On Fri, Sep 09, 2005 at 09:02:38PM -0700, Christian Grothoff wrote:
> Package: kernel-image-2.6.8-11-amd64-k8
> Version: 2.6.8-14
> Severity: minor
> 
> After reconfiguration of permissions on a mounted SMB volume, the Kernel
> decided to segfault (system continued to run, blocking processes that 
> were accessing the affected volume).

Is it possible to test this with linux-image-2.6.12 (i notice there
are no amd64 images, not sure why) or kernel-image-2.6.11, both
in unstbale, to see if the situation has imporoved?

> Here is what /var/log/messages had to say:
> 
> Sep  9 20:45:44 localhost kernel: Pid: 4851, comm: df Not tainted
> 2.6.8-11-amd64-k8
> Sep  9 20:45:44 localhost kernel: RIP: 0010:[<ffffffff8017e533>]
> <ffffffff8017e533>{invalidate_list+67}
> Sep  9 20:45:44 localhost kernel: RSP: 0000:00000100243ddc78  EFLAGS:
> 00010282
> Sep  9 20:45:44 localhost kernel: RAX: 000001000ae5acf0 RBX:
> 171ff4f441aae856 RCX: 000001003917f930
> Sep  9 20:45:44 localhost kernel: RDX: 00000100243ddcb8 RSI:
> 000001003f42c800 RDI: ffffffff802e2770
> Sep  9 20:45:44 localhost kernel: RBP: 000001002391acf8 R08:
> 0000010007043e5c R09: 0000010007043e00
> Sep  9 20:45:44 localhost kernel: R10: 0000010002117930 R11:
> ffffffff801adeb0 R12: 171ff4f441aae856
> Sep  9 20:45:44 localhost kernel: R13: ffffffff802e2770 R14:
> 000001003f42c800 R15: 00000100243ddcb8
> Sep  9 20:45:44 localhost kernel: FS:  0000000058636000(0000)
> GS:ffffffff803b1540(0000) knlGS:0000000056a57840
> Sep  9 20:45:44 localhost kernel: CS:  0010 DS: 002b ES: 002b CR0:
> 0000000080050033
> Sep  9 20:45:44 localhost kernel: CR2: 00000000081c9350 CR3:
> 0000000000101000 CR4: 00000000000006e0
> Sep  9 20:45:44 localhost kernel: Process df (pid: 4851, threadinfo
> 00000100243dc000, task 000001002c6e8ac0)
> Sep  9 20:45:44 localhost kernel: Stack: 0000000000000000
> 0000010007043e00 00000100023ec8b0 00000100023ec800
> Sep  9 20:45:44 localhost kernel:        000001003f42c800
> ffffffff802e2740 00000000000008d5 ffffffff8017f0ec
> Sep  9 20:45:44 localhost kernel:        00000100243ddcb8
> 00000100243ddcb8
> Sep  9 20:45:44 localhost kernel: Call
> Trace:<ffffffff8017f0ec>{invalidate_inodes+76}
> <ffffffffa018dd35>{:smbfs:smbiod_retry+53}
> Sep  9 20:45:44 localhost kernel:
> <ffffffffa018dd02>{:smbfs:smbiod_retry+2}
> <ffffffffa018e645>{:smbfs:smb_add_request+725}
> Sep  9 20:45:44 localhost kernel:
> <ffffffff8014f6bf>{__get_free_pages+31}
> <ffffffff80152cdb>{cache_alloc_refill+619}
> Sep  9 20:45:44 localhost kernel:
> <ffffffffa0186bef>{:smbfs:smb_request_ok+63}
> <ffffffffa018a265>{:smbfs:smb_proc_dskattr+85}
> Sep  9 20:45:44 localhost kernel:
> <ffffffffa018cda9>{:smbfs:smb_statfs+9}
> <ffffffff8016528d>{vfs_statfs+93}
> Sep  9 20:45:44 localhost kernel:
> <ffffffff8018b0fa>{compat_statfs64+106}
> <ffffffff80288f1e>{thread_return+41}
> Sep  9 20:45:44 localhost kernel:
> <ffffffff801673d3>{sys_write+83} <ffffffff80110ab1>{error_exit+0}
> Sep  9 20:45:44 localhost kernel:
> <ffffffff80120a81>{ia32_sysret+0}
> Sep  9 20:45:44 localhost kernel:
> Sep  9 20:45:44 localhost kernel: Code: 4d 8b 24 24 4c 39 eb 0f 84 87 00
> 00 00 48 8d 6b f0 4c 39 b5
> 
> 
> -- System Information:
> Debian Release: 3.1
>   APT prefers testing
>   APT policy: (650, 'testing'), (600, 'unstable')
> Architecture: i386 (x86_64)
> Kernel: Linux 2.6.8-11-amd64-k8
> Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
> 
> Versions of packages kernel-image-2.6.8-11-amd64-k8 depends on:
> ii  coreutils [fileutils]       5.2.1-2      The GNU core utilities
> ii  e2fsprogs                   1.37-2sarge1 ext2 file system utilities and 
> lib
> ii  initrd-tools                0.1.81.1     tools to create initrd image for 
> p
> ii  module-init-tools           3.2-pre1-2   tools for managing Linux kernel 
> mo
> 
> -- no debconf information
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to