[EMAIL PROTECTED] wrote on Wed, 20 Dec 2006 11:49 -0800:
> As you have rightly deduced, we don't need the calls to
> dcache_dir_open() (on dir opens).
> This would have been needed had we made use of the libfs stuff. If you
> look at fs/libfs.c on 2.6,
> open() of a directory should create a new child dentry and save it in
> ->private_data.
> Close should dput() that, while readdir() uses that as the cursor to
> walk through the things
> and so does lseek() (libfs is a librification of most commonly used
> APIs that any in-memory file system does not need to reinvent, like
> ramfs/relayfs etc).
> Since pvfs2 has its own set of readdir/lseek implementations, this
> cursor stuff is not needed
> even on 2.6 kernels.
>
> Can you retest with that stuff yanked out if you get time?
No luck. Got rid of call to dcache_dir_open() in pvfs2_file_open()
and it oopses similarly, but in a slightly different place. I give
up, but thanks for thinking about it.
-- Pete
ipf-login3 login: pvfs2: module version 2.6.1pre1-2006-12-22-203603 loaded
kernel BUG in header file at line 259
kernel BUG at panic.c:297!
Unable to handle kernel paging request at virtual address a000000000000000
bash[11555]: Oops 11003706212352
Pid: 11555, comm: bash
Registers: cpu 0, sapicid 0x0000, time 190952785
psr : 0000121008026038 ifs : 8000000000000186 ip : [<e0000000044ffb91>]
Tainted: PF
ip is at __out_of_line_bug+0x71/0xa0 [kernel]
unat: 0000000000000000 pfs : 0000000000000186 rsc : 0000000000000003
rnat: 0000000000000000 bsps: 0000000000000000 pr : 9a1680005416a955
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
b0 : e0000000044ffb80 b6 : e0000030042d5e00 b7 : e000000000fffc00
f6 : 1003e0a3d70a3d70a3eb8 f7 : 10008fa00000000000000
f8 : 1003e0000002b7115a611 f9 : 10024adc456984773b943
r1 : e0000000051ff200 r2 : a000000000000000 r3 : e00002b0061b4074
r8 : 000000000000001b r9 : 0000000000000001 r10 : 0000000000000073
r11 : e00002b0061b47b0 r12 : e00000346926fe10 r13 : e000003469268000
r14 : e00002b0061b4008 r15 : 0000000000000000 r16 : 0000000000000000
r17 : 0000000000004000 r18 : 0000000000004000 r19 : 0000000000004000
r20 : e00002b0061b47b8 r21 : e00000346926fdb0 r22 : 0000000000000000
r23 : e00002b0061b4790 r24 : 0000000000000073 r25 : 0000000000000073
r26 : 0000000000000000 r27 : e00000346926803c r28 : e00000347b8c003c
r29 : e00000347b8c0000 r30 : e00002b0061b4010 r31 : e00002b0061b4008
Call Trace:
[<e000000004415220>] show_stack+0x80/0xa0 [kernel]
sp=e00000346926fa10 bsp=e00000346926b370
[<e000000004431f60>] die+0x1a0/0x2e0 [kernel]
sp=e00000346926fbe0 bsp=e00000346926b340
[<e000000004453870>] ia64_do_page_fault+0x370/0x980 [kernel]
sp=e00000346926fbe0 bsp=e00000346926b2e8
[<e00000000440e320>] ia64_leave_kernel+0x0/0x290 [kernel]
sp=e00000346926fc70 bsp=e00000346926b2e8
[<e0000000044ffb90>] __out_of_line_bug+0x70/0xa0 [kernel]
sp=e00000346926fe10 bsp=e00000346926b2b8
[<e0000000045c59f0>] d_alloc+0x1f0/0x380 [kernel]
sp=e00000346926fe10 bsp=e00000346926b278
[<e0000000045ad8c0>] real_lookup+0x1a0/0x340 [kernel]
sp=e00000346926fe10 bsp=e00000346926b238
[<e0000000045af180>] link_path_walk+0x13c0/0x1b00 [kernel]
sp=e00000346926fe10 bsp=e00000346926b1c8
[<e0000000045b0010>] path_lookup+0x90/0xa0 [kernel]
sp=e00000346926fe30 bsp=e00000346926b1a0
[<e0000000045b08a0>] __user_walk+0x80/0xc0 [kernel]
sp=e00000346926fe30 bsp=e00000346926b178
[<e0000000045a4870>] sys_newstat+0x30/0x180 [kernel]
sp=e00000346926fe30 bsp=e00000346926b118
[<e00000000440e300>] ia64_ret_from_syscall+0x0/0x20 [kernel]
sp=e00000346926fe60 bsp=e00000346926b0f0
Entering kdb (current=0xe000003469268000, pid 11555) on processor 0 Oops: <NULL>
due to oops @ 0xe0000000044ffb91
psr: 0x0000121008026038 ifs: 0x8000000000000186 ip: 0xe0000000044ffb90
unat: 0x0000000000000000 pfs: 0x0000000000000186 rsc: 0x0000000000000003
rnat: 0x0000000000000000 bsps: 0x0000000000000000 pr: 0x9a1680005416a955
ldrs: 0x0000000000000000 ccv: 0x0000000000000000 fpsr: 0x0009804c8a70033f
b0: 0xe0000000044ffb80 b6: 0xe0000030042d5e00 b7: 0xe000000000fffc00
r1: 0xe0000000051ff200 r2: 0xa000000000000000 r3: 0xe00002b0061b4074
r8: 0x000000000000001b r9: 0x0000000000000001 r10: 0x0000000000000073
r11: 0xe00002b0061b47b0 r12: 0xe00000346926fe10 r13: 0xe000003469268000
r14: 0xe00002b0061b4008 r15: 0x0000000000000000 r16: 0x0000000000000000
r17: 0x0000000000004000 r18: 0x0000000000004000 r19: 0x0000000000004000
r20: 0xe00002b0061b47b8 r21: 0xe00000346926fdb0 r22: 0x0000000000000000
r23: 0xe00002b0061b4790 r24: 0x0000000000000073 r25: 0x0000000000000073
r26: 0x0000000000000000 r27: 0xe00000346926803c r28: 0xe00000347b8c003c
r29: 0xe00000347b8c0000 r30: 0xe00002b0061b4010 r31: 0xe00002b0061b4008
®s = e00000346926fc80
_______________________________________________
Pvfs2-developers mailing list
[email protected]
http://www.beowulf-underground.org/mailman/listinfo/pvfs2-developers