Running with lockdep I see these warnings (running 2.6.37-rc1)

It occurred during the time when rsync is running backup.


Nov 14 12:03:31 nehalam kernel: [ 5527.284541] 
=============================================
Nov 14 12:03:31 nehalam kernel: [ 5527.284544] [ INFO: possible recursive 
locking detected ]
Nov 14 12:03:31 nehalam kernel: [ 5527.284546] 2.6.37-rc1+ #67
Nov 14 12:03:31 nehalam kernel: [ 5527.284547] 
---------------------------------------------
Nov 14 12:03:31 nehalam kernel: [ 5527.284549] rsync/2782 is trying to acquire 
lock:
Nov 14 12:03:31 nehalam kernel: [ 5527.284551]  (&(&eb->lock)->rlock){+.+...}, 
at: [<ffffffffa005f026>] btrfs_try_spin_lock+0x53/0xd1 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284567] 
Nov 14 12:03:31 nehalam kernel: [ 5527.284567] but task is already holding lock:
Nov 14 12:03:31 nehalam kernel: [ 5527.284569]  (&(&eb->lock)->rlock){+.+...}, 
at: [<ffffffffa005f0c6>] btrfs_clear_lock_blocking+0x22/0x2c [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284581] 
Nov 14 12:03:31 nehalam kernel: [ 5527.284581] other info that might help us 
debug this:
Nov 14 12:03:31 nehalam kernel: [ 5527.284583] 2 locks held by rsync/2782:
Nov 14 12:03:31 nehalam kernel: [ 5527.284585]  #0:  
(&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff810f98be>] 
do_lookup+0x9d/0x10d
Nov 14 12:03:31 nehalam kernel: [ 5527.284592]  #1:  
(&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa005f0c6>] 
btrfs_clear_lock_blocking+0x22/0x2c [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284605] 
Nov 14 12:03:31 nehalam kernel: [ 5527.284605] stack backtrace:
Nov 14 12:03:31 nehalam kernel: [ 5527.284607] Pid: 2782, comm: rsync Not 
tainted 2.6.37-rc1+ #67
Nov 14 12:03:31 nehalam kernel: [ 5527.284609] Call Trace:
Nov 14 12:03:31 nehalam kernel: [ 5527.284615]  [<ffffffff8106b651>] 
__lock_acquire+0xc7a/0xcf1
Nov 14 12:03:31 nehalam kernel: [ 5527.284619]  [<ffffffff810ba186>] ? 
activate_page+0x130/0x13f
Nov 14 12:03:31 nehalam kernel: [ 5527.284622]  [<ffffffff8106b799>] 
lock_acquire+0xd1/0xf7
Nov 14 12:03:31 nehalam kernel: [ 5527.284633]  [<ffffffffa005f026>] ? 
btrfs_try_spin_lock+0x53/0xd1 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284638]  [<ffffffff813b31c7>] 
_raw_spin_lock+0x31/0x40
Nov 14 12:03:31 nehalam kernel: [ 5527.284648]  [<ffffffffa005f026>] ? 
btrfs_try_spin_lock+0x53/0xd1 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284659]  [<ffffffffa005f0c6>] ? 
btrfs_clear_lock_blocking+0x22/0x2c [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284669]  [<ffffffffa005f026>] 
btrfs_try_spin_lock+0x53/0xd1 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284677]  [<ffffffffa0022714>] 
btrfs_search_slot+0x3e6/0x513 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284687]  [<ffffffffa003121f>] 
btrfs_lookup_inode+0x2f/0x8f [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284698]  [<ffffffffa003ac58>] ? 
btrfs_init_locked_inode+0x0/0x2e [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284709]  [<ffffffffa003e2a7>] 
btrfs_iget+0xc3/0x415 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284721]  [<ffffffffa00419b9>] 
btrfs_lookup_dentry+0x105/0x3c4 [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284724]  [<ffffffff81069db5>] ? 
trace_hardirqs_on+0xd/0xf
Nov 14 12:03:31 nehalam kernel: [ 5527.284735]  [<ffffffffa0041c8e>] 
btrfs_lookup+0x16/0x2e [btrfs]
Nov 14 12:03:31 nehalam kernel: [ 5527.284738]  [<ffffffff810f97b5>] 
d_alloc_and_lookup+0x55/0x74
Nov 14 12:03:31 nehalam kernel: [ 5527.284741]  [<ffffffff810f98dc>] 
do_lookup+0xbb/0x10d
Nov 14 12:03:31 nehalam kernel: [ 5527.284744]  [<ffffffff810fb6a1>] 
link_path_walk+0x2a6/0x3fc
Nov 14 12:03:31 nehalam kernel: [ 5527.284746]  [<ffffffff810fb8f3>] 
path_walk+0x69/0xd9
Nov 14 12:03:31 nehalam kernel: [ 5527.284750]  [<ffffffff811e23c2>] ? 
strncpy_from_user+0x48/0x76
Nov 14 12:03:31 nehalam kernel: [ 5527.284753]  [<ffffffff810fba35>] 
do_path_lookup+0x2a/0x4f
Nov 14 12:03:31 nehalam kernel: [ 5527.284756]  [<ffffffff810fc52f>] 
user_path_at+0x56/0x9a
Nov 14 12:03:31 nehalam kernel: [ 5527.284760]  [<ffffffff810caa14>] ? 
might_fault+0x5c/0xac
Nov 14 12:03:31 nehalam kernel: [ 5527.284764]  [<ffffffff810f4701>] ? 
cp_new_stat+0xf7/0x10d
Nov 14 12:03:31 nehalam kernel: [ 5527.284767]  [<ffffffff810f45a2>] 
vfs_fstatat+0x37/0x62
Nov 14 12:03:31 nehalam kernel: [ 5527.284770]  [<ffffffff810f45eb>] 
vfs_lstat+0x1e/0x20
Nov 14 12:03:31 nehalam kernel: [ 5527.284772]  [<ffffffff810f4773>] 
sys_newlstat+0x1f/0x3d
Nov 14 12:03:31 nehalam kernel: [ 5527.284776]  [<ffffffff81069d84>] ? 
trace_hardirqs_on_caller+0x118/0x13c
Nov 14 12:03:31 nehalam kernel: [ 5527.284779]  [<ffffffff813b2fe0>] ? 
trace_hardirqs_on_thunk+0x3a/0x3f
Nov 14 12:03:31 nehalam kernel: [ 5527.284783]  [<ffffffff8100245b>] 
system_call_fastpath+0x16/0x1b
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to