Bug 1399930

Summary: [abrt] WARNING: CPU: 3 PID: 7947 at kernel/locking/lockdep.c:3511 lock_release+0x384/0x690: TAINTED
Product: [Fedora] Fedora Reporter: Mustafa Muhammad <mustafa1024m>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: rawhideCC: cz172638, gansalmon, ichavero, itamar, jonathan, kernel-maint, labbott, madhu.chinakonda, mchehab
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/5d171378160b73c5c2131fa18a67b347107d04e5
Whiteboard: abrt_hash:5776bbbcc5a8c1832af1b9e0b6f76559c95d8fdc;
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-06 18:19:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: dmesg none

Description Mustafa Muhammad 2016-11-30 06:26:17 UTC
Additional info:
reporter:       libreport-2.8.0
WARNING: CPU: 3 PID: 7947 at kernel/locking/lockdep.c:3511 lock_release+0x384/0x690
DEBUG_LOCKS_WARN_ON(depth <= 0)
Modules linked in:
 xt_addrtype br_netfilter xfs dm_thin_pool dm_persistent_data dm_bio_prison libcrc32c loop xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun pppoe pppox ppp_generic slhc ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_security ip6table_raw ip6table_mangle ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 iptable_security iptable_raw iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat ebtable_filter ebtables ip6table_filter ip6_tables vfat fat intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm iTCO_wdt irqbypass iTCO_vendor_support snd_hda_codec_realtek crct10dif_pclmul snd_hda_codec_hdmi crc32_pclmul snd_hda_codec_generic ghash_clmulni_intel intel_cstate
 eeepc_wmi asus_wmi sparse_keymap rfkill mxm_wmi joydev intel_uncore intel_rapl_perf snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device i2c_i801 i2c_smbus snd_pcm lpc_ich snd_timer snd mei_me mei soundcore shpchp tpm_infineon wmi soc_button_array tpm_tis tpm_tis_core tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack i915 crc32c_intel i2c_algo_bit drm_kms_helper serio_raw drm e1000e ptp pps_core fjes video
CPU: 3 PID: 7947 Comm: CPU 1/KVM Not tainted 4.9.0-0.rc6.git2.1.fc26.x86_64 #1
Hardware name: ASUS All Series/Z87-PLUS, BIOS 1207 07/01/2013
 ffffb3f683e5fc28 ffffffffbc477383 ffffb3f683e5fc78 0000000000000000
 ffffb3f683e5fc68 ffffffffbc0afc3b 00000db7bc204e69 ffffffffbc30b73d
 0000000000000000 0000000000000001 ffff943eccc17520 0000559cb59d79d8
Call Trace:
 [<ffffffffbc477383>] dump_stack+0x86/0xc3
 [<ffffffffbc0afc3b>] __warn+0xcb/0xf0
 [<ffffffffbc30b73d>] ? aio_write+0x10d/0x170
 [<ffffffffbc0afcbf>] warn_slowpath_fmt+0x5f/0x80
 [<ffffffffbc204f40>] ? __generic_file_write_iter+0xc0/0x1d0
 [<ffffffffbc113704>] lock_release+0x384/0x690
 [<ffffffffbc2f4f12>] ? blkdev_write_iter+0xa2/0x100
 [<ffffffffbc30b75e>] aio_write+0x12e/0x170
 [<ffffffffbc240963>] ? __might_fault+0x43/0xa0
 [<ffffffffbc30c8f2>] do_io_submit+0x382/0x8f0
 [<ffffffffbc30c718>] ? do_io_submit+0x1a8/0x8f0
 [<ffffffffbc30ce70>] SyS_io_submit+0x10/0x20
 [<ffffffffbc9174c1>] entry_SYSCALL_64_fastpath+0x1f/0xc2

Comment 1 Mustafa Muhammad 2016-11-30 06:26:31 UTC
Created attachment 1226167 [details]
File: dmesg

Comment 2 Laura Abbott 2018-04-06 18:19:37 UTC
Doing some pruning, this bug looks to be years old. Please test on a newer kernel and reopen if the problem still exists.