Hello Junjiro > When you have time, would you test this patch?
I have tested it. Unfortunatly I get a kernel panic if I execute: # mount / -o remount,udba=notify I applied the patch to 3.2-20120109. This is the output I get (over serial): BUG: unable to handle kernel NULL pointer dereference at 00000014 IP: [<c1350c88>] _raw_spin_lock+0x8/0x30 *pde = 00000000 Oops: 0002 [#1] SMP Modules linked in: tun ipt_REJECT xt_state xt_policy ipt_LOG xt_limit xt_TCPMSS xt_tcpmss xt_tcpudp xt_NOTRACK iptable_filter iptable_nat iptable_mangle iptable_raw ip_tables x_tables nf_nat_ftp nf_nat nf_co nntrack_ipv4 nf_defrag_ipv4 nf_conntrack_ftp nf_conntrack rtc ppdev parport_pc parport w83792d i2c_dev i2c_i801 i2c_core pl2303 usbserial coretemp hwmon usbhid ohci_hcd uhci_hcd ehci_hcd usbcore usb_common e 1000 e1000e aufs ata_piix libata Pid: 4362, comm: bash Not tainted 3.2.1-SMP #2 /LakePort EIP: 0060:[<c1350c88>] EFLAGS: 00010286 CPU: 1 EIP is at _raw_spin_lock+0x8/0x30 EAX: 00000014 EBX: 00000000 ECX: 00000000 EDX: 00000100 ESI: f80ef640 EDI: 00000002 EBP: f590fd40 ESP: f590fd40 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process bash (pid: 4362, ti=f590e000 task=f647dba0 task.ti=f590e000) Stack: f590fd58 c10cc763 f590fdc4 00000000 f80ef640 00000002 f590fd70 f80e46a6 f51c90c8 00000000 f53ed7c0 f5f213e0 f590fd7c f80e428a f5f213e0 f590fd88 f80d8efb 00000003 f590fda4 f80d9083 f6532000 f62b5e00 f62b5e30 f62b5ec8 Call Trace: [<c10cc763>] fsnotify_destroy_mark+0x13/0x120 [<f80e46a6>] au_hfsn_free+0x26/0x40 [aufs] [<f80e428a>] au_hn_free+0x1a/0x40 [aufs] [<f80d8efb>] au_hiput+0xb/0x20 [aufs] [<f80d9083>] au_iinfo_fin+0x173/0x220 [aufs] [<f80bf85b>] aufs_destroy_inode+0xb/0x20 [aufs] [<c10af97c>] destroy_inode+0x2c/0x50 [<c10afa73>] evict+0xd3/0x150 [<c10afbad>] iput+0xbd/0x1a0 [<c10adb1f>] d_kill+0x9f/0xf0 [<c10ae2c9>] dput+0xb9/0x160 [<c10a381e>] path_put+0xe/0x20 [<c10a385d>] terminate_walk+0x2d/0x40 [<c10a543d>] path_lookupat+0x17d/0x690 [<f80e58b5>] ? __au_dbg_verify_dinode+0xc5/0x260 [aufs] [<c10a5975>] do_path_lookup+0x25/0x70 [<c10a5a6e>] user_path_at_empty+0x3e/0x80 [<c109e52e>] ? cp_new_stat64+0xde/0xf0 [<c10a5aca>] user_path_at+0x1a/0x20 [<c109ea2f>] vfs_fstatat+0x3f/0x70 [<c109eb6b>] vfs_stat+0x1b/0x20 [<c109eb84>] sys_stat64+0x14/0x30 [<c10341c0>] ? capable+0x10/0x20 [<c1350fe5>] syscall_call+0x7/0xb Code: 00 89 d0 f0 66 0f b1 19 66 39 c2 0f 94 c0 0f b6 c0 5b 5d c3 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 90 55 ba 00 01 00 00 89 e5 <f0> 66 0f c1 10 89 d1 66 c1 e9 08 38 d1 74 0a 90 f3 90 0f b6 10 EIP: [<c1350c88>] _raw_spin_lock+0x8/0x30 SS:ESP 0068:f590fd40 CR2: 0000000000000014 BUG: unable to handle kernel ---[ end trace 0272b8d0fcc34b18 ]--- Kernel panic - not syncing: Fatal exception Pid: 4362, comm: bash Tainted: G D 3.2.1-SMP #2 Call Trace: [<c134e713>] panic+0x57/0x157 [<c1004f71>] oops_end+0xb1/0xc0 [<c101b45e>] no_context+0xbe/0x150 [<c101b527>] __bad_area_nosemaphore+0x37/0x160 [<c10a39d2>] ? d_alloc_and_lookup+0x32/0x70 [<c10a6775>] ? __lookup_hash+0x85/0xd0 [<c101b6ab>] bad_area+0x3b/0x50 [<c101b840>] ? mm_fault_error+0x130/0x130 [<c101bb8e>] do_page_fault+0x34e/0x3b0 [<f80c9835>] ? vfsub_lookup_one_len+0x25/0xa0 [aufs] [<f80d059f>] ? au_lkup_one+0x2f/0x110 [aufs] [<c10431ca>] ? wake_up_bit+0x5a/0x60 [<c10af3f8>] ? unlock_new_inode+0x28/0x50 [<f80da14e>] ? au_new_inode+0x58e/0x7e0 [aufs] [<c101b840>] ? mm_fault_error+0x130/0x130 [<c13515ba>] error_code+0x5a/0x60 [<c101b840>] ? mm_fault_error+0x130/0x130 [<c1350c88>] ? _raw_spin_lock+0x8/0x30 [<c10cc763>] fsnotify_destroy_mark+0x13/0x120 [<f80e46a6>] au_hfsn_free+0x26/0x40 [aufs] [<f80e428a>] au_hn_free+0x1a/0x40 [aufs] [<f80d8efb>] au_hiput+0xb/0x20 [aufs] [<f80d9083>] au_iinfo_fin+0x173/0x220 [aufs] [<f80bf85b>] aufs_destroy_inode+0xb/0x20 [aufs] [<c10af97c>] destroy_inode+0x2c/0x50 [<c10afa73>] evict+0xd3/0x150 [<c10afbad>] iput+0xbd/0x1a0 [<c10adb1f>] d_kill+0x9f/0xf0 [<c10ae2c9>] dput+0xb9/0x160 [<c10a381e>] path_put+0xe/0x20 [<c10a385d>] terminate_walk+0x2d/0x40 [<c10a543d>] path_lookupat+0x17d/0x690 [<f80e58b5>] ? __au_dbg_verify_dinode+0xc5/0x260 [aufs] [<c10a5975>] do_path_lookup+0x25/0x70 [<c10a5a6e>] user_path_at_empty+0x3e/0x80 [<c109e52e>] ? cp_new_stat64+0xde/0xf0 [<c10a5aca>] user_path_at+0x1a/0x20 [<c109ea2f>] vfs_fstatat+0x3f/0x70 [<c109eb6b>] vfs_stat+0x1b/0x20 [<c109eb84>] sys_stat64+0x14/0x30 [<c10341c0>] ? capable+0x10/0x20 [<c1350fe5>] syscall_call+0x7/0xb NULL pointer dereference at 00000014 IP: [<c1350c88>] _raw_spin_lock+0x8/0x30 *pde = 00000000 Oops: 0002 [#2] SMP Modules linked in: tun ipt_REJECT xt_state xt_policy ipt_LOG xt_limit xt_TCPMSS xt_tcpmss xt_tcpudp xt_NOTRACK iptable_filter iptable_nat iptable_mangle iptable_raw ip_tables x_tables nf_nat_ftp nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack_ftp nf_conntrack rtc ppdev parport_pc parport w83792d i2c_dev i2c_i801 i2c_core pl2303 usbserial coretemp hwmon usbhid ohci_hcd uhci_hcd ehci_hcd usbcore usb_common e1000 e1000e aufs ata_piix libata Pid: 4588, comm: lcd4linux Tainted: G D 3.2.1-SMP #2 /LakePort EIP: 0060:[<c1350c88>] EFLAGS: 00010286 CPU: 0 EIP is at _raw_spin_lock+0x8/0x30 EAX: 00000014 EBX: 00000000 ECX: 00000000 EDX: 00000100 ESI: f80ef640 EDI: 00000002 EBP: f59bfe3c ESP: f59bfe3c DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process lcd4linux (pid: 4588, ti=f59be000 task=f5fb0030 task.ti=f59be000) Stack: f59bfe54 c10cc763 00000015 00000000 f80ef640 00000002 f59bfe6c f80e46a6 f61aa194 00000000 f46e32c0 f5e5c920 f59bfe78 f80e428a f5e5c920 f59bfe84 f80d8efb 00000003 f59bfea0 f80d9083 f6532000 f46e5c80 f46e5cb0 f46e5d48 Call Trace: [<c10cc763>] fsnotify_destroy_mark+0x13/0x120 [<f80e46a6>] au_hfsn_free+0x26/0x40 [aufs] [<f80e428a>] au_hn_free+0x1a/0x40 [aufs] [<f80d8efb>] au_hiput+0xb/0x20 [aufs] [<f80d9083>] au_iinfo_fin+0x173/0x220 [aufs] [<f80bf85b>] aufs_destroy_inode+0xb/0x20 [aufs] [<c10af97c>] destroy_inode+0x2c/0x50 [<c10afa73>] evict+0xd3/0x150 [<c10afbad>] iput+0xbd/0x1a0 [<c10adb1f>] d_kill+0x9f/0xf0 [<c10ae2c9>] dput+0xb9/0x160 [<c10a381e>] path_put+0xe/0x20 [<c109ea5e>] vfs_fstatat+0x6e/0x70 [<c109eb6b>] vfs_stat+0x1b/0x20 [<c109eb84>] sys_stat64+0x14/0x30 [<c1350fe5>] syscall_call+0x7/0xb [<c1350000>] ? __mutex_lock_interruptible_slowpath+0x90/0x140 Code: 00 89 d0 f0 66 0f b1 19 66 39 c2 0f 94 c0 0f b6 c0 5b 5d c3 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 90 55 ba 00 01 00 00 89 e5 <f0> 66 0f c1 10 89 d1 66 c1 e9 08 38 d1 74 0a 90 f3 90 0f b6 10 EIP: [<c1350c88>] _raw_spin_lock+0x8/0x30 SS:ESP 0068:f59bfe3c CR2: 0000000000000014 Rebooting in 30 seconds.. Any ideas? Best regards Elmar
smime.p7s
Description: S/MIME cryptographic signature
------------------------------------------------------------------------------ Virtualization & Cloud Management Using Capacity Planning Cloud computing makes use of virtualization - but cloud computing also focuses on allowing computing to be delivered as a service. http://www.accelacomm.com/jaw/sfnl/114/51521223/