mmotm 2010-11-09 - lockdep splat in ext4/quota code
From: Valdis . Kletnieks
Date: Thu Nov 11 2010 - 14:26:05 EST
On Tue, 09 Nov 2010 15:31:15 PST, akpm@xxxxxxxxxxxxxxxxxxxx said:
> The mm-of-the-moment snapshot 2010-11-09-15-31 has been uploaded to
>
> http://userweb.kernel.org/~akpm/mmotm/
Still seeing this just after quotas get turned on ext4. First seen in
2.6.36-mmotm1022, but problem has apparently been there since
2.6.36-rc5-mmotm0922 (oldest kernel I have lying around).
The last few relevant commands from rc.sysinit:
/sbin/quotaon -aug
dd if=/dev/urandom of=/var/lib/random-seed count=1 bs=512 <- this triggers the trace
[ 48.967833] =======================================================
[ 48.968162] [ INFO: possible circular locking dependency detected ]
[ 48.968411] 2.6.37-rc1-mmotm1109 #1
[ 48.968553] -------------------------------------------------------
[ 48.968592] dd/3253 is trying to acquire lock:
[ 48.968592] (&s->s_dquot.dqio_mutex){+.+...}, at: [<ffffffff81141b0a>] dquot_commit+0x26/0xda
[ 48.968592]
[ 48.968592] but task is already holding lock:
[ 48.968592] (&s->s_dquot.dqptr_sem){++++..}, at: [<ffffffff81143e70>] __dquot_free_space+0x66/0x16b
[ 48.968592]
[ 48.968592] which lock already depends on the new lock.
[ 48.968592]
[ 48.968592]
[ 48.968592] the existing dependency chain (in reverse order) is:
[ 48.968592]
[ 48.968592] -> #2 (&s->s_dquot.dqptr_sem){++++..}:
[ 48.968592] [<ffffffff8106b441>] lock_acquire+0x100/0x126
[ 48.968592] [<ffffffff81565615>] down_read+0x42/0x51
[ 48.968592] [<ffffffff81143e70>] __dquot_free_space+0x66/0x16b
[ 48.968592] [<ffffffff81199a70>] dquot_free_block+0x19/0x2a
[ 48.968592] [<ffffffff8119fc4f>] ext4_free_blocks+0x75b/0x810
[ 48.968592] [<ffffffff81196f0f>] ext4_ext_truncate+0x3af/0x853
[ 48.968592] [<ffffffff8117a02e>] ext4_truncate+0x98/0x51a
[ 48.968592] [<ffffffff810c46a4>] vmtruncate+0x3f/0x4b
[ 48.968592] [<ffffffff8117af55>] ext4_setattr+0x305/0x3a7
[ 48.968592] [<ffffffff8110c6d9>] notify_change+0x1a1/0x2a1
[ 48.968592] [<ffffffff810f49fa>] do_truncate+0x67/0x84
[ 48.968592] [<ffffffff811029f5>] do_last+0x4ce/0x5b2
[ 48.968592] [<ffffffff81102d21>] do_filp_open+0x248/0x64a
[ 48.968592] [<ffffffff810f5481>] do_sys_open+0x60/0xfb
[ 48.968592] [<ffffffff810f5537>] sys_open+0x1b/0x1d
[ 48.968592] [<ffffffff810027eb>] system_call_fastpath+0x16/0x1b
[ 48.968592]
[ 48.968592] -> #1 (&ei->i_data_sem){++++..}:
[ 48.968592] [<ffffffff8106b441>] lock_acquire+0x100/0x126
[ 48.968592] [<ffffffff81565615>] down_read+0x42/0x51
[ 48.968592] [<ffffffff81179383>] ext4_map_blocks+0x3e/0x20e
[ 48.968592] [<ffffffff81179e0b>] ext4_getblk+0x71/0x19b
[ 48.968592] [<ffffffff81179f46>] ext4_bread+0x11/0x61
[ 48.968592] [<ffffffff8118b297>] ext4_quota_read+0x86/0xf0
[ 48.968592] [<ffffffff81145131>] v2_read_header+0x1e/0x4f
[ 48.968592] [<ffffffff811455de>] v2_read_file_info+0x20/0x2ae
[ 48.968592] [<ffffffff81144423>] vfs_load_quota_inode+0x292/0x448
[ 48.968592] [<ffffffff8114480e>] dquot_quota_on_path+0x4c/0x55
[ 48.968592] [<ffffffff8118bc97>] ext4_quota_on+0x123/0x175
[ 48.968592] [<ffffffff81146cf2>] do_quotactl+0x1d1/0x465
[ 48.968592] [<ffffffff81147083>] sys_quotactl+0xfd/0x11a
[ 48.968592] [<ffffffff810027eb>] system_call_fastpath+0x16/0x1b
[ 48.968592]
[ 48.968592] -> #0 (&s->s_dquot.dqio_mutex){+.+...}:
[ 48.968592] [<ffffffff8106ac2d>] __lock_acquire+0xa4c/0xd4e
[ 48.968592] [<ffffffff8106b441>] lock_acquire+0x100/0x126
[ 48.968592] [<ffffffff81564bbf>] __mutex_lock_common+0x5d/0x56c
[ 48.968592] [<ffffffff81565174>] mutex_lock_nested+0x34/0x39
[ 48.968592] [<ffffffff81141b0a>] dquot_commit+0x26/0xda
[ 48.968592] [<ffffffff8118d622>] ext4_write_dquot+0x65/0x87
[ 48.968592] [<ffffffff8118d682>] ext4_mark_dquot_dirty+0x3e/0x49
[ 48.968592] [<ffffffff81141790>] mark_all_dquot_dirty+0x22/0x48
[ 48.968592] [<ffffffff81143f43>] __dquot_free_space+0x139/0x16b
[ 48.968592] [<ffffffff81199a70>] dquot_free_block+0x19/0x2a
[ 48.968592] [<ffffffff8119fc4f>] ext4_free_blocks+0x75b/0x810
[ 48.968592] [<ffffffff81196f0f>] ext4_ext_truncate+0x3af/0x853
[ 48.968592] [<ffffffff8117a02e>] ext4_truncate+0x98/0x51a
[ 48.968592] [<ffffffff810c46a4>] vmtruncate+0x3f/0x4b
[ 48.968592] [<ffffffff8117af55>] ext4_setattr+0x305/0x3a7
[ 48.968592] [<ffffffff8110c6d9>] notify_change+0x1a1/0x2a1
[ 48.968592] [<ffffffff810f49fa>] do_truncate+0x67/0x84
[ 48.968592] [<ffffffff811029f5>] do_last+0x4ce/0x5b2
[ 48.968592] [<ffffffff81102d21>] do_filp_open+0x248/0x64a
[ 48.968592] [<ffffffff810f5481>] do_sys_open+0x60/0xfb
[ 48.968592] [<ffffffff810f5537>] sys_open+0x1b/0x1d
[ 48.968592] [<ffffffff810027eb>] system_call_fastpath+0x16/0x1b
[ 48.968592]
[ 48.968592] other info that might help us debug this:
[ 48.968592]
[ 49.458584] 5 locks held by dd/3253:
[ 49.458584] #0: (&sb->s_type->i_mutex_key#13){+.+.+.}, at: [<ffffffff810f49ee>] do_truncate+0x5b/0x84
[ 49.458584] #1: (&sb->s_type->i_alloc_sem_key#5){+.+...}, at: [<ffffffff8110c6c1>] notify_change+0x189/0x2a1
[ 49.458584] #2: (jbd2_handle){+.+...}, at: [<ffffffff811ad5b4>] start_this_handle+0x57a/0x605
[ 49.458584] #3: (&ei->i_data_sem){++++..}, at: [<ffffffff81196bf1>] ext4_ext_truncate+0x91/0x853
[ 49.458584] #4: (&s->s_dquot.dqptr_sem){++++..}, at: [<ffffffff81143e70>] __dquot_free_space+0x66/0x16b
[ 49.458584]
[ 49.458584] stack backtrace:
[ 49.458584] Pid: 3253, comm: dd Not tainted 2.6.37-rc1-mmotm1109 #1
[ 49.458584] Call Trace:
[ 49.458584] [<ffffffff81069591>] print_circular_bug+0xa8/0xb7
[ 49.458584] [<ffffffff8106ac2d>] __lock_acquire+0xa4c/0xd4e
[ 49.458584] [<ffffffff81141b0a>] ? dquot_commit+0x26/0xda
[ 49.458584] [<ffffffff8106b441>] lock_acquire+0x100/0x126
[ 49.458584] [<ffffffff81141b0a>] ? dquot_commit+0x26/0xda
[ 49.458584] [<ffffffff81564bbf>] __mutex_lock_common+0x5d/0x56c
[ 49.458584] [<ffffffff81141b0a>] ? dquot_commit+0x26/0xda
[ 49.458584] [<ffffffff81141ef2>] ? dquot_mark_dquot_dirty+0x27/0x7a
[ 49.458584] [<ffffffff81141b0a>] ? dquot_commit+0x26/0xda
[ 49.458584] [<ffffffff81565174>] mutex_lock_nested+0x34/0x39
[ 49.458584] [<ffffffff81141b0a>] dquot_commit+0x26/0xda
[ 49.458584] [<ffffffff8118d622>] ext4_write_dquot+0x65/0x87
[ 49.458584] [<ffffffff8118d682>] ext4_mark_dquot_dirty+0x3e/0x49
[ 49.458584] [<ffffffff81141790>] mark_all_dquot_dirty+0x22/0x48
[ 49.458584] [<ffffffff81143f43>] __dquot_free_space+0x139/0x16b
[ 49.458584] [<ffffffff81199a70>] dquot_free_block+0x19/0x2a
[ 49.458584] [<ffffffff8119fc4f>] ext4_free_blocks+0x75b/0x810
[ 49.458584] [<ffffffff811ada1d>] ? jbd2_journal_extend+0x5d/0xb8
[ 49.458584] [<ffffffff81196f0f>] ext4_ext_truncate+0x3af/0x853
[ 49.458584] [<ffffffff810a5759>] ? trace_preempt_on+0x15/0x28
[ 49.458584] [<ffffffff810d63f6>] ? unmap_mapping_range+0x279/0x288
[ 49.458584] [<ffffffff8117a02e>] ext4_truncate+0x98/0x51a
[ 49.458584] [<ffffffff810d63f6>] ? unmap_mapping_range+0x279/0x288
[ 49.458584] [<ffffffff8106b861>] ? trace_hardirqs_on_caller+0x117/0x13b
[ 49.458584] [<ffffffff8106b892>] ? trace_hardirqs_on+0xd/0xf
[ 49.458584] [<ffffffff810c46a4>] vmtruncate+0x3f/0x4b
[ 49.458584] [<ffffffff8117af55>] ext4_setattr+0x305/0x3a7
[ 49.458584] [<ffffffff8110c6d9>] notify_change+0x1a1/0x2a1
[ 49.458584] [<ffffffff810f49fa>] do_truncate+0x67/0x84
[ 49.458584] [<ffffffff810ff92d>] ? get_write_access+0x49/0x50
[ 49.458584] [<ffffffff81566794>] ? _raw_spin_unlock+0x30/0x69
[ 49.458584] [<ffffffff8156a040>] ? sub_preempt_count+0x35/0x48
[ 49.458584] [<ffffffff811e0833>] ? security_path_truncate+0x48/0x4d
[ 49.458584] [<ffffffff811029f5>] do_last+0x4ce/0x5b2
[ 49.458584] [<ffffffff81102d21>] do_filp_open+0x248/0x64a
[ 49.458584] [<ffffffff810a5759>] ? trace_preempt_on+0x15/0x28
[ 49.458584] [<ffffffff8110d8ce>] ? alloc_fd+0x17c/0x18e
[ 49.458584] [<ffffffff81566794>] ? _raw_spin_unlock+0x30/0x69
[ 49.458584] [<ffffffff8156a040>] ? sub_preempt_count+0x35/0x48
[ 49.458584] [<ffffffff8110d8ce>] ? alloc_fd+0x17c/0x18e
[ 49.458584] [<ffffffff810f5481>] do_sys_open+0x60/0xfb
[ 49.458584] [<ffffffff81565fde>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 49.458584] [<ffffffff810f5537>] sys_open+0x1b/0x1d
[ 49.458584] [<ffffffff810027eb>] system_call_fastpath+0x16/0x1b
Attachment:
pgp00000.pgp
Description: PGP signature