0x14b [ 6.514182] [ 6.514182] stack backtrace: [ 6.514182] Pid: 946, comm: udevadm Not tainted 2.6.30-rc6 #6 [ 6.514182] Call Trace: [ 6.514182] [<c04d34d6>] ? printk+0xf/0x11 [ 6.514182] [<c014e741>] print_circular_bug_tail+0x5d/0x68 [ 6.514182] [<c014f286>] __lock_acquire+0x881/0xaea [ 6.514182] [<c018f8b1>] ? might_fault+0x4b/0x88 [ 6.514182] [<c014f5b1>] lock_acquire+0xc2/0xe5 [ 6.514182] [<c018f8b1>] ? might_fault+0x4b/0x88 [ 6.514182] [<c018f8ce>] might_fault+0x68/0x88 [ 6.514182] [<c018f8b1>] ? might_fault+0x4b/0x88 [ 6.514182] [<c02a29ac>] copy_to_user+0x2c/0xfc [ 6.514182] [<c01b3beb>] filldir64+0x97/0xcd [ 6.514182] [<c01e8559>] sysfs_readdir+0x117/0x14b [ 6.514182] [<c01b3b54>] ? filldir64+0x0/0xcd [ 6.514182] [<c01b3dfd>] vfs_readdir+0x68/0x94 [ 6.514182] [<c01b3b54>] ? filldir64+0x0/0xcd [ 6.514182] [<c01b3e8b>] sys_getdents64+0x62/0xa1 [ 6.514182] [<c0102c35>] syscall_call+0x7/0xb The system boots normally, but maybe this could be a serious bug. ProblemType: Bug Architecture: i386 DistroRelease: Ubuntu 9.04 Package: udev 141-1.2 ProcEnviron: LANG=de_AT.UTF-8 SHELL=/bin/bash SourcePackage: udev Uname: Linux 2.6.30-rc6 i686 ** Affects: udev (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 -- circular locking dependency https://bugs.launchpad.net/bugs/378196 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs