git checkout 5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52 Previous HEAD position was f0e07fb... Merge 'vfs/for-next' into devel-cairo-x86_64-201311070512 HEAD is now at 5e01dc7... Linux 3.12 ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52:bisect-usb SUCCESS bisect: good commit 5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52 git bisect start f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c 5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52 -- Previous HEAD position was 5e01dc7... Linux 3.12 HEAD is now at 6e46645... Linux 3.11 Bisecting: 436 revisions left to test after this (roughly 9 steps) [2751f2b0a96446b2301a56dcf3b24128ffb4c7d7] Merge 'ntb/ntb' into devel-cairo-x86_64-201311070512 git bisect run /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:2751f2b0a96446b2301a56dcf3b24128ffb4c7d7:bisect-usb 2013-11-07-08:21:01 2751f2b0a96446b2301a56dcf3b24128ffb4c7d7 compiling 397 real 1595 user 147 sys 439.04% cpu x86_64-randconfig-c9-1107 2013-11-07-08:33:06 detecting boot state 3.12.0-00347-g2751f2b.................. 1 2... 3...... 4. 5.......... 6....... 7. 8.. 9.... 10.. 11. 12......... 13.... 14... 18..... 19........... 20 SUCCESS Bisecting: 218 revisions left to test after this (roughly 8 steps) [4796e8af60ee7d2922386ef9fd4389d21e2c1665] Bluetooth: Make mgmt_write_scan_failed() return void running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:4796e8af60ee7d2922386ef9fd4389d21e2c1665:bisect-usb 2013-11-07-09:25:09 4796e8af60ee7d2922386ef9fd4389d21e2c1665 compiling 245 real 1697 user 154 sys 754.30% cpu x86_64-randconfig-c9-1107 2013-11-07-09:29:32 detecting boot state 3.11.0-07982-g4796e8a........ 1 2... 3.............. 4...... 5.. 6..... 7 8.. 9... 10... 11 12 14................... 15.... 16 17............. 18. 19............ 20 SUCCESS Bisecting: 109 revisions left to test after this (roughly 7 steps) [cca34b785a21d220176038c45071ffe842e99fd3] Bluetooth: Remove link type check in hci_disconn_complete_evt() running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:cca34b785a21d220176038c45071ffe842e99fd3:bisect-usb 2013-11-07-10:26:34 cca34b785a21d220176038c45071ffe842e99fd3 compiling 53 real 61 user 16 sys 147.70% cpu x86_64-randconfig-c9-1107 2013-11-07-10:27:37 detecting boot state 3.11.0-08091-gcca34b7... 1............... 2. 3.. 5... 6 7 8 9 10 12 13 14.. 15 16.. 17 18 19... 20 SUCCESS Bisecting: 54 revisions left to test after this (roughly 6 steps) [004e8957280a32f7b54766531c064412bda45e48] convert the rest of binfmt_elf_fdpic to dump_emit() running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:004e8957280a32f7b54766531c064412bda45e48:bisect-usb 2013-11-07-10:52:09 004e8957280a32f7b54766531c064412bda45e48 compiling 253 real 1700 user 165 sys 736.31% cpu x86_64-randconfig-c9-1107 2013-11-07-10:56:36 detecting boot state 3.12.0-rc4-00055-g004e895...... 1 2......... 3........ 4... 5.. 6. 7.. 8...... 9..... 12 13.......... 14.... 15. 16. 17 18.... 20 SUCCESS Bisecting: 27 revisions left to test after this (roughly 5 steps) [b0d94facd7c81fae48e72f1e0b2a7e656ecde921] exportfs: stop retrying once we race with rename/remove running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:b0d94facd7c81fae48e72f1e0b2a7e656ecde921:bisect-usb 2013-11-07-11:36:08 b0d94facd7c81fae48e72f1e0b2a7e656ecde921 compiling 272 real 1646 user 159 sys 662.05% cpu x86_64-randconfig-c9-1107 2013-11-07-11:40:54 detecting boot state 3.12.0-rc4-00082-gb0d94fa....... TEST FAILURE [ 0.020000] Mount-cache hash table entries: 256 [ 0.020000] [ 0.020000] ============================================= [ 0.020000] [ INFO: possible recursive locking detected ] [ 0.020000] 3.12.0-rc4-00082-gb0d94fa #721 Not tainted [ 0.020000] --------------------------------------------- [ 0.020000] swapper/0 is trying to acquire lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [ 0.020000] but task is already holding lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] other info that might help us debug this: [ 0.020000] Possible unsafe locking scenario: [ 0.020000] [ 0.020000] CPU0 [ 0.020000] ---- [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] [ 0.020000] *** DEADLOCK *** [ 0.020000] [ 0.020000] May be due to missing lock nesting notation [ 0.020000] [ 0.020000] 2 locks held by swapper/0: [ 0.020000] #0: (&type->s_umount_key/1){+.+...}, at: [] sget+0x266/0x440 [ 0.020000] #1: (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] stack backtrace: [ 0.020000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.12.0-rc4-00082-gb0d94fa #721 [ 0.020000] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.020000] ffffffff82c988d0 ffffffff82401c18 ffffffff81c21c19 ffffffff82401ce0 [ 0.020000] ffffffff81111f17 ffffffff824134c0 0000000000000000 ffffffff82400038 [ 0.020000] ffffffff82413af8 ffffffff00000000 00000000c406e037 ffffffff824134c0 [ 0.020000] Call Trace: [ 0.020000] [] dump_stack+0x19/0x1b [ 0.020000] [] __lock_acquire+0x12e7/0x1d70 [ 0.020000] [] ? __lock_acquire+0x1cfc/0x1d70 [ 0.020000] [] ? __slab_alloc.constprop.61+0x3dc/0x3fa [ 0.020000] [] lock_acquire+0x19d/0x220 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] _raw_spin_lock+0x3b/0x70 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] __d_instantiate+0x1d/0xf0 [ 0.020000] [] d_instantiate+0x3f/0x70 [ 0.020000] [] d_make_root+0x32/0x60 [ 0.020000] [] sysfs_mount+0x178/0x220 [ 0.020000] [] mount_fs+0x73/0x190 [ 0.020000] [] vfs_kern_mount+0x65/0xf0 [ 0.020000] [] kern_mount_data+0x14/0x30 [ 0.020000] [] sysfs_init+0x54/0xb3 [ 0.020000] [] mnt_init+0xcd/0x1d6 [ 0.020000] [] vfs_caches_init+0x90/0x10e [ 0.020000] [] ? integrity_iintcache_init+0x23/0x38 [ 0.020000] [] ? security_init+0x35/0x47 [ 0.020000] [] start_kernel+0x456/0x49e [ 0.020000] [] ? repair_env_string+0x5e/0x5e [ 0.020000] [] ? early_idt_handlers+0x120/0x120 [ 0.020000] [] x86_64_start_reservations+0x2a/0x2c [ 0.020000] [] x86_64_start_kernel+0xf3/0x102 /kernel/x86_64-randconfig-c9-1107/b0d94facd7c81fae48e72f1e0b2a7e656ecde921/dmesg-yocto-snb-7:20131107114350:x86_64-randconfig-c9-1107:3.12.0-rc4-00082-gb0d94fa:721 /kernel/x86_64-randconfig-c9-1107/b0d94facd7c81fae48e72f1e0b2a7e656ecde921/dmesg-quantal-stoakley-3:20131107114407:x86_64-randconfig-c9-1107:3.12.0-rc4-00082-gb0d94fa:721 0:2:2 all_good:bad:all_bad boots REPEAT COUNT: 20 # /cc/wfg/usb-bisect/.repeat Bisecting: 13 revisions left to test after this (roughly 4 steps) [50235cd9727c20b09967b5c060025eac9d0c80bb] elf{,_fdpic} coredump: get rid of pointless if (siginfo->si_signo) running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:50235cd9727c20b09967b5c060025eac9d0c80bb:bisect-usb 2013-11-07-11:44:27 50235cd9727c20b09967b5c060025eac9d0c80bb compiling 189 real 1404 user 136 sys 811.96% cpu x86_64-randconfig-c9-1107 2013-11-07-11:47:47 detecting boot state 3.12.0-rc4-00068-g50235cd.. 1... 2 3... 4. 9 10.. 11. 12..... 13 15. 16.. 17 19.. 20 SUCCESS Bisecting: 6 revisions left to test after this (roughly 3 steps) [08196969532eee10cdeaa29fca37fa7a407b01ae] dcache: use IS_ROOT to decide where dentry is hashed running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:08196969532eee10cdeaa29fca37fa7a407b01ae:bisect-usb 2013-11-07-12:05:48 08196969532eee10cdeaa29fca37fa7a407b01ae compiling 198 real 1391 user 125 sys 764.04% cpu x86_64-randconfig-c9-1107 2013-11-07-12:09:18 detecting boot state 3.12.0-rc4-00075-g0819696..... TEST FAILURE [ 0.020000] Mount-cache hash table entries: 256 [ 0.020000] [ 0.020000] ============================================= [ 0.020000] [ INFO: possible recursive locking detected ] [ 0.020000] 3.12.0-rc4-00075-g0819696 #723 Not tainted [ 0.020000] --------------------------------------------- [ 0.020000] swapper/0 is trying to acquire lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [ 0.020000] but task is already holding lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] other info that might help us debug this: [ 0.020000] Possible unsafe locking scenario: [ 0.020000] [ 0.020000] CPU0 [ 0.020000] ---- [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] [ 0.020000] *** DEADLOCK *** [ 0.020000] [ 0.020000] May be due to missing lock nesting notation [ 0.020000] [ 0.020000] 2 locks held by swapper/0: [ 0.020000] #0: (&type->s_umount_key/1){+.+...}, at: [] sget+0x266/0x440 [ 0.020000] #1: (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] stack backtrace: [ 0.020000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.12.0-rc4-00075-g0819696 #723 [ 0.020000] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.020000] ffffffff82c988d0 ffffffff82401c18 ffffffff81c21bd9 ffffffff82401ce0 [ 0.020000] ffffffff81111f17 ffffffff824134c0 0000000000000000 ffffffff82400038 [ 0.020000] ffffffff82413af8 ffffffff00000000 00000000c406e037 ffffffff824134c0 [ 0.020000] Call Trace: [ 0.020000] [] dump_stack+0x19/0x1b [ 0.020000] [] __lock_acquire+0x12e7/0x1d70 [ 0.020000] [] ? __lock_acquire+0x1cfc/0x1d70 [ 0.020000] [] ? __slab_alloc.constprop.61+0x3dc/0x3fa [ 0.020000] [] lock_acquire+0x19d/0x220 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] _raw_spin_lock+0x3b/0x70 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] __d_instantiate+0x1d/0xf0 [ 0.020000] [] d_instantiate+0x3f/0x70 [ 0.020000] [] d_make_root+0x32/0x60 [ 0.020000] [] sysfs_mount+0x178/0x220 [ 0.020000] [] mount_fs+0x73/0x190 [ 0.020000] [] vfs_kern_mount+0x65/0xf0 [ 0.020000] [] kern_mount_data+0x14/0x30 [ 0.020000] [] sysfs_init+0x54/0xb3 [ 0.020000] [] mnt_init+0xcd/0x1d6 [ 0.020000] [] vfs_caches_init+0x90/0x10e [ 0.020000] [] ? integrity_iintcache_init+0x23/0x38 [ 0.020000] [] ? security_init+0x35/0x47 [ 0.020000] [] start_kernel+0x456/0x49e [ 0.020000] [] ? repair_env_string+0x5e/0x5e [ 0.020000] [] ? early_idt_handlers+0x120/0x120 [ 0.020000] [] x86_64_start_reservations+0x2a/0x2c [ 0.020000] [] x86_64_start_kernel+0xf3/0x102 /kernel/x86_64-randconfig-c9-1107/08196969532eee10cdeaa29fca37fa7a407b01ae/dmesg-yocto-inn-38:20131107121136:x86_64-randconfig-c9-1107:3.12.0-rc4-00075-g0819696:723 0:1:1 all_good:bad:all_bad boots REPEAT COUNT: 20 # /cc/wfg/usb-bisect/.repeat Bisecting: 3 revisions left to test after this (roughly 2 steps) [7717bf21e4a5e1d371e313a4404635f4775961d9] vfs: split out vfs_getattr_nosec running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:7717bf21e4a5e1d371e313a4404635f4775961d9:bisect-usb 2013-11-07-12:11:49 7717bf21e4a5e1d371e313a4404635f4775961d9 compiling 45 real 67 user 18 sys 188.04% cpu x86_64-randconfig-c9-1107 2013-11-07-12:12:45 detecting boot state 3.12.0-rc4-00071-g7717bf2..... 1.. TEST FAILURE BUG: kernel early hang without any printk output Command line: hung_task_panic=1 rcutree.rcu_cpu_stall_timeout=100 log_buf_len=8M ignore_loglevel debug sched_debug apic=debug dynamic_printk sysrq_always_enabled panic=10 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal root=/dev/ram0 rw link=/kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:7717bf21e4a5e1d371e313a4404635f4775961d9:bisect-usb/.vmlinuz-7717bf21e4a5e1d371e313a4404635f4775961d9-20131107121244-12-ant branch=linux-devel/devel-cairo-x86_64-201311070512 BOOT_IMAGE=/kernel/x86_64-randconfig-c9-1107/7717bf21e4a5e1d371e313a4404635f4775961d9/vmlinuz-3.12.0-rc4-00071-g7717bf2 noapic nolapic nohz=off Early hang kernel: vmlinuz-3.12.0-rc4-00071-g7717bf2 3.12.0-rc4-00071-g7717bf2 #724 Elapsed time: 35 /kernel/x86_64-randconfig-c9-1107/7717bf21e4a5e1d371e313a4404635f4775961d9/dmesg-quantal-inn-32:20131107121614:x86_64-randconfig-c9-1107:3.12.0-rc4-00071-g7717bf2:724 0:1:2 all_good:bad:all_bad boots REPEAT COUNT: 30 # /cc/wfg/usb-bisect/.repeat Bisecting: 0 revisions left to test after this (roughly 1 step) [520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed] iget/iget5: don't bother with ->i_lock until we find a match running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed:bisect-usb 2013-11-07-12:16:47 520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed compiling 189 real 1379 user 124 sys 792.00% cpu x86_64-randconfig-c9-1107 2013-11-07-12:20:08 detecting boot state 3.12.0-rc4-00070-g520ef07....... 2 TEST FAILURE BUG: kernel early hang without any printk output Command line: hung_task_panic=1 rcutree.rcu_cpu_stall_timeout=100 log_buf_len=8M ignore_loglevel debug sched_debug apic=debug dynamic_printk sysrq_always_enabled panic=10 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal root=/dev/ram0 rw link=/kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed:bisect-usb/.vmlinuz-520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed-20131107122006-18-ant branch=linux-devel/devel-cairo-x86_64-201311070512 BOOT_IMAGE=/kernel/x86_64-randconfig-c9-1107/520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed/vmlinuz-3.12.0-rc4-00070-g520ef07 noapic nolapic nohz=off Early hang kernel: vmlinuz-3.12.0-rc4-00070-g520ef07 3.12.0-rc4-00070-g520ef07 #725 Elapsed time: 35 /kernel/x86_64-randconfig-c9-1107/520ef078eabdbe7eb6a33c1f56a65ac55d41e6ed/dmesg-quantal-xps-6:20131107202337:x86_64-randconfig-c9-1107:3.12.0-rc4-00070-g520ef07:725 0:1:3 all_good:bad:all_bad boots REPEAT COUNT: 40 # /cc/wfg/usb-bisect/.repeat Bisecting: 0 revisions left to test after this (roughly 0 steps) [1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae] VFS: Put a small type field into struct dentry::d_flags running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae:bisect-usb 2013-11-07-12:24:14 1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae compiling 41 real 56 user 16 sys 174.02% cpu x86_64-randconfig-c9-1107 2013-11-07-12:26:11 detecting boot state 3.12.0-rc4-00069-g1247c74...... TEST FAILURE [ 0.020000] Mount-cache hash table entries: 256 [ 0.020000] [ 0.020000] ============================================= [ 0.020000] [ INFO: possible recursive locking detected ] [ 0.020000] 3.12.0-rc4-00069-g1247c74 #726 Not tainted [ 0.020000] --------------------------------------------- [ 0.020000] swapper/0 is trying to acquire lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [ 0.020000] but task is already holding lock: [ 0.020000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] other info that might help us debug this: [ 0.020000] Possible unsafe locking scenario: [ 0.020000] [ 0.020000] CPU0 [ 0.020000] ---- [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] lock(&sb->s_type->i_lock_key); [ 0.020000] [ 0.020000] *** DEADLOCK *** [ 0.020000] [ 0.020000] May be due to missing lock nesting notation [ 0.020000] [ 0.020000] 2 locks held by swapper/0: [ 0.020000] #0: (&type->s_umount_key/1){+.+...}, at: [] sget+0x266/0x440 [ 0.020000] #1: (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.020000] [ 0.020000] stack backtrace: [ 0.020000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.12.0-rc4-00069-g1247c74 #726 [ 0.020000] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.020000] ffffffff82c988d0 ffffffff82401c18 ffffffff81c21ba9 ffffffff82401ce0 [ 0.020000] ffffffff81111f17 ffffffff824134c0 0000000000000000 ffffffff82400038 [ 0.020000] ffffffff82413af8 ffffffff00000000 00000000c406e037 ffffffff824134c0 [ 0.020000] Call Trace: [ 0.020000] [] dump_stack+0x19/0x1b [ 0.020000] [] __lock_acquire+0x12e7/0x1d70 [ 0.020000] [] ? __lock_acquire+0x1cfc/0x1d70 [ 0.020000] [] ? __slab_alloc.constprop.61+0x3dc/0x3fa [ 0.020000] [] lock_acquire+0x19d/0x220 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] _raw_spin_lock+0x3b/0x70 [ 0.020000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] d_flags_for_inode+0x3c/0xd0 [ 0.020000] [] __d_instantiate+0x1d/0xf0 [ 0.020000] [] d_instantiate+0x3f/0x70 [ 0.020000] [] d_make_root+0x32/0x60 [ 0.020000] [] sysfs_mount+0x178/0x220 [ 0.020000] [] mount_fs+0x73/0x190 [ 0.020000] [] vfs_kern_mount+0x65/0xf0 [ 0.020000] [] kern_mount_data+0x14/0x30 [ 0.020000] [] sysfs_init+0x54/0xb3 [ 0.020000] [] mnt_init+0xcd/0x1d6 [ 0.020000] [] vfs_caches_init+0x90/0x10e [ 0.020000] [] ? integrity_iintcache_init+0x23/0x38 [ 0.020000] [] ? security_init+0x35/0x47 [ 0.020000] [] start_kernel+0x456/0x49e [ 0.020000] [] ? repair_env_string+0x5e/0x5e [ 0.020000] [] ? early_idt_handlers+0x120/0x120 [ 0.020000] [] x86_64_start_reservations+0x2a/0x2c [ 0.020000] [] x86_64_start_kernel+0xf3/0x102 /kernel/x86_64-randconfig-c9-1107/1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae/dmesg-quantal-athens-7:20131107122838:x86_64-randconfig-c9-1107:3.12.0-rc4-00069-g1247c74:726 /kernel/x86_64-randconfig-c9-1107/1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae/dmesg-quantal-stoakley-1:20131107122840:x86_64-randconfig-c9-1107:3.12.0-rc4-00069-g1247c74:726 /kernel/x86_64-randconfig-c9-1107/1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae/dmesg-yocto-stoakley-3:20131107122834:x86_64-randconfig-c9-1107:3.12.0-rc4-00069-g1247c74:726 /kernel/x86_64-randconfig-c9-1107/1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae/dmesg-quantal-stoakley-6:20131107122850:x86_64-randconfig-c9-1107:3.12.0-rc4-00069-g1247c74:726 0:4:4 all_good:bad:all_bad boots 1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae is the first bad commit commit 1247c74b4f3f3725a8bd8dc0bbd22baa2a9049ae Author: David Howells Date: Thu Sep 12 19:22:53 2013 +0100 VFS: Put a small type field into struct dentry::d_flags Put a type field into struct dentry::d_flags to indicate if the dentry is one of the following types that relate particularly to pathwalk: Miss (negative dentry) Directory "Automount" directory (defective - no i_op->lookup()) Symlink Other (regular, socket, fifo, device) The type field is set to one of the first five types on a dentry by calls to __d_instantiate() and d_obtain_alias() from information in the inode (if one is given). The type is cleared by dentry_unlink_inode() when it reconstitutes an existing dentry as a negative dentry. Accessors provided are: d_set_type(dentry, type) d_is_directory(dentry) d_is_autodir(dentry) d_is_symlink(dentry) d_is_file(dentry) d_is_negative(dentry) d_is_positive(dentry) A bunch of checks in pathname resolution switched to those. Signed-off-by: David Howells Signed-off-by: Al Viro :040000 040000 009f02e815b9b58c189384650314ac078d257b9f fb13ed7ea2db6cfdb58b82381e1833f8eac02e9e M fs :040000 040000 2e10eb1ad39f69b8dd39624bb000019733e4da20 ec0e532314d61fcf59ed7fa697f4764ac77863b9 M include bisect run success ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:50235cd9727c20b09967b5c060025eac9d0c80bb:bisect-usb 2013-11-07-12:29:14 50235cd9727c20b09967b5c060025eac9d0c80bb reuse /kernel/x86_64-randconfig-c9-1107/50235cd9727c20b09967b5c060025eac9d0c80bb/vmlinuz-3.12.0-rc4-00068-g50235cd 2013-11-07-12:29:14 detecting boot state ..... 1 2 3.. 5 6.. 7. 11 13 14.. 15 19 20 21 23 24 25 28 30 31. 34. 37 39.. 43 44 45.. 48 50 52 54 56 59 60 61.. 64 65 68 69. 72 75 77 82 83 87. 90 95 97 99 100 103 112 116 119 120 SUCCESS ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c:bisect-usb TEST FAILURE [ 0.020984] Mount-cache hash table entries: 256 [ 0.022182] [ 0.022487] ============================================= [ 0.026992] [ INFO: possible recursive locking detected ] [ 0.027977] 3.12.0-00784-gf0e07fb #314 Not tainted [ 0.028845] --------------------------------------------- [ 0.030000] swapper/0 is trying to acquire lock: [ 0.030000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_flags_for_inode+0x3c/0xd0 [ 0.030000] [ 0.030000] but task is already holding lock: [ 0.030000] (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.030000] [ 0.030000] other info that might help us debug this: [ 0.030000] Possible unsafe locking scenario: [ 0.030000] [ 0.030000] CPU0 [ 0.030000] ---- [ 0.030000] lock(&sb->s_type->i_lock_key); [ 0.030000] lock(&sb->s_type->i_lock_key); [ 0.030000] [ 0.030000] *** DEADLOCK *** [ 0.030000] [ 0.030000] May be due to missing lock nesting notation [ 0.030000] [ 0.030000] 2 locks held by swapper/0: [ 0.030000] #0: (&type->s_umount_key/1){+.+...}, at: [] sget+0x266/0x440 [ 0.030000] #1: (&sb->s_type->i_lock_key){+.+...}, at: [] d_instantiate+0x34/0x70 [ 0.030000] [ 0.030000] stack backtrace: [ 0.030000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.12.0-00784-gf0e07fb #314 [ 0.030000] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.030000] ffffffff82c998d0 ffffffff82401c18 ffffffff81c21540 ffffffff82401ce0 [ 0.030000] ffffffff81111fb7 ffffffff824134c0 0000000000000000 ffffffff82401c50 [ 0.030000] ffffffff82413af8 ffffffff00000000 00000000c406e037 ffffffff824134c0 [ 0.030000] Call Trace: [ 0.030000] [] dump_stack+0x19/0x1b [ 0.030000] [] __lock_acquire+0x12d7/0x1d60 [ 0.030000] [] ? __lock_acquire+0x1cec/0x1d60 [ 0.030000] [] ? __slab_alloc.constprop.61+0x3dc/0x3fa [ 0.030000] [] lock_acquire+0x19d/0x220 [ 0.030000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.030000] [] _raw_spin_lock+0x3b/0x70 [ 0.030000] [] ? d_flags_for_inode+0x3c/0xd0 [ 0.030000] [] d_flags_for_inode+0x3c/0xd0 [ 0.030000] [] __d_instantiate+0x1d/0xf0 [ 0.030000] [] d_instantiate+0x3f/0x70 [ 0.030000] [] d_make_root+0x32/0x60 [ 0.030000] [] sysfs_mount+0x178/0x220 [ 0.030000] [] mount_fs+0x73/0x190 [ 0.030000] [] vfs_kern_mount+0x65/0xf0 [ 0.030000] [] kern_mount_data+0x14/0x30 [ 0.030000] [] sysfs_init+0x54/0xb3 [ 0.030000] [] mnt_init+0xcd/0x1d6 [ 0.030000] [] vfs_caches_init+0x90/0x10e [ 0.030000] [] ? integrity_iintcache_init+0x23/0x38 [ 0.030000] [] ? security_init+0x35/0x47 [ 0.030000] [] start_kernel+0x456/0x49e [ 0.030000] [] ? repair_env_string+0x5e/0x5e [ 0.030000] [] ? early_idt_handlers+0x120/0x120 [ 0.030000] [] x86_64_start_reservations+0x2a/0x2c [ 0.030000] [] x86_64_start_kernel+0xf3/0x102 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-bens-2:20131107062028:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-lkp-tt02-7:20131106232800:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-xian-25:20131107084249:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-jaketown-4:20131107083225:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-waimea-12:20131107140843:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-stoakley-4:20131107063546:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-lkp-tt02-5:20131106205620:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-xps-7:20131107161856:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-waimea-13:20131107161907:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-lkp-tt02-9:20131106233130:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-roam-20:20131107062035:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-lkp-st01-1:20131107163254:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-roam-36:20131107063906:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-yocto-lkp-st01-11:20131107143359:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-lkp-st01-1:20131107163631:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-inn-37:20131107060255:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-waimea-14:20131107163033:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-roam-31:20131107063946:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 /kernel/x86_64-randconfig-c9-1107/f0e07fb6dd3d533b6ea2d91e721b68d696d4e64c/dmesg-quantal-snb-4:20131107083928:x86_64-randconfig-c9-1107:3.12.0-00784-gf0e07fb:314 0:19:19 all_good:bad:all_bad boots [detached HEAD e6eb46b] Revert "VFS: Put a small type field into struct dentry::d_flags" 3 files changed, 82 insertions(+), 164 deletions(-) ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:e6eb46b3eee2c7211a56423dd026b88b9ce30ed5:bisect-usb 2013-11-07-13:06:50 e6eb46b3eee2c7211a56423dd026b88b9ce30ed5 compiling 2013-11-07-13:10:59 detecting boot state 3.12.0-00785-ge6eb46b.... 1 12 16 22 26 32 37. 49 63 71 79 86 88 99 108 120 SUCCESS ========= upstream ========= Fetching linus ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:be408cd3e1fef73e9408b196a79b9934697fe3b1:bisect-usb 2013-11-07-13:21:34 be408cd3e1fef73e9408b196a79b9934697fe3b1 compiling 2013-11-07-13:27:26 detecting boot state 3.12.0-00048-gbe408cd... 6 15 21 33 38 42 85 112 119 120 SUCCESS ========= linux-next ========= Fetching next ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-c9-1107/linux-devel:devel-cairo-x86_64-201311070512:7e82ea422c42db6b9c0188faeb98d6ec9ccfef8f:bisect-usb 2013-11-07-13:34:30 7e82ea422c42db6b9c0188faeb98d6ec9ccfef8f compiling 2013-11-07-13:38:20 7e82ea422c42db6b9c0188faeb98d6ec9ccfef8f SKIP BROKEN BUILD Check erros in /cc/wfg/usb-bisect and /tmp/kernel/x86_64-randconfig-c9-1107/7e82ea422c42db6b9c0188faeb98d6ec9ccfef8f