Bug 545125 - BUG: warning at fs/inotify.c:192/set_dentry_child_flags()
Summary: BUG: warning at fs/inotify.c:192/set_dentry_child_flags()
Keywords:
Status: CLOSED DUPLICATE of bug 499019
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel
Version: 5.4
Hardware: All
OS: Linux
low
low
Target Milestone: rc
: ---
Assignee: Josef Bacik
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-07 16:45 UTC by François Cami
Modified: 2010-11-09 13:17 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-09-09 16:56:33 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
sanitized dmesg showing BUGs (21.39 KB, text/plain)
2009-12-07 16:49 UTC, François Cami
no flags Details
patch to fix the problem (2.49 KB, patch)
2009-12-08 16:15 UTC, Josef Bacik
no flags Details | Diff

Description François Cami 2009-12-07 16:45:05 UTC
Description of problem:
In dmesg | /var/log/messages:
############
BUG: warning at fs/inotify.c:192/set_dentry_child_flags() (Not tainted)

Call Trace:
 [<ffffffff802e84f9>] set_dentry_child_flags+0x6e/0x14d
 [<ffffffff802e8610>] remove_watch_no_event+0x38/0x47
 [<ffffffff802e8637>] inotify_remove_watch_locked+0x18/0x3b
 [<ffffffff802e8772>] inotify_rm_wd+0x8d/0xb6
 [<ffffffff802e8ce8>] sys_inotify_rm_watch+0x46/0x63
 [<ffffffff802602f9>] tracesys+0xab/0xb6

BUG: warning at fs/inotify.c:192/set_dentry_child_flags() (Not tainted)

Call Trace:
 [<ffffffff802e84f9>] set_dentry_child_flags+0x6e/0x14d
 [<ffffffff802e89e9>] inotify_add_watch+0x95/0xcd
 [<ffffffff8024e71b>] sys_inotify_add_watch+0x135/0x17f
 [<ffffffff802e8685>] put_inotify_watch+0x2b/0x4d
 [<ffffffff802af350>] audit_syscall_entry+0x180/0x1b3
 [<ffffffff802602f9>] tracesys+0xab/0xb6
############

Version-Release number of selected component (if applicable):
kernel-xen-2.6.18-164.6.1.el5

Steps to Reproduce:
Let the VM run, have a few processes that generate coredumps.
It seems to happen randomly (but it happened 34 times in 27 days).


Additional info:
All filesystems are ext3. 
Maybe see: https://bugzilla.redhat.com/show_bug.cgi?id=248355
Esp. https://bugzilla.redhat.com/show_bug.cgi?id=248355#c13

Comment 1 François Cami 2009-12-07 16:49:41 UTC
Created attachment 376730 [details]
sanitized dmesg showing BUGs

Comment 2 Chris Lalancette 2009-12-08 08:25:29 UTC
Interesting, thanks for the report.  This seems like a problem in the inotify/fs layer, so I'm going to move this over to the kernel component.  Hopefully someone in the filesystem group will recognize the backtrace and can suggest which patch(es) from upstream helped resolve it.

Chris Lalancette

Comment 3 Josef Bacik 2009-12-08 15:24:36 UTC
fixed in commit

0d71bd5993b630a989d15adc2562a9ffe41cd26d

i will backport this today, will you be able to build a test kernel with the patch to verify it works, or will you need me to build a kernel for you?

Comment 4 Josef Bacik 2009-12-08 16:15:30 UTC
Created attachment 376940 [details]
patch to fix the problem

This is the backported patch.  Please test it and verify it fixes your problem.  If you do not know how to build a kernel with a test patch just let me know and I will build you one to test.  Thanks.

Comment 5 François Cami 2009-12-08 18:41:12 UTC
I can build and boot a new kernel, but I have no straightforward way to reproduce the bug. Still, I'll test and report.
Thanks!

Comment 6 RHEL Program Management 2010-05-20 12:49:34 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 7 Josef Bacik 2010-09-09 16:56:33 UTC

*** This bug has been marked as a duplicate of bug 499019 ***


Note You need to log in before you can comment on or make changes to this bug.