Hello. 3.6-rc1 shows warning when open(path, O_WRONLY) fails due to security_file_open() returning an error value. [ 99.819978] ===================================== [ 99.820366] [ BUG: bad unlock balance detected! ] [ 99.820366] 3.6.0-rc1 #26 Not tainted [ 99.820366] ------------------------------------- [ 99.820366] bash/3573 is trying to release lock (sb_writers) at: [ 99.820366] [<c10fc63f>] mnt_drop_write+0x2f/0x40 [ 99.820366] but there are no more locks to release! [ 99.820366] [ 99.820366] other info that might help us debug this: [ 99.820366] no locks held by bash/3573. [ 99.820366] [ 99.820366] stack backtrace: [ 99.820366] Pid: 3573, comm: bash Not tainted 3.6.0-rc1 #26 [ 99.820366] Call Trace: [ 99.820366] [<c10fc63f>] ? mnt_drop_write+0x2f/0x40 [ 99.820366] [<c10799d2>] print_unlock_inbalance_bug+0xe2/0xf0 [ 99.820366] [<c10fc63f>] ? mnt_drop_write+0x2f/0x40 [ 99.820366] [<c10fc63f>] ? mnt_drop_write+0x2f/0x40 [ 99.820366] [<c107cc94>] lock_release+0x154/0x1d0 [ 99.820366] [<c10fc63f>] ? mnt_drop_write+0x2f/0x40 [ 99.820366] [<c10e1755>] __sb_end_write+0x75/0x80 [ 99.820366] [<c10fc63f>] mnt_drop_write+0x2f/0x40 [ 99.820366] [<c10ebf3e>] do_last+0x1de/0xb70 [ 99.820366] [<c10ea331>] ? inode_permission+0x11/0x50 [ 99.820366] [<c10ec938>] ? link_path_walk+0x68/0x770 [ 99.820366] [<c10eeb08>] path_openat+0x98/0x3a0 [ 99.820366] [<c107787b>] ? trace_hardirqs_off+0xb/0x10 [ 99.820366] [<c10eeef0>] do_filp_open+0x30/0x80 [ 99.820366] [<c10fb32a>] ? alloc_fd+0x14a/0x1e0 [ 99.820366] [<c10de5ed>] do_sys_open+0xed/0x1c0 [ 99.820366] [<c10de72d>] sys_open+0x2d/0x40 [ 99.820366] [<c13eddcc>] sysenter_do_call+0x12/0x32 Regards. -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html