http://bugzilla.kernel.org/show_bug.cgi?id=13375
--- Comment #22 from Eric Sandeen <sandeen@xxxxxxxxxx> 2009-07-15 04:16:31 ---
Ok, on 2.6.30-6.fc12.x86_64 w/ selinux enabled I can oops it very quickly with
the suggested large dd from a client (client is 2.6.27.24-170.2.68.fc10.x86_64)
rpc.nfsd used greatest stack depth: 2752 bytes left
(note: post oops, I have: nfsd used greatest stack depth: 1528 bytes left)
general protection fault: 0000 [#1] SMP
last sysfs file: /sys/module/lockd/initstate
CPU 1
Modules linked in: nfsd lockd nfs_acl auth_rpcgss xfs exportfs ipt_MASQUERADE
iptable_nat nf_nat bridge stp llc sunrpc ip6t_REJECT nf_conntrack_ipv6
ip6table_filter ip6_tables ipv6 cpufreq_ondemand acpi_cpufreq freq_table
dm_multipath kvm i2c_i801 i3000_edac pata_sil680 iTCO_wdt iTCO_vendor_support
i2c_core edac_core shpchp tg3 joydev serio_raw pcspkr dcdbas ata_generic
pata_acpi [last unloaded: microcode]
Pid: 1530, comm: nfsd Not tainted 2.6.30-6.fc12.x86_64 #1 PowerEdge 860
RIP: 0010:[<ffffffff811ff1d6>] [<ffffffff811ff1d6>] inode_has_perm+0x3d/0x87
RSP: 0018:ffff88007046fb60 EFLAGS: 00010246
RAX: 6b6b6b6b6b6b6b6b RBX: 0000000000100004 RCX: 0000000000000000
RDX: 0000000000100004 RSI: ffff8800715a92f8 RDI: ffff88007d101c00
RBP: ffff88007046fbb0 R08: 0000000000000000 R09: 0000000000000000
R10: ffff8800785b8210 R11: 0000000000000000 R12: ffff8800715a92f8
R13: ffff88007d101c00 R14: ffff880070176f00 R15: ffff8800715a92f8
FS: 0000000000000000(0000) GS:ffff880004fdb000(0000) knlGS:0000000000000000
CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007fb7b55b6000 CR3: 0000000071b32000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process nfsd (pid: 1530, threadinfo ffff88007046e000, task ffff880070470000)
Stack:
ffff88007046fbb0 0000000000000246 ffffffff81777f58 000000008c63e246
ffffffff81777f40 000000008c63e246 ffff880070176f00 ffffffff81777f40
ffff88007046fbd0 000000008c63e246 ffff88007046fbf0 ffffffff81202b60
Call Trace:
[<ffffffff81202b60>] selinux_dentry_open+0x101/0x122
[<ffffffff811f50e1>] security_dentry_open+0x29/0x3f
[<ffffffff811237b7>] __dentry_open+0x16f/0x316
[<ffffffff811239f2>] dentry_open+0x94/0xaf
[<ffffffffa02df143>] nfsd_open+0x13c/0x179 [nfsd]
[<ffffffff814b96ec>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[<ffffffffa02df4a6>] nfsd_write+0xa2/0x100 [nfsd]
[<ffffffff81013b50>] ? restore_args+0x0/0x30
[<ffffffffa02e6ed2>] nfsd3_proc_write+0xe4/0x114 [nfsd]
[<ffffffffa02d93dc>] nfsd_dispatch+0x112/0x204 [nfsd]
[<ffffffffa01bbc33>] svc_process+0x438/0x668 [sunrpc]
[<ffffffffa02d9a16>] nfsd+0x119/0x164 [nfsd]
[<ffffffffa02d98fd>] ? nfsd+0x0/0x164 [nfsd]
[<ffffffff81075380>] kthread+0x6d/0xae
[<ffffffff8101418a>] child_rip+0xa/0x20
[<ffffffff81013b50>] ? restore_args+0x0/0x30
[<ffffffff81075313>] ? kthread+0x0/0xae
[<ffffffff81014180>] ? child_rip+0x0/0x20
Code: 28 00 00 00 48 89 45 f8 31 c0 44 8b 9e 78 04 00 00 49 89 c8 41 81 e3 00
02 00 00 75 42 48 8b 47 68 48 85 c9 4c 8b 96 80 04 00 00 <44> 8b 48 04 75 19 4c
8d 45 b0 b9 12 00 00 00 44 89 d8 4c 89 c7
RIP [<ffffffff811ff1d6>] inode_has_perm+0x3d/0x87
RSP <ffff88007046fb60>
---[ end trace 9ea7c13d71e4426e ]---
--
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
|