A different lockdep chain, from test btrfs/014: [ 229.850151] ====================================================== [ 229.850788] [ INFO: possible circular locking dependency detected ] [ 229.850788] 3.15.0-rc7-default+ #146 Tainted: G W [ 229.850788] ------------------------------------------------------- [ 229.850788] btrfs/26558 is trying to acquire lock: [ 229.850788] (s_active#149){++++.+}, at: [<ffffffff811ee787>] kernfs_remove+0x27/0x40 [ 229.850788] [ 229.850788] but task is already holding lock: [ 229.850788] (&found->groups_sem){++++..}, at: [<ffffffffa0023abe>] btrfs_remove_block_group+0x24e/0x580 [btrfs] [ 229.850788] [ 229.850788] which lock already depends on the new lock. [ 229.850788] [ 229.850788] [ 229.850788] the existing dependency chain (in reverse order) is: [ 229.850788] -> #1 (&found->groups_sem){++++..}: [ 229.850788] [<ffffffff810b0662>] lock_acquire+0x92/0x120 [ 229.850788] [<ffffffff81a0bedc>] down_read+0x4c/0xa0 [ 229.850788] [<ffffffffa004babe>] raid_bytes_show+0x3e/0xd0 [btrfs] [ 229.850788] [<ffffffff813b9ef6>] kobj_attr_show+0x16/0x20 [ 229.850788] [<ffffffff811f04e9>] sysfs_kf_seq_show+0xd9/0x230 [ 229.850788] [<ffffffff811eec56>] kernfs_seq_show+0x26/0x30 [ 229.850788] [<ffffffff8119ec8f>] seq_read+0xef/0x410 [ 229.850788] [<ffffffff811efa35>] kernfs_fop_read+0x125/0x180 [ 229.850788] [<ffffffff81179fe4>] vfs_read+0xb4/0x180 [ 229.850788] [<ffffffff8117a269>] SyS_read+0x59/0xd0 [ 229.850788] [<ffffffff81a16cd2>] system_call_fastpath+0x16/0x1b [ 229.850788] -> #0 (s_active#149){++++.+}: [ 229.850788] [<ffffffff810afc5c>] __lock_acquire+0x1c4c/0x1fa0 [ 229.850788] [<ffffffff810b0662>] lock_acquire+0x92/0x120 [ 229.850788] [<ffffffff811edc07>] __kernfs_remove+0x2b7/0x380 [ 229.850788] [<ffffffff811ee787>] kernfs_remove+0x27/0x40 [ 229.850788] [<ffffffff811f0b3a>] sysfs_remove_dir+0x5a/0x90 [ 229.850788] [<ffffffff813ba028>] kobject_del+0x18/0x90 [ 229.850788] [<ffffffffa0023cb2>] btrfs_remove_block_group+0x442/0x580 [btrfs] [ 229.850788] [<ffffffffa005caf4>] btrfs_relocate_chunk+0x624/0x770 [btrfs] [ 229.850788] [<ffffffffa005f652>] btrfs_balance+0x902/0xf50 [btrfs] [ 229.850788] [<ffffffffa006b090>] btrfs_ioctl_balance+0x1e0/0x350 [btrfs] [ 229.850788] [<ffffffffa006d4a9>] btrfs_ioctl+0xc39/0x1830 [btrfs] [ 229.850788] [<ffffffff8118c381>] do_vfs_ioctl+0x91/0x560 [ 229.850788] [<ffffffff8118c8a3>] SyS_ioctl+0x53/0x80 [ 229.850788] [<ffffffff81a16cd2>] system_call_fastpath+0x16/0x1b [ 229.850788] [ 229.850788] other info that might help us debug this: [ 229.850788] [ 229.850788] Possible unsafe locking scenario: [ 229.850788] [ 229.850788] CPU0 CPU1 [ 229.850788] ---- ---- [ 229.850788] lock(&found->groups_sem); [ 229.850788] lock(s_active#149); [ 229.850788] lock(&found->groups_sem); [ 229.850788] lock(s_active#149); [ 229.850788] [ 229.850788] *** DEADLOCK *** [ 229.850788] [ 229.850788] 5 locks held by btrfs/26558: [ 229.850788] #0: (sb_writers#11){.+.+.+}, at: [<ffffffff8119a828>] mnt_want_write_file+0x28/0x60 [ 229.850788] #1: (&fs_info->volume_mutex){+.+.+.}, at: [<ffffffffa006afe1>] btrfs_ioctl_balance+0x131/0x350 [btrfs] [ 229.850788] #2: (sb_internal){.+.+..}, at: [<ffffffffa0035436>] start_transaction+0x456/0x550 [btrfs] [ 229.850788] #3: (&fs_info->chunk_mutex){+.+...}, at: [<ffffffffa005927e>] lock_chunks+0x1e/0x20 [btrfs] [ 229.850788] #4: (&found->groups_sem){++++..}, at: [<ffffffffa0023abe>] btrfs_remove_block_group+0x24e/0x580 [btrfs] [ 229.850788] [ 229.850788] stack backtrace: [ 229.850788] CPU: 1 PID: 26558 Comm: btrfs Tainted: G W 3.15.0-rc7-default+ #146 [ 229.850788] Hardware name: Intel Corporation Santa Rosa platform/Matanzas, BIOS TSRSCRB1.86C.0047.B00.0610170821 10/17/06 [ 229.850788] ffffffff8281faf0 ffff8800652a1818 ffffffff81a07898 0000000000000001 [ 229.850788] ffffffff82827310 ffff8800652a1868 ffffffff810acb74 00000000001d4500 [ 229.850788] ffff8800652a18e8 0000000000000004 ffff880075e0ac78 0000000000000004 [ 229.850788] Call Trace: [ 229.850788] [<ffffffff81a07898>] dump_stack+0x51/0x71 [ 229.850788] [<ffffffff810acb74>] print_circular_bug+0x214/0x310 [ 229.850788] [<ffffffff810afc5c>] __lock_acquire+0x1c4c/0x1fa0 [ 229.850788] [<ffffffff811ee787>] ? kernfs_remove+0x27/0x40 [ 229.850788] [<ffffffff810b0662>] lock_acquire+0x92/0x120 [ 229.850788] [<ffffffff811ee787>] ? kernfs_remove+0x27/0x40 [ 229.850788] [<ffffffff81a0bb39>] ? mutex_unlock+0x9/0x10 [ 229.850788] [<ffffffff811edc07>] __kernfs_remove+0x2b7/0x380 [ 229.850788] [<ffffffff811ee787>] ? kernfs_remove+0x27/0x40 [ 229.850788] [<ffffffff811ee77f>] ? kernfs_remove+0x1f/0x40 [ 229.850788] [<ffffffff811ee787>] kernfs_remove+0x27/0x40 [ 229.850788] [<ffffffff811f0b3a>] sysfs_remove_dir+0x5a/0x90 [ 229.850788] [<ffffffff813ba028>] kobject_del+0x18/0x90 [ 229.850788] [<ffffffffa0023cb2>] btrfs_remove_block_group+0x442/0x580 [btrfs] [ 229.850788] [<ffffffff810b112d>] ? trace_hardirqs_on_caller+0x11d/0x1e0 [ 229.850788] [<ffffffffa005caf4>] btrfs_relocate_chunk+0x624/0x770 [btrfs] [ 229.850788] [<ffffffffa0056ac6>] ? release_extent_buffer+0x36/0xe0 [btrfs] [ 229.850788] [<ffffffffa005706a>] ? free_extent_buffer+0x4a/0xc0 [btrfs] [ 229.850788] [<ffffffffa0057080>] ? free_extent_buffer+0x60/0xc0 [btrfs] [ 229.850788] [<ffffffffa005f652>] btrfs_balance+0x902/0xf50 [btrfs] [ 229.850788] [<ffffffffa006b090>] ? btrfs_ioctl_balance+0x1e0/0x350 [btrfs] [ 229.850788] [<ffffffff8116e3fa>] ? kmem_cache_alloc_trace+0x12a/0x180 [ 229.850788] [<ffffffffa006b090>] btrfs_ioctl_balance+0x1e0/0x350 [btrfs] [ 229.850788] [<ffffffffa006c870>] ? update_ioctl_balance_args+0x130/0x130 [btrfs] [ 229.850788] [<ffffffffa006d4a9>] btrfs_ioctl+0xc39/0x1830 [btrfs] [ 229.850788] [<ffffffff8118c381>] do_vfs_ioctl+0x91/0x560 [ 229.850788] [<ffffffff81197959>] ? __fget_light+0x9/0x70 [ 229.850788] [<ffffffff811979c9>] ? __fdget+0x9/0x20 [ 229.850788] [<ffffffff8118c8a3>] SyS_ioctl+0x53/0x80 [ 229.850788] [<ffffffff81a16cd2>] system_call_fastpath+0x16/0x1b
-- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html