Running with lockdep I see these warnings (running 2.6.37-rc1) It occurred during the time when rsync is running backup.
Nov 14 12:03:31 nehalam kernel: [ 5527.284541] ============================================= Nov 14 12:03:31 nehalam kernel: [ 5527.284544] [ INFO: possible recursive locking detected ] Nov 14 12:03:31 nehalam kernel: [ 5527.284546] 2.6.37-rc1+ #67 Nov 14 12:03:31 nehalam kernel: [ 5527.284547] --------------------------------------------- Nov 14 12:03:31 nehalam kernel: [ 5527.284549] rsync/2782 is trying to acquire lock: Nov 14 12:03:31 nehalam kernel: [ 5527.284551] (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa005f026>] btrfs_try_spin_lock+0x53/0xd1 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284567] Nov 14 12:03:31 nehalam kernel: [ 5527.284567] but task is already holding lock: Nov 14 12:03:31 nehalam kernel: [ 5527.284569] (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa005f0c6>] btrfs_clear_lock_blocking+0x22/0x2c [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284581] Nov 14 12:03:31 nehalam kernel: [ 5527.284581] other info that might help us debug this: Nov 14 12:03:31 nehalam kernel: [ 5527.284583] 2 locks held by rsync/2782: Nov 14 12:03:31 nehalam kernel: [ 5527.284585] #0: (&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff810f98be>] do_lookup+0x9d/0x10d Nov 14 12:03:31 nehalam kernel: [ 5527.284592] #1: (&(&eb->lock)->rlock){+.+...}, at: [<ffffffffa005f0c6>] btrfs_clear_lock_blocking+0x22/0x2c [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284605] Nov 14 12:03:31 nehalam kernel: [ 5527.284605] stack backtrace: Nov 14 12:03:31 nehalam kernel: [ 5527.284607] Pid: 2782, comm: rsync Not tainted 2.6.37-rc1+ #67 Nov 14 12:03:31 nehalam kernel: [ 5527.284609] Call Trace: Nov 14 12:03:31 nehalam kernel: [ 5527.284615] [<ffffffff8106b651>] __lock_acquire+0xc7a/0xcf1 Nov 14 12:03:31 nehalam kernel: [ 5527.284619] [<ffffffff810ba186>] ? activate_page+0x130/0x13f Nov 14 12:03:31 nehalam kernel: [ 5527.284622] [<ffffffff8106b799>] lock_acquire+0xd1/0xf7 Nov 14 12:03:31 nehalam kernel: [ 5527.284633] [<ffffffffa005f026>] ? btrfs_try_spin_lock+0x53/0xd1 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284638] [<ffffffff813b31c7>] _raw_spin_lock+0x31/0x40 Nov 14 12:03:31 nehalam kernel: [ 5527.284648] [<ffffffffa005f026>] ? btrfs_try_spin_lock+0x53/0xd1 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284659] [<ffffffffa005f0c6>] ? btrfs_clear_lock_blocking+0x22/0x2c [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284669] [<ffffffffa005f026>] btrfs_try_spin_lock+0x53/0xd1 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284677] [<ffffffffa0022714>] btrfs_search_slot+0x3e6/0x513 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284687] [<ffffffffa003121f>] btrfs_lookup_inode+0x2f/0x8f [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284698] [<ffffffffa003ac58>] ? btrfs_init_locked_inode+0x0/0x2e [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284709] [<ffffffffa003e2a7>] btrfs_iget+0xc3/0x415 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284721] [<ffffffffa00419b9>] btrfs_lookup_dentry+0x105/0x3c4 [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284724] [<ffffffff81069db5>] ? trace_hardirqs_on+0xd/0xf Nov 14 12:03:31 nehalam kernel: [ 5527.284735] [<ffffffffa0041c8e>] btrfs_lookup+0x16/0x2e [btrfs] Nov 14 12:03:31 nehalam kernel: [ 5527.284738] [<ffffffff810f97b5>] d_alloc_and_lookup+0x55/0x74 Nov 14 12:03:31 nehalam kernel: [ 5527.284741] [<ffffffff810f98dc>] do_lookup+0xbb/0x10d Nov 14 12:03:31 nehalam kernel: [ 5527.284744] [<ffffffff810fb6a1>] link_path_walk+0x2a6/0x3fc Nov 14 12:03:31 nehalam kernel: [ 5527.284746] [<ffffffff810fb8f3>] path_walk+0x69/0xd9 Nov 14 12:03:31 nehalam kernel: [ 5527.284750] [<ffffffff811e23c2>] ? strncpy_from_user+0x48/0x76 Nov 14 12:03:31 nehalam kernel: [ 5527.284753] [<ffffffff810fba35>] do_path_lookup+0x2a/0x4f Nov 14 12:03:31 nehalam kernel: [ 5527.284756] [<ffffffff810fc52f>] user_path_at+0x56/0x9a Nov 14 12:03:31 nehalam kernel: [ 5527.284760] [<ffffffff810caa14>] ? might_fault+0x5c/0xac Nov 14 12:03:31 nehalam kernel: [ 5527.284764] [<ffffffff810f4701>] ? cp_new_stat+0xf7/0x10d Nov 14 12:03:31 nehalam kernel: [ 5527.284767] [<ffffffff810f45a2>] vfs_fstatat+0x37/0x62 Nov 14 12:03:31 nehalam kernel: [ 5527.284770] [<ffffffff810f45eb>] vfs_lstat+0x1e/0x20 Nov 14 12:03:31 nehalam kernel: [ 5527.284772] [<ffffffff810f4773>] sys_newlstat+0x1f/0x3d Nov 14 12:03:31 nehalam kernel: [ 5527.284776] [<ffffffff81069d84>] ? trace_hardirqs_on_caller+0x118/0x13c Nov 14 12:03:31 nehalam kernel: [ 5527.284779] [<ffffffff813b2fe0>] ? trace_hardirqs_on_thunk+0x3a/0x3f Nov 14 12:03:31 nehalam kernel: [ 5527.284783] [<ffffffff8100245b>] system_call_fastpath+0x16/0x1b -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html