From mboxrd@z Thu Jan 1 00:00:00 1970 From: bugzilla-daemon@bugzilla.kernel.org Subject: [Bug 88321] New: WARNING: CPU: 1 PID: 6784 at fs/dcache.c:1318 umount_check+0x77/0x7b() Date: Sun, 16 Nov 2014 17:19:19 +0000 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit To: linux-ext4@vger.kernel.org Return-path: Received: from mail.kernel.org ([198.145.19.201]:59090 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755217AbaKPRTX (ORCPT ); Sun, 16 Nov 2014 12:19:23 -0500 Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 811BC20176 for ; Sun, 16 Nov 2014 17:19:22 +0000 (UTC) Received: from bugzilla2.web.kernel.org (bugzilla2.web.kernel.org [172.20.200.52]) by mail.kernel.org (Postfix) with ESMTP id B44522014A for ; Sun, 16 Nov 2014 17:19:19 +0000 (UTC) Sender: linux-ext4-owner@vger.kernel.org List-ID: https://bugzilla.kernel.org/show_bug.cgi?id=88321 Bug ID: 88321 Summary: WARNING: CPU: 1 PID: 6784 at fs/dcache.c:1318 umount_check+0x77/0x7b() Product: File System Version: 2.5 Kernel Version: 3.17.1 Hardware: Intel OS: Linux Tree: Mainline Status: NEW Severity: high Priority: P1 Component: ext4 Assignee: fs_ext4@kernel-bugs.osdl.org Reporter: dwayne@mun.ca Regression: No Using a modified 3.17.1 kernel. Please see BUG 86661 (https://bugzilla.kernel.org/show_bug.cgi?id=86661) for the modifications implemented. We recently encountered the following information from the kernel ring buffer: [Fri Oct 31 19:15:13 2014] WARNING: CPU: 1 PID: 6784 at fs/dcache.c:1318 umount_check+0x77/0x7b() [Fri Oct 31 19:15:13 2014] Modules linked in: [Fri Oct 31 19:15:13 2014] CPU: 1 PID: 6784 Comm: umount.nfs4 Not tainted 3.17.1-gentoo20141023m-00002-gbe4fcc3 #2 [Fri Oct 31 19:15:13 2014] Hardware name: System manufacturer System Product Name/P6X58-E PRO, BIOS 0504 07/28/2011 [Fri Oct 31 19:15:13 2014] 0000000000000526 ffff88031c70fcc8 ffffffff81800a85 0000000000000000 [Fri Oct 31 19:15:13 2014] 0000000000000000 ffff88031c70fd08 ffffffff8103c4f3 ffff88031c70fd30 [Fri Oct 31 19:15:13 2014] ffffffff81125a28 ffff880316e7d010 0000000000015c80 ffff880326786901 [Fri Oct 31 19:15:13 2014] Call Trace: [Fri Oct 31 19:15:13 2014] [] dump_stack+0x46/0x58 [Fri Oct 31 19:15:13 2014] [] warn_slowpath_common+0x7c/0x96 [Fri Oct 31 19:15:13 2014] [] ? umount_check+0x77/0x7b [Fri Oct 31 19:15:13 2014] [] warn_slowpath_null+0x15/0x17 [Fri Oct 31 19:15:13 2014] [] umount_check+0x77/0x7b [Fri Oct 31 19:15:13 2014] [] d_walk+0x115/0x2d4 [Fri Oct 31 19:15:13 2014] [] ? do_one_tree+0x22/0x36 [Fri Oct 31 19:15:13 2014] [] ? d_instantiate_unique+0x68/0x68 [Fri Oct 31 19:15:13 2014] [] do_one_tree+0x22/0x36 [Fri Oct 31 19:15:13 2014] [] shrink_dcache_for_umount+0x59/0x6b [Fri Oct 31 19:15:13 2014] [] generic_shutdown_super+0x1e/0xed [Fri Oct 31 19:15:13 2014] [] kill_anon_super+0xe/0x19 [Fri Oct 31 19:15:13 2014] [] nfs_kill_super+0x12/0x1e [Fri Oct 31 19:15:13 2014] [] deactivate_locked_super+0x36/0x4b [Fri Oct 31 19:15:13 2014] [] deactivate_super+0x3a/0x3e [Fri Oct 31 19:15:13 2014] [] mntput_no_expire+0x1b0/0x1d2 [Fri Oct 31 19:15:13 2014] [] ? SyS_umount+0x395/0x3aa [Fri Oct 31 19:15:13 2014] [] SyS_umount+0x395/0x3aa [Fri Oct 31 19:15:13 2014] [] ? system_call_fastpath+0x16/0x1b [Fri Oct 31 19:15:13 2014] [] ? vm_munmap+0x4e/0x5e [Fri Oct 31 19:15:13 2014] [] ? mnt_get_count+0x53/0x53 [Fri Oct 31 19:15:13 2014] [] system_call_fastpath+0x16/0x1b [Fri Oct 31 19:15:13 2014] ---[ end trace f8d9e04a1786ebb6 ]--- -- You are receiving this mail because: You are watching the assignee of the bug.