Description of problem:
@ Linux ca-ostest184.us.oracle.com 2.6.18-220.127.116.11.1.el5 #1 SMP Tue Jun 5
23:05:00 EDT 2007 i686 i686 i386 GNU/Linux
------------[ cut here ]------------
kernel BUG at mm/filemap.c:553!
invalid opcode: 0000 [#1]
last sysfs file: /block/sda/stat
Modules linked in: netconsole autofs4 hidp nfs lockd fscache nfs_acl rfcomm
l2cap bluetooth sunrpc ib_iser rdma_cm ib_addr i
@ b_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi scsi_transport_iscsi dm_mirror
dm_multipath dm_mod video sbs i2c_ec button batt
ery asus_acpi ac ipv6 parport_pc lp parport i2c_piix4 i2c_core sg cfi_probe
gen_probe scb2_flash ide_cd floppy cdrom mtdcore
@ serio_raw pcspkr chipreg e1000 tg3 aic7xxx scsi_transport_spi sd_mod
@ scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd
EIP: 0060:[<c044f8c6>] Not tainted VLI
EFLAGS: 00010246 (2.6.18-18.104.22.168.1.el5 #1)
EIP is at unlock_page+0xe/0x27
eax: 00000000 ebx: c28109c0 ecx: c066ab00 edx: c066ab8c
esi: f4d08540 edi: 000200d2 ebp: c28109c0 esp: f33dfed4
ds: 007b es: 007b ss: 0068
Process fio (pid: 3771, ti=f33df000 task=f33cc000 task.ti=f33df000)
Stack: ffffffef c048baad f33dff24 f4d08540 f4d08400 fffb4000 f3725b00
000200d2 00000000 00001000 00001d01 00001000 00001000 f4d08540
00001000 c048af49 00000001 c066cdd8 00001000 00001000 00000000
Version-Release number of selected component (if applicable):
Steps to Reproduce:
io stress tests against ext3
Created attachment 299787 [details]
patch to unlock_page
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release. Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products. This request is not yet committed for inclusion in an Update
Created attachment 311502 [details]
job file to reproduce the crash
while true; do fio dio-breaker; done
It runs for a few iterations before crashing for me.
You can download this test kernel from http://people.redhat.com/dzickus/el5
Oracle, a fix for this bug should be available for testing in the RHEL 5.3 Beta release. You can download these bits from RHN.
Please take a moment to verify that the fix is present and functioning as expected and report back your test results as soon as possible. Thanks! Please ping your Red Hat Partner Manager with any additional questions.
Removing the CVE name from the synopsis; this is because we have already fixed this issue for Red Hat Enterprise Linux 5 users via an asynchronous security advisory. This bug serves as a placeholder to ensure that the bug was also fixed and tested in the upcoming 5.3 kernel.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.