Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757158Ab0DOVC0 (ORCPT ); Thu, 15 Apr 2010 17:02:26 -0400 Received: from mail-bw0-f225.google.com ([209.85.218.225]:58922 "EHLO mail-bw0-f225.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757095Ab0DOVCY (ORCPT ); Thu, 15 Apr 2010 17:02:24 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=Cu8lI3H8wCOzyiFCZ7CJBPcpLRPKGBuzS8oszaFjVXIQ6+PFtnh0TIQD5RsYvq3BpK 51mUWXkLwXY1YqEQT7Q6BbA1aVMnI/GK75UiFymzXU0eUq7ogtvCO++a8IWMiYdi+Lta 0aOd6Kac22T5OInO/H3LRyvWyAR1Zf6h7IdC8= MIME-Version: 1.0 Date: Fri, 16 Apr 2010 01:02:22 +0400 Message-ID: Subject: reiserfs locking From: Alexander Beregalov To: Linux Kernel Mailing List , Frederic Weisbecker Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2837 Lines: 76 Hi Frederic! [ INFO: possible circular locking dependency detected ] 2.6.34-rc3-00410-gd620a7c #1 ------------------------------------------------------- conftest/3639 is trying to acquire lock: (&sb->s_type->i_mutex_key#5){+.+.+.}, at: [] reiserfs_file_release+0x4c/0x3c0 but task is already holding lock: (&mm->mmap_sem){++++++}, at: [] sys_munmap+0x22/0x50 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&mm->mmap_sem){++++++}: [] validate_chain+0xa23/0xf70 [] __lock_acquire+0x4d0/0xa40 [] lock_acquire+0x7a/0xa0 [] might_fault+0x7b/0xa0 [] copy_to_user+0x36/0x130 [] filldir+0x6c/0xd0 [] reiserfs_readdir_dentry+0x331/0x720 [] reiserfs_readdir+0x17/0x20 [] vfs_readdir+0x85/0xa0 [] sys_getdents+0x68/0xc0 [] sysenter_do_call+0x12/0x36 -> #0 (&sb->s_type->i_mutex_key#5){+.+.+.}: [] validate_chain+0xf68/0xf70 [] __lock_acquire+0x4d0/0xa40 [] lock_acquire+0x7a/0xa0 [] mutex_lock_nested+0x5f/0x2b0 [] reiserfs_file_release+0x4c/0x3c0 [] __fput+0xf6/0x230 [] fput+0x15/0x20 [] remove_vma+0x3e/0x70 [] do_munmap+0x228/0x2f0 [] sys_munmap+0x2f/0x50 [] sysenter_do_call+0x12/0x36 other info that might help us debug this: 1 lock held by conftest/3639: #0: (&mm->mmap_sem){++++++}, at: [] sys_munmap+0x22/0x50 stack backtrace: Pid: 3639, comm: conftest Not tainted 2.6.34-rc3-00410-gd620a7c #1 Call Trace: [] ? printk+0x18/0x21 [] print_circular_bug+0xc0/0xd0 [] validate_chain+0xf68/0xf70 [] ? sched_clock_cpu+0x95/0x110 [] ? trace_hardirqs_off+0xb/0x10 [] __lock_acquire+0x4d0/0xa40 [] lock_acquire+0x7a/0xa0 [] ? reiserfs_file_release+0x4c/0x3c0 [] mutex_lock_nested+0x5f/0x2b0 [] ? reiserfs_file_release+0x4c/0x3c0 [] ? reiserfs_file_release+0x4c/0x3c0 [] reiserfs_file_release+0x4c/0x3c0 [] ? unlink_file_vma+0x3e/0x50 [] ? _raw_spin_unlock+0x1d/0x20 [] __fput+0xf6/0x230 [] fput+0x15/0x20 [] remove_vma+0x3e/0x70 [] do_munmap+0x228/0x2f0 [] sys_munmap+0x2f/0x50 [] sysenter_do_call+0x12/0x36 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/