On Wed, Mar 26, 2008 at 8:20 AM, Erez Zadok <[EMAIL PROTECTED]> wrote:
>
> In message <[EMAIL PROTECTED]>, "Lucas C. Villa Real" writes:
>  > On Tue, Mar 25, 2008 at 1:42 PM, Erez Zadok <[EMAIL PROTECTED]> wrote:
>  > > In message <[EMAIL PROTECTED]>, Bob Gilligan writes:
>  > >  > Hi Folks -- We're seeing a consistent panic in unionfs 2.2.4 running 
> on
>  > >  > Linux 2.6.23.16.  The panic is due to an assertion failure in dget() 
> in
>  > >  > dcache.h.
>  > >  [...]
>  > >
>  > >  Bob, can you please try unionfs-2.3 (just released) and let me know if 
> you
>  > >  can still tickle this bug?  If so, please open an official Bugzilla 
> report
>  > >  so we can more easily track the bug (the test script you provided would 
> be
>  > >  very helpful).
>  >
>  > For the record, I'm facing exactly the same problem here. I've just
>  > tested with 2.6.24.4 and unionfs 2.3.1. The bug is always
>  > reproducible:
>  >
>  > kernel BUG at include/linux/dcache.h:323!
>  > invalid opcode: 0000 [#1] PREEMPT SMP
>  > Modules linked in: ndiswrapper i915 drm ipv6 snd_pcm_oss snd_mixer_oss
>  > hfsplus joydev appletouch sky2 video i2c_i801 battery output thermal
>  > snd_hda_intel button rtc_cmos rtc_core rtc_lib shpchp ac processor
>  > ohci1394 i2c_core intel_agp iTCO_wdt pci_hotplug snd_pcm snd_timer snd
>  > snd_page_alloc
>  >
>  > Pid: 10131, comm: cp Tainted: P        (2.6.24.4-Gobo #1)
>  > EIP: 0060:[<c10a4d62>] EFLAGS: 00010246 CPU: 1
>  > EIP is at d_alloc+0x172/0x190
>  > EAX: ef583f24 EBX: ef583ee0 ECX: 00000000 EDX: ef583f44
>  > ESI: ef8bb033 EDI: ef583f4e EBP: ef5f1550 ESP: ef80bdd4
>  >  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
>  > Process cp (pid: 10131, ti=ef80a000 task=ef8fb170 task.ti=ef80a000)
>  > Stack: ef80be38 ef583ee0 ef5f1550 00000000 ef80bf04 ef80be38 c1099f21 
> ef80be44
>  >        f75cd280 ef5de068 ef5de0e0 ef80be38 ef8bb033 ef5de068 ef8bb029 
> c109bf02
>  >        ef80bf04 ef8bb029 00000000 00000000 ef192078 c10ea4b4 ef80be80 
> 00000000
>  > Call Trace:
>  >  [<c1099f21>] do_lookup+0x131/0x190
>  >  [<c109bf02>] __link_path_walk+0x7e2/0xdb0
>  >  [<c10ea4b4>] reiserfs_readdir+0x3c4/0x4c0
>  >  [<c109c515>] link_path_walk+0x45/0xc0
>  >  [<c109c778>] do_path_lookup+0x78/0x220
>  >  [<c109b53a>] getname+0x9a/0xf0
>  >  [<c109d1cb>] __user_walk_fd+0x3b/0x60
>  >  [<c1095def>] vfs_lstat_fd+0x1f/0x50
>  >  [<c1095e9f>] sys_lstat64+0xf/0x30
>  >  [<c1093612>] __fput+0x112/0x170
>  >
>  > This have been tested with both reiserfs and ext3 underneath. Do you
>  > have any ideas?
>  >
>  > Thanks,
>  >
>  > --
>  > Lucas
>  > powered by /dev/dsp
>
>  Lucas, I don't see unionfs directly involved in the stack trace above.  Do
>  you have more information?  Can I get a livecd to boot myself, and
>  instructions how to tickle this bug?

This bug happens when union and bind mounts are involved together.
However, I can reproduce the bug reported by Bob, which seems pretty
similar to the one I'm receiving here. I believe they are related to
each other (both panic after assertion fails in dcache.h's dget()).

Running the commands suggested by Bob gives me a slightly different
panic message, though (null pointer):

BUG: unable to handle kernel NULL pointer dereference at virtual
address 0000000f
printing eip: c10a866a *pde = 00000000
Oops: 0000 [#1] PREEMPT SMP
Modules linked in: ne2k_pci 8390

Pid: 2519, comm: rm Not tainted (2.6.24.4-Gobo #1)
EIP: 0060:[<c10a866a>] EFLAGS: 00000217 CPU: 0
EIP is at __lookup_mnt+0x4a/0x70
EAX: 00000007 EBX: 00000001 ECX: 00000009 EDX: c7805dc8
ESI: c7acbb80 EDI: c76f9330 EBP: c6e79e38 ESP: c6e79dc4
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process rm (pid: 2519, ti=c6e78000 task=c6e7d740 task.ti=c6e78000)
Stack: c76f9330 c7acbb80 00000000 c10aa4e6 00000001 c6e79e44 c1099cec c6e79e38
       c76f9330 c6e79f04 c1099e55 c6e79e44 c7acbb80 c1099a7e 019750b8 c6e79e38
       c6dfb00b c740a068 c6dfb001 c109b84a c6e79f04 c6dfb001 00000000 00000000
Call Trace:
 [<c10aa4e6>] lookup_mnt+0x26/0x50
 [<c1099cec>] __follow_mount+0x5c/0x70
 [<c1099e55>] do_lookup+0x65/0x190
 [<c1099a7e>] permission+0x7e/0x160
 [<c109b84a>] __link_path_walk+0x12a/0xdb0
 [<c109c515>] link_path_walk+0x45/0xc0
 [<c109c778>] do_path_lookup+0x78/0x220
 [<c109b53a>] getname+0x9a/0xf0
 [<c109d1cb>] __user_walk_fd+0x3b/0x60
 [<c1095def>] vfs_lstat_fd+0x1f/0x50
 [<c1095f49>] sys_fstatat64+0x29/0x60
 [<c16b3079>] do_page_fault+0x169/0x790
 [<c16b2f10>] do_page_fault+0x0/0x790
 [<c100846e>] sysenter_past_esp+0x6b/0xa1
 =======================
Code: bc 32 8f c1 21 d0 8d 14 c5 00 00 00 00 a1 b8 32 8f c1 01 c2 89
d0 8d 74 26 00 8d bc 27 00 00 00 00 85 db 74 14 8b 00 39 d0 74 18 <3b>
70
08 75 f1 3b 78 0c 75 ec 5b 5e 5f c3 8b 40 04 39 d0 8d 76
EIP: [<c10a866a>] __lookup_mnt+0x4a/0x70 SS:ESP 0068:c6e79dc4
---[ end trace 43dc70afb97a9ff5 ]---
note: rm[2519] exited with preempt_count 1

Thanks,
Lucas
_______________________________________________
unionfs mailing list: http://unionfs.filesystems.org/
unionfs@mail.fsl.cs.sunysb.edu
http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs

Reply via email to