[OpenAFS-devel] 1.3.71 on linux 2.6.8-1.541

Jack Neely jjneely@pams.ncsu.edu
Tue, 28 Sep 2004 16:09:30 -0400


--k+w/mQv8wyuph6w0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Folks,

Its time to start testing for Red Hat's next generation of products.  So
I pulled OpenAFS 1.3.71 made my RPMs (stock openafs, no weirdo patches
as I've done before) and did some testing with the kernel in Fedora Core
3 Test 2 which is 2.6.8-1.541.

I can navigate through the AFS filesystem okay but it looks like Bad
Things(tm) happen when I file in AFS gets certain iocrl()'s.  The
kernel oopses.  See the attached log file from dmesg.

Whipping out strace it looks like the offender is

   ioctl(3, SNDCTL_TMR_TIMEBASE or TCGETS <unfinished> ...)

where 3 is the open fd of a python script.  In this case, I'm trying to
execute a simple python script.

Thoughts?

Jack Neely
-- 
Jack Neely <slack@quackmaster.net>
Realm Linux Administration and Development
PAMS Computer Operations at NC State University
GPG Fingerprint: 1917 5AC1 E828 9337 7AA4  EA6B 213B 765F 3B6A 5B89

--k+w/mQv8wyuph6w0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=oops

libafs: module license 'unspecified' taints kernel.
Failed to find address of sys_call_table
Starting AFS cache scan...found 0 non-empty cache files (0%).
SELinux: initialized (dev afs, type afs), not configured for labeling
Unable to handle kernel paging request at virtual address fefed044
 printing eip:
22a85044
*pde = 00000000
Oops: 0000 [#1]
Modules linked in: libafs(U) loop parport_pc lp parport autofs4 sunrpc ipt_REJECT ipt_state ip_conntrack iptable_filter ip_tables button battery asus_acpi ac i810 md5 ipv6 uhci_hcd hw_random snd_ens1371 snd_rawmidi snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc snd_ac97_codec snd soundcore gameport 3c59x floppy ext3 jbd dm_mod
CPU:    0
EIP:    0060:[<22a85044>]    Tainted: P   VLI
EFLAGS: 00010286   (2.6.8-1.541) 
EIP is at afs_xioctl+0x27/0x88 [libafs]
eax: 00000001   ebx: 22a9e7e0   ecx: 00005401   edx: 18459e60
esi: 00000000   edi: fefecf78   ebp: 05be7f5c   esp: 05be7f5c
ds: 007b   es: 007b   ss: 0068
Process client.py (pid: 18732, threadinfo=05be7000 task=06047370)
Stack: 000001f4 00000001 22a9e7e0 18459e60 fefecf78 ffffffe7 02175e4a fefecf78 
       00004868 000001f4 00000001 0234c0c0 00000000 00005401 18459e60 021760d3 
       22b201c8 40c5f1ce 00000000 00001000 0000000e 05be7fc4 fefecfc4 00c23ffc 
Call Trace:
 [<02175e4a>] file_ioctl+0xf2/0x105
 [<021760d3>] sys_ioctl+0x276/0x337
Code: <3>Debug: sleeping function called from invalid context at include/linux/rwsem.h:43
in_atomic():0[expected: 0], irqs_disabled():1
 [<0211c50c>] __might_sleep+0x7d/0x89
 [<0215e0fe>] rw_vm+0x216/0x482
 [<22a85019>] HandleIoctl+0xab/0xaf [libafs]
 [<22a85019>] HandleIoctl+0xab/0xaf [libafs]
 [<0215e850>] get_user_size+0x30/0x57
 [<22a85019>] HandleIoctl+0xab/0xaf [libafs]
 [<0210664d>] show_registers+0x109/0x15e
 [<02106822>] die+0x11b/0x219
 [<02119110>] do_page_fault+0x0/0x4a0
 [<02119454>] do_page_fault+0x344/0x4a0
 [<22a85044>] afs_xioctl+0x27/0x88 [libafs]
 [<0215e8a0>] put_user_size+0x29/0x2d
 [<0216cc15>] cp_new_stat64+0xf5/0x107
 [<0217b0a3>] dput+0x33/0x4f3
 [<02119110>] do_page_fault+0x0/0x4a0
 [<22a85044>] afs_xioctl+0x27/0x88 [libafs]
 [<02175e4a>] file_ioctl+0xf2/0x105
 [<021760d3>] sys_ioctl+0x276/0x337
 Bad EIP value.
 

--k+w/mQv8wyuph6w0--