Bug 545125

Summary: BUG: warning at fs/inotify.c:192/set_dentry_child_flags()
Product: Red Hat Enterprise Linux 5 Reporter: François Cami <contribs>
Component: kernelAssignee: Josef Bacik <jbacik>
Status: CLOSED DUPLICATE QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: low Docs Contact:
Priority: low    
Version: 5.4CC: clalance, jbacik, mjenner, xen-maint
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-09-09 16:56:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
sanitized dmesg showing BUGs
none
patch to fix the problem none

Description François Cami 2009-12-07 16:45:05 UTC
Description of problem:
In dmesg | /var/log/messages:
############
BUG: warning at fs/inotify.c:192/set_dentry_child_flags() (Not tainted)

Call Trace:
 [<ffffffff802e84f9>] set_dentry_child_flags+0x6e/0x14d
 [<ffffffff802e8610>] remove_watch_no_event+0x38/0x47
 [<ffffffff802e8637>] inotify_remove_watch_locked+0x18/0x3b
 [<ffffffff802e8772>] inotify_rm_wd+0x8d/0xb6
 [<ffffffff802e8ce8>] sys_inotify_rm_watch+0x46/0x63
 [<ffffffff802602f9>] tracesys+0xab/0xb6

BUG: warning at fs/inotify.c:192/set_dentry_child_flags() (Not tainted)

Call Trace:
 [<ffffffff802e84f9>] set_dentry_child_flags+0x6e/0x14d
 [<ffffffff802e89e9>] inotify_add_watch+0x95/0xcd
 [<ffffffff8024e71b>] sys_inotify_add_watch+0x135/0x17f
 [<ffffffff802e8685>] put_inotify_watch+0x2b/0x4d
 [<ffffffff802af350>] audit_syscall_entry+0x180/0x1b3
 [<ffffffff802602f9>] tracesys+0xab/0xb6
############

Version-Release number of selected component (if applicable):
kernel-xen-2.6.18-164.6.1.el5

Steps to Reproduce:
Let the VM run, have a few processes that generate coredumps.
It seems to happen randomly (but it happened 34 times in 27 days).


Additional info:
All filesystems are ext3. 
Maybe see: https://bugzilla.redhat.com/show_bug.cgi?id=248355
Esp. https://bugzilla.redhat.com/show_bug.cgi?id=248355#c13

Comment 1 François Cami 2009-12-07 16:49:41 UTC
Created attachment 376730 [details]
sanitized dmesg showing BUGs

Comment 2 Chris Lalancette 2009-12-08 08:25:29 UTC
Interesting, thanks for the report.  This seems like a problem in the inotify/fs layer, so I'm going to move this over to the kernel component.  Hopefully someone in the filesystem group will recognize the backtrace and can suggest which patch(es) from upstream helped resolve it.

Chris Lalancette

Comment 3 Josef Bacik 2009-12-08 15:24:36 UTC
fixed in commit

0d71bd5993b630a989d15adc2562a9ffe41cd26d

i will backport this today, will you be able to build a test kernel with the patch to verify it works, or will you need me to build a kernel for you?

Comment 4 Josef Bacik 2009-12-08 16:15:30 UTC
Created attachment 376940 [details]
patch to fix the problem

This is the backported patch.  Please test it and verify it fixes your problem.  If you do not know how to build a kernel with a test patch just let me know and I will build you one to test.  Thanks.

Comment 5 François Cami 2009-12-08 18:41:12 UTC
I can build and boot a new kernel, but I have no straightforward way to reproduce the bug. Still, I'll test and report.
Thanks!

Comment 6 RHEL Program Management 2010-05-20 12:49:34 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 7 Josef Bacik 2010-09-09 16:56:33 UTC

*** This bug has been marked as a duplicate of bug 499019 ***