From: "Aneesh Kumar K.V" Subject: circular locking dependency detected with lock inversion Date: Tue, 17 Jun 2008 22:32:49 +0530 Message-ID: <20080617170249.GB29335@skywalker> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: "linux-ext4@vger.kernel.org" To: Jan Kara Return-path: Received: from e28smtp04.in.ibm.com ([59.145.155.4]:33265 "EHLO e28esmtp04.in.ibm.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755125AbYFQRDf (ORCPT ); Tue, 17 Jun 2008 13:03:35 -0400 Received: from d28relay02.in.ibm.com (d28relay02.in.ibm.com [9.184.220.59]) by e28esmtp04.in.ibm.com (8.13.1/8.13.1) with ESMTP id m5HH38Ro003760 for ; Tue, 17 Jun 2008 22:33:08 +0530 Received: from d28av01.in.ibm.com (d28av01.in.ibm.com [9.184.220.63]) by d28relay02.in.ibm.com (8.13.8/8.13.8/NCO v9.0) with ESMTP id m5HH2H2C811248 for ; Tue, 17 Jun 2008 22:32:17 +0530 Received: from d28av01.in.ibm.com (loopback [127.0.0.1]) by d28av01.in.ibm.com (8.13.1/8.13.3) with ESMTP id m5HH37Hj021837 for ; Tue, 17 Jun 2008 22:33:07 +0530 Content-Disposition: inline Sender: linux-ext4-owner@vger.kernel.org List-ID: ======================================================= [ INFO: possible circular locking dependency detected ] 2.6.26-rc6-autokern1 #1 ------------------------------------------------------- umount/28231 is trying to acquire lock: (&ei->i_data_sem){----}, at: [] ext4_get_blocks_wrap+0x36/0x15c but task is already holding lock: (&type->s_lock_key#7){--..}, at: [] lock_super+0x22/0x24 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&type->s_lock_key#7){--..}: [] __lock_acquire+0xc3c/0xe20 [] lock_acquire+0x53/0x6d [] mutex_lock_nested+0xd6/0x27d [] lock_super+0x22/0x24 [] ext4_orphan_add+0x29/0x17d [] ext4_ext_truncate+0x91/0x19c [] ext4_truncate+0xbb/0x568 [] vmtruncate+0xc2/0xe0 [] inode_setattr+0x28/0x123 [] ext4_setattr+0x226/0x284 [] notify_change+0x169/0x27b [] do_truncate+0x60/0x7e [] sys_truncate+0x172/0x1a8 [] sys32_truncate64+0x16/0x18 [] ia32_sysret+0x0/0xa [] 0xffffffffffffffff -> #0 (&ei->i_data_sem){----}: [] __lock_acquire+0xb24/0xe20 [] lock_acquire+0x53/0x6d [] down_read+0x25/0x31 [] ext4_get_blocks_wrap+0x36/0x15c [] ext4_get_block+0xb5/0xf3 [] generic_block_bmap+0x3a/0x40 [] ext4_bmap+0x70/0x79 [] bmap+0x1f/0x27 [] jbd2_journal_bmap+0x2c/0x8a [] jbd2_journal_next_log_block+0x76/0x7e [] jbd2_journal_get_descriptor_buffer+0x17/0x80 [] jbd2_journal_commit_transaction+0x56e/0x1045 [] jbd2_journal_destroy+0xfc/0x250 [] ext4_put_super+0x3e/0x213 [] generic_shutdown_super+0x63/0xf8 [] kill_block_super+0x12/0x27 [] deactivate_super+0x4c/0x61 [] mntput_no_expire+0xed/0x120 [] sys_umount+0x312/0x327 [] ia32_sysret+0x0/0xa [] 0xffffffffffffffff other info that might help us debug this: 2 locks held by umount/28231: #0: (&type->s_umount_key#14){----}, at: [] deactivate_super+0x44/0x61 #1: (&type->s_lock_key#7){--..}, at: [] lock_super+0x22/0x24 stack backtrace: Pid: 28231, comm: umount Not tainted 2.6.26-rc6-autokern1 #1 Call Trace: [] print_circular_bug_tail+0x70/0x7b [] __lock_acquire+0xb24/0xe20 [] ? find_usage_backwards+0xba/0xe0 [] lock_acquire+0x53/0x6d [] ? ext4_get_blocks_wrap+0x36/0x15c [] down_read+0x25/0x31 [] ext4_get_blocks_wrap+0x36/0x15c [] ext4_get_block+0xb5/0xf3 [] generic_block_bmap+0x3a/0x40 [] ? __lock_acquire+0x806/0xe20 [] ? __lock_acquire+0x806/0xe20 [] ext4_bmap+0x70/0x79 [] bmap+0x1f/0x27 [] jbd2_journal_bmap+0x2c/0x8a [] jbd2_journal_next_log_block+0x76/0x7e [] jbd2_journal_get_descriptor_buffer+0x17/0x80 [] jbd2_journal_commit_transaction+0x56e/0x1045 [] ? _spin_unlock_irq+0x28/0x4e [] ? trace_hardirqs_on+0xed/0x111 [] ? _spin_unlock_irq+0x33/0x4e [] ? __lock_acquire+0x806/0xe20 [] jbd2_journal_destroy+0xfc/0x250 [] ? autoremove_wake_function+0x0/0x36 [] ? _spin_unlock+0x45/0x49 [] ? autoremove_wake_function+0x0/0x36 [] ext4_put_super+0x3e/0x213 [] ? ext4_put_super+0x0/0x213 [] ? ext4_put_super+0x0/0x213 [] generic_shutdown_super+0x63/0xf8 [] kill_block_super+0x12/0x27 [] deactivate_super+0x4c/0x61 [] mntput_no_expire+0xed/0x120 [] sys_umount+0x312/0x327 [] ? up_read+0x24/0x28 [] ? trace_hardirqs_on_thunk+0x35/0x3a [] ? trace_hardirqs_on+0xed/0x111 [] ? trace_hardirqs_on_thunk+0x35/0x3a [] ? __up_read+0x17/0x9b [] ? __up_read+0x17/0x9b [] ia32_sysret+0x0/0xa