Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758677AbYHVVNW (ORCPT ); Fri, 22 Aug 2008 17:13:22 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753143AbYHVVNC (ORCPT ); Fri, 22 Aug 2008 17:13:02 -0400 Received: from py-out-1112.google.com ([64.233.166.178]:54592 "EHLO py-out-1112.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751475AbYHVVNA (ORCPT ); Fri, 22 Aug 2008 17:13:00 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:mime-version:content-type :content-transfer-encoding:content-disposition; b=KSImIORA/uTVHDdhCD4fikn8ATWAS88Klwo0rIB0zrJe9LYrlbrlp0g/+ewCz9mrZR 56KwboZ6chAvszHnoNHjXk1pMSthT2a0RJ1mebrjHjVKQbm9va/eCsXmNSjs1vAC7TUp HOfrM+hXB7FzSErGyHA5r5zkQRRRydNdCGAQU= Message-ID: <6278d2220808221412x28f4ac5dl508884c8030b364a@mail.gmail.com> Date: Fri, 22 Aug 2008 22:12:59 +0100 From: "Daniel J Blueman" To: "Linux Kernel" , xfs@oss.sgi.com Subject: [2.6.27-rc4] XFS i_lock vs i_iolock... Cc: "Christoph Lameter" MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3860 Lines: 96 On 2.6.27-rc4 with various debug options enabled, lockdep claims lock ordering issues with XFS [1] - easiest reproducer is just running xfs_fsr. Mount options I was using were 'nobarrier,noatime,nodiratime'. Thanks, Daniel --- [1] ======================================================= [ INFO: possible circular locking dependency detected ] 2.6.27-rc4-224c #1 ------------------------------------------------------- xfs_fsr/5763 is trying to acquire lock: (&(&ip->i_lock)->mr_lock/2){--..}, at: [] xfs_ilock+0x8c/0xb0 but task is already holding lock: (&(&ip->i_iolock)->mr_lock/3){--..}, at: [] xfs_ilock+0xa5/0xb0 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&(&ip->i_iolock)->mr_lock/3){--..}: [] __lock_acquire+0xdb1/0x1150 [] lock_acquire+0x91/0xc0 [] down_write_nested+0x57/0x90 [] xfs_ilock+0xa5/0xb0 [] xfs_lock_two_inodes+0x106/0x120 [] xfs_swap_extents+0x70/0x5b0 [] xfs_swapext+0x148/0x150 [] xfs_ioctl+0x6a5/0x810 [] xfs_file_ioctl_invis+0x3d/0x80 [] vfs_ioctl+0x36/0xb0 [] do_vfs_ioctl+0x28b/0x2f0 [] sys_ioctl+0x4f/0x80 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff -> #0 (&(&ip->i_lock)->mr_lock/2){--..}: [] __lock_acquire+0xe95/0x1150 [] lock_acquire+0x91/0xc0 [] down_write_nested+0x57/0x90 [] xfs_ilock+0x8c/0xb0 [] xfs_lock_two_inodes+0x70/0x120 [] xfs_swap_extents+0x293/0x5b0 [] xfs_swapext+0x148/0x150 [] xfs_ioctl+0x6a5/0x810 [] xfs_file_ioctl_invis+0x3d/0x80 [] vfs_ioctl+0x36/0xb0 [] do_vfs_ioctl+0x28b/0x2f0 [] sys_ioctl+0x4f/0x80 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff other info that might help us debug this: 2 locks held by xfs_fsr/5763: #0: (&(&ip->i_iolock)->mr_lock/2){--..}, at: [] xfs_ilock+0xa5/0xb0 #1: (&(&ip->i_iolock)->mr_lock/3){--..}, at: [] xfs_ilock+0xa5/0xb0 stack backtrace: Pid: 5763, comm: xfs_fsr Not tainted 2.6.27-rc4-224c #1 Call Trace: [] print_circular_bug_tail+0x9f/0xe0 [] __lock_acquire+0xe95/0x1150 [] lock_acquire+0x91/0xc0 [] ? xfs_ilock+0x8c/0xb0 [] down_write_nested+0x57/0x90 [] ? xfs_ilock+0x8c/0xb0 [] xfs_ilock+0x8c/0xb0 [] xfs_lock_two_inodes+0x70/0x120 [] xfs_swap_extents+0x293/0x5b0 [] xfs_swapext+0x148/0x150 [] xfs_ioctl+0x6a5/0x810 [] ? native_sched_clock+0x70/0xa0 [] ? mnt_drop_write+0x62/0x140 [] xfs_file_ioctl_invis+0x3d/0x80 [] vfs_ioctl+0x36/0xb0 [] do_vfs_ioctl+0x28b/0x2f0 [] ? trace_hardirqs_on_thunk+0x3a/0x3f [] sys_ioctl+0x4f/0x80 [] system_call_fastpath+0x16/0x1b -- Daniel J Blueman -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/