On Wed, 2007-09-19 at 12:53 +0200, NetArt - Grzegorz Nosek wrote:
> Hello all,
>
> [please keep CC'd]
>
> This oops report comes from 2.6.18.5, so it may have been fixed in a
> newer release, but I'm reporting nevertheless. OTOH, the (possibly)
> relevant code looks unchanged.
>
> The background is _probably_ attempting a core dump of a process,
> whose backing binary file is accessible via NFS.
>
> My understanding of the issue follows.
>
> After creating a list of pages to read, __do_page_cache_readahead calls
> (indirectly) mapping->a_ops->readpages, which must empty the list of
> pages passed to it (as asserted by the BUG_ON). However, nfs_readpages
> may return early in a few cases:
>
> if (NFS_STALE(inode))
> goto out;
>
> if (filp == NULL) {
> desc.ctx = nfs_find_open_context(inode, NULL, FMODE_READ);
> if (desc.ctx == NULL)
> return -EBADF;
> } else
> desc.ctx = get_nfs_open_context((struct nfs_open_context *)
> filp->private_data);
>
> I'd guess that the inode had gone stale (the process ran for quite
> some time), so nfs_readpages returned without even touching the list.
> Boom.
>
> Taking a SWAG, I'd guess a missing
> file->f_dentry->d_op->d_revalidate() in
> fs/exec.c::do_core_dump(), but d_revalidate needs a nameidata
> structure, which do_core_dump() doesn't seem to have at hand.
>
> Best regards,
> Grzegorz Nosek
>
> [16249868.626066] ------------[ cut here ]------------
> [16249868.684345] kernel BUG at mm/readahead.c:314!
> [16249868.739565] invalid opcode: 0000 [#1]
> [16249868.786480] SMP
> [16249868.811703] Modules linked in: xt_tcpudp iptable_nat ip_nat smbfs cls_u32 sch_sfq sch_htb xt_mark ipt_account xt_helper iptable_mangle xt_MARK xt_multiport ipt_LOG xt_limit iptable_filter ip_conntrack_ftp ip_conntrack xfs dm_mod ipmi_devintf ipmi_si ipmi_watchdog ipmi_msghandler softdog ip_tables x_tables nfsd exportfs tg3
> [16249869.159639] CPU: 0
> [16249869.159640] EIP: 0060:[<c0143546>] Not tainted VLI
> [16249869.159641] EFLAGS: 00010212 (2.6.18.5-na1.4 #1)
> [16249869.318036] EIP is at __do_page_cache_readahead+0xb4/0x212
> [16249869.386750] eax: ffffff8c ebx: c01c5399 ecx: 00000000 edx: d2ac3c20
> [16249869.471039] esi: 00000003 edi: 00000002 ebp: d2ac3c34 esp: d2ac3bc0
> [16249869.555330] ds: 007b es: 007b ss: 0068
> [16249869.607439] Process clamscan (pid: 13406, ti=d2ac2000 task=e8ebf190 task.ti=d2ac2000)
> [16249869.702108] Stack: 00000002 c9c33c60 c9c33c54 00000126 f28e8900 c9c33c50 c3792904 000002db
> [16249869.805908] 00001000 00000000 d2ac3c68 c013f85b 00002000 00000000 d2ac3d1c 00000000
> [16249869.909706] 00001000 d0a67000 00000200 00000001 d2ac3c90 d2ac3c88 d2ac3cd4 d2ac2000
> [16249870.013503] Call Trace:
> [16249870.047964] [<c0103c23>] show_stack_log_lvl+0xa8/0xe5
> [16249870.112527] [<c0103dff>] show_registers+0x19f/0x22f
> [16249870.175014] [<c0104308>] die+0x132/0x2de
> [16249870.226081] [<c034c8c1>] do_trap+0x76/0xa1
> [16249870.279225] [<c01049b7>] do_invalid_op+0x97/0xa1
> [16249870.338596] [<c0103641>] error_code+0x39/0x40
> [16249870.394854] [<c014375e>] do_page_cache_readahead+0x3d/0x51
> [16249870.464711] [<c013ed2f>] filemap_nopage+0x15e/0x3a4
> [16249870.527197] [<c014a8f5>] __handle_mm_fault+0x198/0xb69
> [16249870.592799] [<c014b385>] get_user_pages+0xbf/0x31c
> [16249870.654248] [<c0185a3a>] elf_core_dump+0x9aa/0xcf0
> [16249870.715695] [<c01647e5>] do_coredump+0x5c2/0x5f5
> [16249870.775070] [<c0126832>] get_signal_to_deliver+0x340/0x403
> [16249870.844925] [<c010255e>] do_notify_resume+0x19f/0x6c5
> [16249870.909489] [<c0102c2a>] work_notifysig+0x13/0x19
> [16249870.969897] Code: 4d a0 f0 ff 41 10 fb 85 ff 74 18 8b 41 38 8b 58 14 85 db 74 20 89 3c 24 8d 4d ec 8b 55 a0 8b 45 9c ff d3 8d 55 ec 3b 55 ec 74 9a <0f> 0b 3a 01 8b 95 37 c0 eb 90 c7 45 ac 00 00 00 00 c745 b0 00
> [16249871.205111] EIP: [<c0143546>] __do_page_cache_readahead+0xb4/0x212 SS:ESP 0068:d2ac3bc0
That bug should have been fixed in 2.6.19-rc5. See
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=029e332ea717810172e965ec50f942755ad0c58a
Cheers
Trond
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]