-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 5/26/14, 1:21 PM, David Sterba wrote:
> This patch + the fix to add/remove links on the respective device 
> operation seem to work with the previous test that used to catch 
> the slab corruptions, so far so good.
> 
> After this has been running fine for a few hours, I've tried to do 
> a simple check
> 
> # cd /sys/fs/btrfs # find . -type f -exec cat '{}' \;
> 
> that produced this lockdep warning:

Thanks David. That's easy enough to fix.

- -Jeff

> [ 4943.485655] run xfstest btrfs/004 [ 4944.053971] BTRFS: device 
> fsid 6b90f3ce-cd83-44da-88e2-c89a4607b782 devid 1 transid 4 
> /dev/sda9 [ 4944.067637] BTRFS info (device sda9): disk space 
> caching is enabled [ 4944.075621] BTRFS: flagging fs with big 
> metadata feature [ 4944.093954] BTRFS: creating UUID tree [ 
> 4950.077597] BTRFS info (device sda9): setting 8 feature flag [ 
> 4950.084961] BTRFS info (device sda9): disk space caching is 
> enabled [ 4952.992993] [ 4952.996020] 
> ====================================================== [ 
> 4952.996020] [ INFO: possible circular locking dependency detected 
> ] [ 4952.996020] 3.15.0-rc7-default+ #146 Tainted: G        W [ 
> 4952.996020] 
> ------------------------------------------------------- [ 
> 4952.996020] cat/3822 is trying to acquire lock: [ 4952.996020] 
> (&found->groups_sem){++++..}, at: [<ffffffffa004babe>] 
> raid_bytes_show+0x3e/0xd0 [btrfs] [ 4952.996020] [ 4952.996020]
> but task is already holding lock: [ 4952.996020] 
> (s_active#149){++++.+}, at: [<ffffffff811ef1c9>] 
> kernfs_seq_start+0x39/0xb0 [ 4952.996020] [ 4952.996020] which
> lock already depends on the new lock. [ 4952.996020] [ 4952.996020]
> [ 4952.996020] the existing dependency chain (in reverse order) is:
> [ 4952.996020] -> #1 (s_active#149){++++.+}: [ 4952.996020] 
> [<ffffffff810b0662>] lock_acquire+0x92/0x120 [ 4952.996020] 
> [<ffffffff811edc07>] __kernfs_remove+0x2b7/0x380 [ 4952.996020] 
> [<ffffffff811ee787>] kernfs_remove+0x27/0x40 [ 4952.996020] 
> [<ffffffff811f0b3a>] sysfs_remove_dir+0x5a/0x90 [ 4952.996020] 
> [<ffffffff813ba028>] kobject_del+0x18/0x90 [ 4952.996020] 
> [<ffffffffa0023cb2>] btrfs_remove_block_group+0x442/0x580 [btrfs]
> [ 4952.996020]        [<ffffffffa005caf4>] 
> btrfs_relocate_chunk+0x624/0x770 [btrfs] [ 4952.996020] 
> [<ffffffffa005f652>] btrfs_balance+0x902/0xf50 [btrfs] [ 
> 4952.996020]        [<ffffffffa006b090>] 
> btrfs_ioctl_balance+0x1e0/0x350 [btrfs] [ 4952.996020] 
> [<ffffffffa006d4a9>] btrfs_ioctl+0xc39/0x1830 [btrfs] [ 
> 4952.996020]        [<ffffffff8118c381>] do_vfs_ioctl+0x91/0x560 [ 
> 4952.996020]        [<ffffffff8118c8a3>] SyS_ioctl+0x53/0x80 [ 
> 4952.996020]        [<ffffffff81a16cd2>] 
> system_call_fastpath+0x16/0x1b [ 4952.996020] -> #0 
> (&found->groups_sem){++++..}: [ 4952.996020] [<ffffffff810afc5c>]
> __lock_acquire+0x1c4c/0x1fa0 [ 4952.996020] [<ffffffff810b0662>]
> lock_acquire+0x92/0x120 [ 4952.996020] [<ffffffff81a0bedc>]
> down_read+0x4c/0xa0 [ 4952.996020] [<ffffffffa004babe>]
> raid_bytes_show+0x3e/0xd0 [btrfs] [ 4952.996020]
> [<ffffffff813b9ef6>] kobj_attr_show+0x16/0x20 [ 4952.996020]
> [<ffffffff811f04e9>] sysfs_kf_seq_show+0xd9/0x230 [ 4952.996020] 
> [<ffffffff811eec56>] kernfs_seq_show+0x26/0x30 [ 4952.996020] 
> [<ffffffff8119ec8f>] seq_read+0xef/0x410 [ 4952.996020] 
> [<ffffffff811efa35>] kernfs_fop_read+0x125/0x180 [ 4952.996020] 
> [<ffffffff81179fe4>] vfs_read+0xb4/0x180 [ 4952.996020] 
> [<ffffffff8117a269>] SyS_read+0x59/0xd0 [ 4952.996020] 
> [<ffffffff81a16cd2>] system_call_fastpath+0x16/0x1b [ 4952.996020]
>  [ 4952.996020] other info that might help us debug this: [ 
> 4952.996020] [ 4952.996020]  Possible unsafe locking scenario: [ 
> 4952.996020] [ 4952.996020]        CPU0                    CPU1 [ 
> 4952.996020]        ----                    ---- [ 4952.996020] 
> lock(s_active#149); [ 4952.996020] lock(&found->groups_sem); [
> 4952.996020] lock(s_active#149); [ 4952.996020]
> lock(&found->groups_sem); [ 4952.996020] [ 4952.996020]  ***
> DEADLOCK *** [ 4952.996020] [ 4952.996020] 3 locks held by
> cat/3822: [ 4952.996020]  #0: (&p->lock){+.+.+.}, at:
> [<ffffffff8119ebdf>] seq_read+0x3f/0x410 [ 4952.996020]  #1:
> (&of->mutex){+.+.+.}, at: [<ffffffff811ef1c1>] 
> kernfs_seq_start+0x31/0xb0 [ 4952.996020]  #2: 
> (s_active#149){++++.+}, at: [<ffffffff811ef1c9>] 
> kernfs_seq_start+0x39/0xb0 [ 4952.996020] [ 4952.996020] stack 
> backtrace: [ 4952.996020] CPU: 0 PID: 3822 Comm: cat Tainted: G W
> 3.15.0-rc7-default+ #146 [ 4952.996020] Hardware name: Intel 
> Corporation Santa Rosa platform/Matanzas, BIOS 
> TSRSCRB1.86C.0047.B00.0610170821 10/17/06 [ 4952.996020] 
> ffffffff82828a50 ffff880065aedb88 ffffffff81a07898 0000000000000001
> [ 4952.996020]  ffffffff82821230 ffff880065aedbd8 ffffffff810acb74
> 00000000001d4500 [ 4952.996020]  ffff880065aedc58 0000000000000002
> ffff880066ab2c08 0000000000000002 [ 4952.996020] Call Trace: [
> 4952.996020]  [<ffffffff81a07898>] dump_stack+0x51/0x71 [
> 4952.996020]  [<ffffffff810acb74>] print_circular_bug+0x214/0x310 [
> 4952.996020]  [<ffffffff810afc5c>] __lock_acquire+0x1c4c/0x1fa0 [
> 4952.996020]  [<ffffffffa004babe>] ? raid_bytes_show+0x3e/0xd0
> [btrfs] [ 4952.996020] [<ffffffff810b0662>] lock_acquire+0x92/0x120
> [ 4952.996020] [<ffffffffa004babe>] ? raid_bytes_show+0x3e/0xd0
> [btrfs] [ 4952.996020]  [<ffffffff81a0bedc>] down_read+0x4c/0xa0 [ 
> 4952.996020]  [<ffffffffa004babe>] ? raid_bytes_show+0x3e/0xd0 
> [btrfs] [ 4952.996020]  [<ffffffff810aa37f>] ? 
> __lock_is_held+0x5f/0x80 [ 4952.996020]  [<ffffffffa004babe>] 
> raid_bytes_show+0x3e/0xd0 [btrfs] [ 4952.996020] 
> [<ffffffff813b9ef6>] kobj_attr_show+0x16/0x20 [ 4952.996020] 
> [<ffffffff811f04e9>] sysfs_kf_seq_show+0xd9/0x230 [ 4952.996020] 
> [<ffffffff811eec56>] kernfs_seq_show+0x26/0x30 [ 4952.996020] 
> [<ffffffff8119ec8f>] seq_read+0xef/0x410 [ 4952.996020] 
> [<ffffffff811efa35>] kernfs_fop_read+0x125/0x180 [ 4952.996020] 
> [<ffffffff8117941e>] ? rw_verify_area+0xe/0xc0 [ 4952.996020] 
> [<ffffffff81179fe4>] vfs_read+0xb4/0x180 [ 4952.996020] 
> [<ffffffff8117a269>] SyS_read+0x59/0xd0 [ 4952.996020] 
> [<ffffffff81a16cd2>] system_call_fastpath+0x16/0x1b
> 
> -- To unsubscribe from this list: send the line "unsubscribe 
> linux-btrfs" in the body of a message to majord...@vger.kernel.org
>  More majordomo info at
> http://vger.kernel.org/majordomo-info.html
> 


- -- 
Jeff Mahoney
SUSE Labs
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
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=f4En
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to