New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 624846 link

Starred by 3 users

Issue metadata

Status: Duplicate
Owner:
Closed: Apr 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Bug



Sign in to add a comment

ecryptfs lockdep splat: possible circular locking dependency detected

Project Member Reported by norvez@chromium.org, Jun 30 2016

Issue description

Chrome Version: 53.0.2773.0
Chrome OS Version: 8508.0 custom test build
Chrome OS Platform: cyan-cheets

Steps To Reproduce:
(1) Build Chrome OS with lockdep enabled
(2) Update image, boot laptop and log in
(3) Check /var/log/messages

Expected Result:
No lockdep splat
Actual Result:
Lockdep splat (see below)

How frequently does this problem reproduce?
Always

What is the impact to the user, and is there a workaround? If so, what is
it?
No workaround but it doesn't seem to impact anything, machine is still working


Log:

2016-06-30T17:31:31.568942+01:00 DEBUG kernel: [ 1715.612087] SELinux: initialized (dev ecryptfs, type ecryptfs), uses xattr
2016-06-30T17:31:31.570471+01:00 WARNING kernel: [ 1715.612328] 
2016-06-30T17:31:31.570490+01:00 WARNING kernel: [ 1715.612340] ======================================================
2016-06-30T17:31:31.570502+01:00 WARNING kernel: [ 1715.612351] [ INFO: possible circular locking dependency detected ]
2016-06-30T17:31:31.570507+01:00 WARNING kernel: [ 1715.612363] 3.18.0 #6 Tainted: G        W     
2016-06-30T17:31:31.570510+01:00 WARNING kernel: [ 1715.612371] -------------------------------------------------------
2016-06-30T17:31:31.570513+01:00 WARNING kernel: [ 1715.612382] MountThread/2993 is trying to acquire lock:
2016-06-30T17:31:31.570518+01:00 WARNING kernel: [ 1715.612392]  (&type->i_mutex_dir_key#3){+.+.+.}, at: [<ffffffffbd5edc51>] ecryptfs_getxattr_lower
+0x45/0x82
2016-06-30T17:31:31.570522+01:00 WARNING kernel: [ 1715.612430] 
2016-06-30T17:31:31.570525+01:00 WARNING kernel: [ 1715.612430] but task is already holding lock:
2016-06-30T17:31:31.570532+01:00 WARNING kernel: [ 1715.612440]  (&isec->lock){+.+.+.}, at: [<ffffffffbd6137fa>] inode_doinit_with_dentry+0x4e/0x476
2016-06-30T17:31:31.570536+01:00 WARNING kernel: [ 1715.612465] 
2016-06-30T17:31:31.570539+01:00 WARNING kernel: [ 1715.612465] which lock already depends on the new lock.
2016-06-30T17:31:31.570541+01:00 WARNING kernel: [ 1715.612465] 
2016-06-30T17:31:31.570543+01:00 WARNING kernel: [ 1715.612479] 
2016-06-30T17:31:31.570547+01:00 WARNING kernel: [ 1715.612479] the existing dependency chain (in reverse order) is:
2016-06-30T17:31:31.570549+01:00 WARNING kernel: [ 1715.612492] 
2016-06-30T17:31:31.570552+01:00 WARNING kernel: [ 1715.612492] -> #1 (&isec->lock){+.+.+.}:
2016-06-30T17:31:31.570558+01:00 WARNING kernel: [ 1715.612506]        [<ffffffffbd47da25>] lock_acquire+0xa6/0x118
2016-06-30T17:31:31.570563+01:00 WARNING kernel: [ 1715.612521]        [<ffffffffbda7c890>] mutex_lock_nested+0x7b/0x41f
2016-06-30T17:31:31.570567+01:00 WARNING kernel: [ 1715.612537]        [<ffffffffbd6137fa>] inode_doinit_with_dentry+0x4e/0x476
2016-06-30T17:31:31.570571+01:00 WARNING kernel: [ 1715.612553]        [<ffffffffbd614038>] selinux_d_instantiate+0x1c/0x1e
2016-06-30T17:31:31.570575+01:00 WARNING kernel: [ 1715.612567]        [<ffffffffbd60a754>] security_d_instantiate+0x21/0x23
2016-06-30T17:31:31.570578+01:00 WARNING kernel: [ 1715.612582]        [<ffffffffbd54e1fd>] d_splice_alias+0x29d/0x2bc
2016-06-30T17:31:31.570582+01:00 WARNING kernel: [ 1715.612597]        [<ffffffffbd5a961d>] ext4_lookup+0x108/0x252
2016-06-30T17:31:31.570588+01:00 WARNING kernel: [ 1715.612612]        [<ffffffffbd54159e>] lookup_real+0x2c/0x47
2016-06-30T17:31:31.570593+01:00 WARNING kernel: [ 1715.612626]        [<ffffffffbd543041>] __lookup_hash+0x42/0x5d
2016-06-30T17:31:31.570596+01:00 WARNING kernel: [ 1715.612639]        [<ffffffffbd5434b4>] walk_component+0x89/0x1a3
2016-06-30T17:31:31.570600+01:00 WARNING kernel: [ 1715.612652]        [<ffffffffbd5437e5>] link_path_walk+0x217/0x48b
2016-06-30T17:31:31.570604+01:00 WARNING kernel: [ 1715.612665]        [<ffffffffbd544af5>] path_lookupat+0x67/0x36b
2016-06-30T17:31:31.570607+01:00 WARNING kernel: [ 1715.612679]        [<ffffffffbd544e23>] filename_lookup+0x2a/0x7f
2016-06-30T17:31:31.570611+01:00 WARNING kernel: [ 1715.612692]        [<ffffffffbd547082>] user_path_at_empty+0x91/0xe5
2016-06-30T17:31:31.570615+01:00 WARNING kernel: [ 1715.612705]        [<ffffffffbd5470e7>] user_path_at+0x11/0x13
2016-06-30T17:31:31.570620+01:00 WARNING kernel: [ 1715.612717]        [<ffffffffbd53d465>] vfs_fstatat+0x5d/0xac
2016-06-30T17:31:31.570624+01:00 WARNING kernel: [ 1715.612730]        [<ffffffffbd53d4cf>] vfs_stat+0x1b/0x1d
2016-06-30T17:31:31.570628+01:00 WARNING kernel: [ 1715.612741]        [<ffffffffbd53d73a>] SYSC_newstat+0x24/0x51
2016-06-30T17:31:31.570632+01:00 WARNING kernel: [ 1715.612754]        [<ffffffffbd53d898>] SyS_newstat+0xe/0x10
2016-06-30T17:31:31.570635+01:00 WARNING kernel: [ 1715.612766]        [<ffffffffbda7f09c>] system_call_fastpath+0x1c/0x21
2016-06-30T17:31:31.570638+01:00 WARNING kernel: [ 1715.612780] 
2016-06-30T17:31:31.570641+01:00 WARNING kernel: [ 1715.612780] -> #0 (&type->i_mutex_dir_key#3){+.+.+.}:
2016-06-30T17:31:31.570646+01:00 WARNING kernel: [ 1715.612796]        [<ffffffffbd47d363>] __lock_acquire+0xc3b/0xf51
2016-06-30T17:31:31.570651+01:00 WARNING kernel: [ 1715.612809]        [<ffffffffbd47da25>] lock_acquire+0xa6/0x118
2016-06-30T17:31:31.570654+01:00 WARNING kernel: [ 1715.612822]        [<ffffffffbda7c890>] mutex_lock_nested+0x7b/0x41f
2016-06-30T17:31:31.570658+01:00 WARNING kernel: [ 1715.612835]        [<ffffffffbd5edc51>] ecryptfs_getxattr_lower+0x45/0x82
2016-06-30T17:31:31.570662+01:00 WARNING kernel: [ 1715.612848]        [<ffffffffbd5edca7>] ecryptfs_getxattr+0x19/0x1b
2016-06-30T17:31:31.570666+01:00 WARNING kernel: [ 1715.612861]        [<ffffffffbd613904>] inode_doinit_with_dentry+0x158/0x476
2016-06-30T17:31:31.570669+01:00 WARNING kernel: [ 1715.612875]        [<ffffffffbd613dde>] sb_finish_set_opts+0x1bc/0x252
2016-06-30T17:31:31.570673+01:00 WARNING kernel: [ 1715.612889]        [<ffffffffbd614511>] selinux_set_mnt_opts+0x4d7/0x532
2016-06-30T17:31:31.570679+01:00 WARNING kernel: [ 1715.612903]        [<ffffffffbd6145cf>] selinux_sb_kern_mount+0x63/0xf0
2016-06-30T17:31:31.570683+01:00 WARNING kernel: [ 1715.612916]        [<ffffffffbd60abbf>] security_sb_kern_mount+0x16/0x18
2016-06-30T17:31:31.570687+01:00 WARNING kernel: [ 1715.612930]        [<ffffffffbd53c52e>] mount_fs+0xd7/0x156
2016-06-30T17:31:31.570690+01:00 WARNING kernel: [ 1715.612943]        [<ffffffffbd553145>] vfs_kern_mount+0x6c/0xeb
2016-06-30T17:31:31.570694+01:00 WARNING kernel: [ 1715.612957]        [<ffffffffbd555c08>] do_mount+0x7d9/0x8b4
2016-06-30T17:31:31.570697+01:00 WARNING kernel: [ 1715.612969]        [<ffffffffbd555f27>] SyS_mount+0x86/0xc9
2016-06-30T17:31:31.570701+01:00 WARNING kernel: [ 1715.612981]        [<ffffffffbda7f09c>] system_call_fastpath+0x1c/0x21
2016-06-30T17:31:31.570706+01:00 WARNING kernel: [ 1715.612995] 
2016-06-30T17:31:31.570710+01:00 WARNING kernel: [ 1715.612995] other info that might help us debug this:
2016-06-30T17:31:31.570712+01:00 WARNING kernel: [ 1715.612995] 
2016-06-30T17:31:31.570715+01:00 WARNING kernel: [ 1715.613009]  Possible unsafe locking scenario:
2016-06-30T17:31:31.570717+01:00 WARNING kernel: [ 1715.613009] 
2016-06-30T17:31:31.570720+01:00 WARNING kernel: [ 1715.613020]        CPU0                    CPU1
2016-06-30T17:31:31.570723+01:00 WARNING kernel: [ 1715.613028]        ----                    ----
2016-06-30T17:31:31.570725+01:00 WARNING kernel: [ 1715.613035]   lock(&isec->lock);
2016-06-30T17:31:31.570730+01:00 WARNING kernel: [ 1715.613045]                                lock(&type->i_mutex_dir_key#3);
2016-06-30T17:31:31.570734+01:00 WARNING kernel: [ 1715.613062]                                lock(&isec->lock);
2016-06-30T17:31:31.570737+01:00 WARNING kernel: [ 1715.613074]   lock(&type->i_mutex_dir_key#3);
2016-06-30T17:31:31.570837+01:00 WARNING kernel: [ 1715.613086] 
2016-06-30T17:31:31.570842+01:00 WARNING kernel: [ 1715.613086]  *** DEADLOCK ***
2016-06-30T17:31:31.570845+01:00 WARNING kernel: [ 1715.613086] 
2016-06-30T17:31:31.570847+01:00 WARNING kernel: [ 1715.613098] 3 locks held by MountThread/2993:
2016-06-30T17:31:31.570855+01:00 WARNING kernel: [ 1715.613106]  #0:  (&type->s_umount_key#42/1){+.+.+.}, at: [<ffffffffbd53b6d5>] sget+0x2a2/0x43e
2016-06-30T17:31:31.570860+01:00 WARNING kernel: [ 1715.613132]  #1:  (&sbsec->lock){+.+.+.}, at: [<ffffffffbd6140cc>] selinux_set_mnt_opts+0x92/0x532
2016-06-30T17:31:31.570865+01:00 WARNING kernel: [ 1715.613155]  #2:  (&isec->lock){+.+.+.}, at: [<ffffffffbd6137fa>] inode_doinit_with_dentry+0x4e/0x476
2016-06-30T17:31:31.570868+01:00 WARNING kernel: [ 1715.613177] 
2016-06-30T17:31:31.570870+01:00 WARNING kernel: [ 1715.613177] stack backtrace:
2016-06-30T17:31:31.570874+01:00 WARNING kernel: [ 1715.613189] CPU: 1 PID: 2993 Comm: MountThread Tainted: G        W      3.18.0 #6
2016-06-30T17:31:31.570877+01:00 WARNING kernel: [ 1715.613202] Hardware name: GOOGLE Cyan, BIOS Google_Cyan.7287.57.46 02/05/2016
2016-06-30T17:31:31.570880+01:00 WARNING kernel: [ 1715.613214]  0000000000000000 000000008117004c ffff88017520b968 ffffffffbda78428
2016-06-30T17:31:31.570886+01:00 WARNING kernel: [ 1715.613233]  0000000000000000 ffffffffbea08160 ffff88017520b9b8 ffffffffbd47b5e5
2016-06-30T17:31:31.570890+01:00 WARNING kernel: [ 1715.613250]  383700000000a990 ffff880178d511b0 0000000000000003 ffff880178d51a48
2016-06-30T17:31:31.570893+01:00 WARNING kernel: [ 1715.613268] Call Trace:
2016-06-30T17:31:31.570896+01:00 WARNING kernel: [ 1715.613278]  [<ffffffffbda78428>] dump_stack+0x4e/0x71
2016-06-30T17:31:31.570900+01:00 WARNING kernel: [ 1715.613291]  [<ffffffffbd47b5e5>] print_circular_bug+0x1f8/0x209
2016-06-30T17:31:31.570903+01:00 WARNING kernel: [ 1715.613303]  [<ffffffffbd47d363>] __lock_acquire+0xc3b/0xf51
2016-06-30T17:31:31.570907+01:00 WARNING kernel: [ 1715.613316]  [<ffffffffbda7fc00>] ? ret_from_intr+0x11/0x13
2016-06-30T17:31:31.570912+01:00 WARNING kernel: [ 1715.613329]  [<ffffffffbd47994f>] ? lockdep_on+0x15/0x15
2016-06-30T17:31:31.570917+01:00 WARNING kernel: [ 1715.613341]  [<ffffffffbd47da25>] lock_acquire+0xa6/0x118
2016-06-30T17:31:31.570920+01:00 WARNING kernel: [ 1715.613357]  [<ffffffffbd5edc51>] ? ecryptfs_getxattr_lower+0x45/0x82
2016-06-30T17:31:31.570924+01:00 WARNING kernel: [ 1715.613370]  [<ffffffffbd47c06f>] ? mark_lock+0x2d/0x20d
2016-06-30T17:31:31.570927+01:00 WARNING kernel: [ 1715.613382]  [<ffffffffbda7c890>] mutex_lock_nested+0x7b/0x41f
2016-06-30T17:31:31.570931+01:00 WARNING kernel: [ 1715.613395]  [<ffffffffbd5edc51>] ? ecryptfs_getxattr_lower+0x45/0x82
2016-06-30T17:31:31.570934+01:00 WARNING kernel: [ 1715.613408]  [<ffffffffbd5edc51>] ? ecryptfs_getxattr_lower+0x45/0x82
2016-06-30T17:31:31.570938+01:00 WARNING kernel: [ 1715.613423]  [<ffffffffbd52c3e3>] ? trace_kmalloc+0x3a/0x89
2016-06-30T17:31:31.570944+01:00 WARNING kernel: [ 1715.613435]  [<ffffffffbd5edc51>] ecryptfs_getxattr_lower+0x45/0x82
2016-06-30T17:31:31.570948+01:00 WARNING kernel: [ 1715.613448]  [<ffffffffbd5edca7>] ecryptfs_getxattr+0x19/0x1b
2016-06-30T17:31:31.570952+01:00 WARNING kernel: [ 1715.613461]  [<ffffffffbd613904>] inode_doinit_with_dentry+0x158/0x476
2016-06-30T17:31:31.570956+01:00 WARNING kernel: [ 1715.613476]  [<ffffffffbda77346>] ? printk+0x5e/0x85
2016-06-30T17:31:31.570959+01:00 WARNING kernel: [ 1715.613488]  [<ffffffffbd613dde>] sb_finish_set_opts+0x1bc/0x252
2016-06-30T17:31:31.570963+01:00 WARNING kernel: [ 1715.613501]  [<ffffffffbd614511>] selinux_set_mnt_opts+0x4d7/0x532
2016-06-30T17:31:31.570967+01:00 WARNING kernel: [ 1715.613515]  [<ffffffffbd6145cf>] selinux_sb_kern_mount+0x63/0xf0
2016-06-30T17:31:31.570972+01:00 WARNING kernel: [ 1715.613528]  [<ffffffffbd60abbf>] security_sb_kern_mount+0x16/0x18
2016-06-30T17:31:31.570976+01:00 WARNING kernel: [ 1715.613541]  [<ffffffffbd53c52e>] mount_fs+0xd7/0x156
2016-06-30T17:31:31.570980+01:00 WARNING kernel: [ 1715.613553]  [<ffffffffbd50f18a>] ? __alloc_percpu+0x15/0x17
2016-06-30T17:31:31.570983+01:00 WARNING kernel: [ 1715.613566]  [<ffffffffbd553145>] vfs_kern_mount+0x6c/0xeb
2016-06-30T17:31:31.570987+01:00 WARNING kernel: [ 1715.613578]  [<ffffffffbd555c08>] do_mount+0x7d9/0x8b4
2016-06-30T17:31:31.570990+01:00 WARNING kernel: [ 1715.613590]  [<ffffffffbd555f27>] SyS_mount+0x86/0xc9
2016-06-30T17:31:31.570993+01:00 WARNING kernel: [ 1715.613606]  [<ffffffffbda7f09c>] system_call_fastpath+0x1c/0x21
2016-06-30T17:31:31.575393+01:00 INFO cryptohomed[1230]: Creating pass-through directories /home/.shadow/b67785ac5525a6e277aee061c0fb51e10ae938c2/vault/user/GCache/v1/tmp

 
Cc: gwendal@chromium.org briannorris@chromium.org katierh@chromium.org smbar...@chromium.org
Labels: Kernel-4.4 Kernel-3.18
Seen on Kevin (4.4 kernel) too, followed by ecryptfs complaining about failing to open files:

[ 3178.076346] ======================================================
[ 3178.082530] [ INFO: possible circular locking dependency detected ]
[ 3178.088817] 4.4.14 #137 Not tainted
[ 3178.092318] -------------------------------------------------------
[ 3178.098590] MountThread/3164 is trying to acquire lock:
[ 3178.103822]  (&type->i_mutex_dir_key#3){+.+.+.}, at: [<ffffffc00045d310>] ecryptfs_getxattr_lower+0x48/0x8c
[ 3178.113712] 
[ 3178.113712] but task is already holding lock:
[ 3178.119557]  (&isec->lock){+.+.+.}, at: [<ffffffc00048b3d4>] inode_doinit_with_dentry+0x54/0x57c
[ 3178.128446] 
[ 3178.128446] which lock already depends on the new lock.
[ 3178.128446] 
[ 3178.136633] 
[ 3178.136633] the existing dependency chain (in reverse order) is:
[ 3178.144121] 
-> #1 (&isec->lock){+.+.+.}:
[ 3178.148304]        [<ffffffc000275ca4>] __lock_acquire+0x1588/0x18f8
[ 3178.154701]        [<ffffffc000276858>] lock_acquire+0x1b4/0x278
[ 3178.160742]        [<ffffffc000993f58>] mutex_lock_nested+0x8c/0x3fc
[ 3178.167132]        [<ffffffc00048b3d4>] inode_doinit_with_dentry+0x54/0x57c
[ 3178.174129]        [<ffffffc00048b92c>] selinux_d_instantiate+0x30/0x3c
[ 3178.180772]        [<ffffffc0004835c4>] security_d_instantiate+0x54/0x6c
[ 3178.187515]        [<ffffffc00038bf5c>] d_splice_alias+0x2a8/0x2e8
[ 3178.193735]        [<ffffffc00040621c>] ext4_lookup+0xd0/0x210
[ 3178.199605]        [<ffffffc00037b664>] lookup_real+0x50/0x70
[ 3178.205387]        [<ffffffc00037bf00>] __lookup_hash+0x5c/0x88
[ 3178.211343]        [<ffffffc00037f534>] walk_component+0x108/0x2bc
[ 3178.217554]        [<ffffffc00037f77c>] link_path_walk+0x94/0x4dc
[ 3178.223680]        [<ffffffc00037fc90>] path_lookupat+0x44/0x120
[ 3178.229719]        [<ffffffc0003812c4>] filename_lookup+0x84/0x12c
[ 3178.235930]        [<ffffffc000381498>] user_path_at_empty+0x54/0x60
[ 3178.242317]        [<ffffffc0003761ac>] vfs_fstatat+0x84/0xe4
[ 3178.248087]        [<ffffffc00037623c>] vfs_stat+0x30/0x3c
[ 3178.253603]        [<ffffffc000376998>] SyS_stat64+0x38/0x70
[ 3178.259292]        [<ffffffc000203cb4>] el0_svc_naked+0x24/0x28
[ 3178.265249] 
-> #0 (&type->i_mutex_dir_key#3){+.+.+.}:
[ 3178.270577]        [<ffffffc000272d48>] print_circular_bug+0x68/0x2c8
[ 3178.277064]        [<ffffffc000275990>] __lock_acquire+0x1274/0x18f8
[ 3178.283446]        [<ffffffc000276858>] lock_acquire+0x1b4/0x278
[ 3178.289483]        [<ffffffc000993f58>] mutex_lock_nested+0x8c/0x3fc
[ 3178.295875]        [<ffffffc00045d310>] ecryptfs_getxattr_lower+0x48/0x8c
[ 3178.302698]        [<ffffffc00045d390>] ecryptfs_getxattr+0x3c/0x48
[ 3178.308998]        [<ffffffc00048b4d0>] inode_doinit_with_dentry+0x150/0x57c
[ 3178.316090]        [<ffffffc00048bad4>] sb_finish_set_opts+0x19c/0x240
[ 3178.322652]        [<ffffffc000493fd4>] selinux_set_mnt_opts+0x4b8/0x518
[ 3178.329390]        [<ffffffc000494088>] superblock_doinit+0x54/0xe8
[ 3178.335690]        [<ffffffc00049419c>] selinux_sb_kern_mount+0x50/0xac
[ 3178.342336]        [<ffffffc0004841e4>] security_sb_kern_mount+0x54/0x78
[ 3178.349069]        [<ffffffc000375310>] mount_fs+0xc8/0x144
[ 3178.354673]        [<ffffffc0003938f4>] vfs_kern_mount+0x70/0x150
[ 3178.360801]        [<ffffffc000397790>] do_mount+0xb24/0xc34
[ 3178.366494]        [<ffffffc0003c9364>] compat_SyS_mount+0x1c8/0x214
[ 3178.372884]        [<ffffffc000203cb4>] el0_svc_naked+0x24/0x28
[ 3178.378843] 
[ 3178.378843] other info that might help us debug this:
[ 3178.378843] 
[ 3178.386864]  Possible unsafe locking scenario:
[ 3178.386864] 
[ 3178.392793]        CPU0                    CPU1
[ 3178.397327]        ----                    ----
[ 3178.401860]   lock(&isec->lock);
[ 3178.405140]                                lock(&type->i_mutex_dir_key#3);
[ 3178.412073]                                lock(&isec->lock);
[ 3178.417857]   lock(&type->i_mutex_dir_key#3);
[ 3178.422272] 
[ 3178.422272]  *** DEADLOCK ***
[ 3178.422272] 
[ 3178.428212] 3 locks held by MountThread/3164:
[ 3178.432574]  #0:  (&type->s_umount_key#44/1){+.+.+.}, at: [<ffffffc000373ffc>] sget+0x258/0x3ac
[ 3178.441442]  #1:  (&sbsec->lock){+.+.+.}, at: [<ffffffc000493bbc>] selinux_set_mnt_opts+0xa0/0x518
[ 3178.450512]  #2:  (&isec->lock){+.+.+.}, at: [<ffffffc00048b3d4>] inode_doinit_with_dentry+0x54/0x57c
[ 3178.459852] 
[ 3178.459852] stack backtrace:
[ 3178.464235] CPU: 3 PID: 3164 Comm: MountThread Not tainted 4.4.14 #137
[ 3178.470767] Hardware name: Google Kevin (DT)
[ 3178.475048] Call trace:
[ 3178.477521] [<ffffffc000208888>] dump_backtrace+0x0/0x15c
[ 3178.482934] [<ffffffc000208a04>] show_stack+0x20/0x28
[ 3178.488015] [<ffffffc0004f33f4>] dump_stack+0xb4/0xf0
[ 3178.493091] [<ffffffc000272f8c>] print_circular_bug+0x2ac/0x2c8
[ 3178.499029] [<ffffffc000275990>] __lock_acquire+0x1274/0x18f8
[ 3178.504789] [<ffffffc000276858>] lock_acquire+0x1b4/0x278
[ 3178.510212] [<ffffffc000993f58>] mutex_lock_nested+0x8c/0x3fc
[ 3178.515983] [<ffffffc00045d310>] ecryptfs_getxattr_lower+0x48/0x8c
[ 3178.522185] [<ffffffc00045d390>] ecryptfs_getxattr+0x3c/0x48
[ 3178.527871] [<ffffffc00048b4d0>] inode_doinit_with_dentry+0x150/0x57c
[ 3178.534333] [<ffffffc00048bad4>] sb_finish_set_opts+0x19c/0x240
[ 3178.540277] [<ffffffc000493fd4>] selinux_set_mnt_opts+0x4b8/0x518
[ 3178.546386] [<ffffffc000494088>] superblock_doinit+0x54/0xe8
[ 3178.552063] [<ffffffc00049419c>] selinux_sb_kern_mount+0x50/0xac
[ 3178.558087] [<ffffffc0004841e4>] security_sb_kern_mount+0x54/0x78
[ 3178.564198] [<ffffffc000375310>] mount_fs+0xc8/0x144
[ 3178.569184] [<ffffffc0003938f4>] vfs_kern_mount+0x70/0x150
[ 3178.574686] [<ffffffc000397790>] do_mount+0xb24/0xc34
[ 3178.579758] [<ffffffc0003c9364>] compat_SyS_mount+0x1c8/0x214
[ 3178.585527] [<ffffffc000203cb4>] el0_svc_naked+0x24/0x28
[ 3178.752653] Error opening lower file for lower_dentry [0xffffffc0e3c507e0] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3178.763879] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [database]; rc = [-124]
[ 3178.786597] Error opening lower file for lower_dentry [0xffffffc0e3c507e0] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3178.797976] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [database]; rc = [-124]
[ 3178.829569] Error opening lower file for lower_dentry [0xffffffc0e7c8d9e0] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3178.841049] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [database]; rc = [-124]
[ 3178.950060] Error opening lower file for lower_dentry [0xffffffc0e7d39680] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3178.961204] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [shill]; rc = [-124]
[ 3179.008696] Error opening lower file for lower_dentry [0xffffffc0e7df5d40] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3179.009003] Error opening lower file for lower_dentry [0xffffffc0e8349320] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3179.009018] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [user]; rc = [-124]
[ 3179.041576] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [shill_logs]; rc = [-124]
[ 3179.070594] Error opening lower file for lower_dentry [0xffffffc0eb2e47e0] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3179.087622] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [tmp]; rc = [-124]
[ 3179.152769] Error opening lower file for lower_dentry [0xffffffc0bcf25320] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3179.164073] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [resource_metadata_resource_map.db]; rc = [-124]
[ 3179.167009] Error opening lower file for lower_dentry [0xffffffc0eb4b0b40] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]
[ 3179.167030] ecryptfs_open: Error attempting to initialize the lower file for the dentry with name [data_reduction_proxy_leveldb]; rc = [-124]
[ 3179.252050] Error opening lower file for lower_dentry [0xffffffc0bd006240] and lower_mnt [0xffffffc0eab7f360]; rc = [-124]

Lockdep splat see: https://b.corp.google.com/issues/27210945 . I think we're going to switch to ext4 crypt anyway, so I'm not sure to what extend it is worth investigating.

Error opening lower file for lower_dentry [0xffffffc0e3c507e0] and lower_mnt [0xffffffc0eab7f360]; rc = [-124] is https://code.google.com/p/chrome-os-partner/issues/detail?id=55277 and https://code.google.com/p/chrome-os-partner/issues/detail?id=55232
Owner: briannorris@chromium.org
Status: Assigned (was: Unconfirmed)
Summary: ecryptfs lockdep splat: possible circular locking dependency detected (was: lockdep splat on cyan-cheets)
Another report:

https://code.google.com/p/chrome-os-partner/issues/detail?id=56561

I love having multiple bug trackers!

I'm going to give a wild guess that  bug 347322  won't be resolved in a timely manner. I'll take a look at this today to see how difficult it is to resolve.
Status: Archived (was: Assigned)

Comment 5 by ketakid@google.com, Mar 18 2017

Status: Available (was: Archived)
Activating. Please assign to the right owner and the appropriate priority.
Mergedinto: 646093
Status: Duplicate (was: Available)

Sign in to add a comment