Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755286Ab3JRNsH (ORCPT ); Fri, 18 Oct 2013 09:48:07 -0400 Received: from mx1.redhat.com ([209.132.183.28]:40765 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754244Ab3JRNsE (ORCPT ); Fri, 18 Oct 2013 09:48:04 -0400 Date: Fri, 18 Oct 2013 09:47:52 -0400 From: Dave Jones To: Linux Kernel Cc: Al Viro , Linus Torvalds , Greg Kroah-Hartman Subject: MAX_LOCKDEP_CHAINS too low! (sysfs?) Message-ID: <20131018134752.GA31269@redhat.com> Mail-Followup-To: Dave Jones , Linux Kernel , Al Viro , Linus Torvalds , Greg Kroah-Hartman MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2739 Lines: 57 BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. Please attach the output of /proc/lock_stat to the bug report CPU: 1 PID: 2102862 Comm: trinity-main Not tainted 3.12.0-rc5+ #27 Hardware name: Gigabyte Technology Co., Ltd. GA-MA78GM-S2H/GA-MA78GM-S2H, BIOS F12a 04/23/2010 ffffffff82427e90 ffff88006f9cd938 ffffffff816db90c 000000000104c014 ffff88006f9cda00 ffffffff810c40cd ffffffff810bf11e ffff88006f9cd970 ffffffff810bf645 ffff8800c9ee1550 ffff88012a000a18 00007fffce3189e8 Call Trace: [] dump_stack+0x4e/0x82 [] __lock_acquire+0x1b6d/0x1bd0 [] ? put_lock_stats.isra.28+0xe/0x40 [] ? lock_release_holdtime.part.29+0xe5/0x160 [] ? __module_text_address+0x12/0x60 [] ? is_module_text_address+0x2f/0x60 [] ? __kernel_text_address+0x50/0x70 [] ? print_context_stack+0x87/0xf0 [] lock_acquire+0x93/0x1e0 [] ? get_partial_node.isra.41+0x49/0x20a [] _raw_spin_lock+0x41/0x80 [] ? get_partial_node.isra.41+0x49/0x20a [] get_partial_node.isra.41+0x49/0x20a [] ? check_usage_backwards+0x87/0x150 [] __slab_alloc+0x180/0x4dd [] ? print_shortest_lock_dependencies+0x1d0/0x1d0 [] ? sysfs_open_file+0xb8/0x230 [] ? __lock_is_held+0x56/0x80 [] kmem_cache_alloc_trace+0x2dc/0x3a0 [] ? sysfs_open_file+0xb8/0x230 [] sysfs_open_file+0xb8/0x230 [] do_dentry_open+0x25b/0x310 [] ? security_inode_permission+0x1c/0x30 [] ? sysfs_schedule_callback+0x1e0/0x1e0 [] finish_open+0x49/0x60 [] do_last+0x5b4/0x1200 [] path_openat+0xce/0x6b0 [] ? native_sched_clock+0x24/0x80 [] do_filp_open+0x47/0xa0 [] ? __alloc_fd+0xaf/0x200 [] do_sys_open+0x139/0x220 [] ? syscall_trace_enter+0x155/0x2a0 [] SyS_open+0x1e/0x20 [] tracesys+0xdd/0xe2 /proc/lock_stat is at http://www.codemonkey.org.uk/junk/locks-2013-10-18.txt Probably not going to get time to dig into this before kernel summit, but posting in case it's something obvious.. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/