Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755103Ab3JHVVL (ORCPT ); Tue, 8 Oct 2013 17:21:11 -0400 Received: from mx1.redhat.com ([209.132.183.28]:61827 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753313Ab3JHVVG (ORCPT ); Tue, 8 Oct 2013 17:21:06 -0400 Date: Tue, 8 Oct 2013 17:20:56 -0400 From: Dave Jones To: Linux Kernel Cc: xfs@oss.sgi.com, paulmck@linux.vnet.ibm.com Subject: xfs lockdep trace after unlink Message-ID: <20131008212056.GA7467@redhat.com> Mail-Followup-To: Dave Jones , Linux Kernel , xfs@oss.sgi.com, paulmck@linux.vnet.ibm.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2920 Lines: 61 I was deleting a kernel tree, when this happened.. RCU, or xfs ? BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. Please attach the output of /proc/lock_stat to the bug report CPU: 2 PID: 8109 Comm: rm Not tainted 3.12.0-rc4+ #96 ffffffff824bc2e0 ffff880026f416a8 ffffffff8172d798 41e619a2e5098827 ffff880026f41768 ffffffff810cc91f 0000000000000002 000010a02977b643 ffff880026f416d8 0000000000000212 ffff880026f416f8 ffffffff810c7329 Call Trace: [] dump_stack+0x4e/0x82 [] __lock_acquire+0x1b7f/0x1be0 [] ? get_lock_stats+0x19/0x60 [] ? lock_release_holdtime.part.29+0x9d/0x160 [] lock_acquire+0x93/0x200 [] ? try_to_wake_up+0x22a/0x350 [] _raw_spin_lock+0x40/0x80 [] ? try_to_wake_up+0x22a/0x350 [] try_to_wake_up+0x22a/0x350 [] default_wake_function+0x12/0x20 [] autoremove_wake_function+0x18/0x40 [] ? __wake_up+0x23/0x50 [] __wake_up_common+0x58/0x90 [] __wake_up+0x39/0x50 [] rcu_report_qs_rsp+0x48/0x70 [] rcu_report_unblock_qs_rnp+0x84/0x90 [] ? rcu_read_unlock_special+0x9f/0x4e0 [] rcu_read_unlock_special+0x334/0x4e0 [] ? trace_hardirqs_off_caller+0x1f/0xc0 [] __rcu_read_unlock+0x8c/0x90 [] xfs_perag_get+0xde/0x2a0 [xfs] [] ? xfs_perag_get+0x5/0x2a0 [xfs] [] _xfs_buf_find+0xd6/0x480 [xfs] [] xfs_buf_get_map+0x2a/0x260 [xfs] [] xfs_buf_read_map+0x2c/0x200 [xfs] [] xfs_trans_read_buf_map+0x4b9/0xa70 [xfs] [] xfs_da_read_buf+0xb8/0x340 [xfs] [] ? mark_held_locks+0xbb/0x140 [] xfs_dir3_block_read+0x39/0x80 [xfs] [] xfs_dir2_block_lookup_int+0x40/0x260 [xfs] [] xfs_dir2_block_removename+0x3d/0x390 [xfs] [] ? xfs_bmap_last_offset+0x4a/0xa0 [xfs] [] xfs_dir_removename+0x11c/0x180 [xfs] [] xfs_remove+0x2e5/0x510 [xfs] [] xfs_vn_unlink+0x4b/0x90 [xfs] [] vfs_unlink+0x90/0x100 [] do_unlinkat+0x17f/0x240 [] ? syscall_trace_enter+0x145/0x2a0 [] SyS_unlinkat+0x1b/0x40 [] tracesys+0xdd/0xe2 lock_stats is at http://codemonkey.org.uk/junk/locks-2013-10-08.txt Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/