Re: x86-64 bad pmds in 2.6.11.6

2005-04-01 Thread Sergey S. Kostyliov
Devices [AMD] K8 [Athlon64/Opteron] 
HyperTransport Technology Configuration
:00:18.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Address Map
:00:18.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
DRAM Controller
:00:18.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Miscellaneous Control
:00:19.0 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
HyperTransport Technology Configuration
:00:19.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Address Map
:00:19.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
DRAM Controller
:00:19.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Miscellaneous Control
:01:01.0 PCI bridge: IBM PCI-X to PCI-X Bridge (rev 02)
:02:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID (rev 02)
:03:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet 
Controller
:03:04.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet 
Controller
:04:00.0 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b)
:04:00.1 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b)
:04:06.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27)
[EMAIL PROTECTED] rathamahata $

e1000 is handled by by intel's e1000 driver


usb is not compiled in 
[EMAIL PROTECTED] linux-2.6.11 $ grep CONFIG_USB .config
# CONFIG_USB is not set
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB_ARCH_HAS_OHCI=y
# CONFIG_USB_GADGET is not set
[EMAIL PROTECTED] linux-2.6.11 $

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: x86-64 bad pmds in 2.6.11.6

2005-04-01 Thread Sergey S. Kostyliov
 Devices [AMD] K8 [Athlon64/Opteron] 
HyperTransport Technology Configuration
:00:19.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Address Map
:00:19.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
DRAM Controller
:00:19.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] 
Miscellaneous Control
:01:01.0 PCI bridge: IBM PCI-X to PCI-X Bridge (rev 02)
:02:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID (rev 02)
:03:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet 
Controller
:03:04.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet 
Controller
:04:00.0 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b)
:04:00.1 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b)
:04:06.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27)
[EMAIL PROTECTED] rathamahata $

e1000 is handled by by intel's e1000 driver


usb is not compiled in 
[EMAIL PROTECTED] linux-2.6.11 $ grep CONFIG_USB .config
# CONFIG_USB is not set
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB_ARCH_HAS_OHCI=y
# CONFIG_USB_GADGET is not set
[EMAIL PROTECTED] linux-2.6.11 $

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: 2.6.10 devfs oops without devfs mounted at all

2005-02-10 Thread Sergey S. Kostyliov
On Thursday 10 February 2005 12:49, Sergey S. Kostyliov wrote:
> On Thursday 10 February 2005 03:36, Andrew Morton wrote:
> > "Sergey S. Kostyliov" <[EMAIL PROTECTED]> wrote:
> > >
> > > Here is an oops I've just get on my smp system:
> > > 
> > > Unable to handle kernel NULL pointer dereference at virtual address 
> > > 001c
> > >  printing eip:
> > > c01afe5b
> > > *pde = 
> > > Oops:  [#1]
> > > PREEMPT SMP
> > > Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter
> > > CPU:2
> > > EIP:0060:[]Not tainted VLI
> > > EFLAGS: 00010286   (2.6.10)
> > > EIP is at devfsd_close+0x1b/0xc8
> > > eax: f7440a00   ebx:    ecx: c01afe40   edx: ed395280
> > > esi:    edi: f7f17800   ebp: f74f96c8   esp: cdc70f84
> > > ds: 007b   es: 007b   ss: 0068
> > > Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520)
> > > Stack: ed395280 ed395280  f7f17800 c0150c76 ee9e87f8 ed395280 
> > > 
> > >f1985c80 cdc7 c014f50f 0003 0003 080caa60  
> > > c01024df
> > >0003 080cc700 bfffe4f8 080caa60  bfffe4fc 0006 
> > > 007b
> > > Call Trace:
> > >  [] __fput+0x106/0x120
> > >  [] filp_close+0x4f/0x80
> > >  [] syscall_call+0x7/0xb
> > 
> > Can you work out what file is being closed?  One way of doing that would be
> > to work out how megamgr.bin is being invoked and to then run it by hand:
> > 
> >  strace -f -o log megamgr.bin 
> > 
> > and we can then use the strace output to work out the pathname of the
> > offending file.
> 
> [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log
> 5255  open("/usr/share/terminfo/l/linux", O_RDONLY) = 3
> 5255  open("/dev/megadev0", O_RDONLY)   = 3
> [EMAIL PROTECTED] rathamahata $
Sorry, I forgot this part:
[EMAIL PROTECTED] rathamahata $ grep 'close(' mg.log
5255  close(3)  = 0
[EMAIL PROTECTED] rathamahata $

> 
> I guess it's /dev/megadev0 (manually created character device)
> 
> [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0
> crw-r--r--  1 root root 253, 0 Feb  8 16:26 /dev/megadev0
> [EMAIL PROTECTED] rathamahata 
> 

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: 2.6.10 devfs oops without devfs mounted at all

2005-02-10 Thread Sergey S. Kostyliov
On Thursday 10 February 2005 03:36, Andrew Morton wrote:
> "Sergey S. Kostyliov" <[EMAIL PROTECTED]> wrote:
> >
> > Here is an oops I've just get on my smp system:
> > 
> > Unable to handle kernel NULL pointer dereference at virtual address 001c
> >  printing eip:
> > c01afe5b
> > *pde = 
> > Oops:  [#1]
> > PREEMPT SMP
> > Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter
> > CPU:2
> > EIP:0060:[]Not tainted VLI
> > EFLAGS: 00010286   (2.6.10)
> > EIP is at devfsd_close+0x1b/0xc8
> > eax: f7440a00   ebx:    ecx: c01afe40   edx: ed395280
> > esi:    edi: f7f17800   ebp: f74f96c8   esp: cdc70f84
> > ds: 007b   es: 007b   ss: 0068
> > Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520)
> > Stack: ed395280 ed395280  f7f17800 c0150c76 ee9e87f8 ed395280 
> > 
> >f1985c80 cdc7 c014f50f 0003 0003 080caa60  
> > c01024df
> >0003 080cc700 bfffe4f8 080caa60  bfffe4fc 0006 
> > 007b
> > Call Trace:
> >  [] __fput+0x106/0x120
> >  [] filp_close+0x4f/0x80
> >  [] syscall_call+0x7/0xb
> 
> Can you work out what file is being closed?  One way of doing that would be
> to work out how megamgr.bin is being invoked and to then run it by hand:
> 
>  strace -f -o log megamgr.bin 
> 
> and we can then use the strace output to work out the pathname of the
> offending file.

[EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log
5255  open("/usr/share/terminfo/l/linux", O_RDONLY) = 3
5255  open("/dev/megadev0", O_RDONLY)   = 3
[EMAIL PROTECTED] rathamahata $ 

I guess it's /dev/megadev0 (manually created character device)

[EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0
crw-r--r--  1 root root 253, 0 Feb  8 16:26 /dev/megadev0
[EMAIL PROTECTED] rathamahata 

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: 2.6.10 devfs oops without devfs mounted at all

2005-02-10 Thread Sergey S. Kostyliov
On Thursday 10 February 2005 03:36, Andrew Morton wrote:
 Sergey S. Kostyliov [EMAIL PROTECTED] wrote:
 
  Here is an oops I've just get on my smp system:
  
  Unable to handle kernel NULL pointer dereference at virtual address 001c
   printing eip:
  c01afe5b
  *pde = 
  Oops:  [#1]
  PREEMPT SMP
  Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter
  CPU:2
  EIP:0060:[c01afe5b]Not tainted VLI
  EFLAGS: 00010286   (2.6.10)
  EIP is at devfsd_close+0x1b/0xc8
  eax: f7440a00   ebx:    ecx: c01afe40   edx: ed395280
  esi:    edi: f7f17800   ebp: f74f96c8   esp: cdc70f84
  ds: 007b   es: 007b   ss: 0068
  Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520)
  Stack: ed395280 ed395280  f7f17800 c0150c76 ee9e87f8 ed395280 
  
 f1985c80 cdc7 c014f50f 0003 0003 080caa60  
  c01024df
 0003 080cc700 bfffe4f8 080caa60  bfffe4fc 0006 
  007b
  Call Trace:
   [c0150c76] __fput+0x106/0x120
   [c014f50f] filp_close+0x4f/0x80
   [c01024df] syscall_call+0x7/0xb
 
 Can you work out what file is being closed?  One way of doing that would be
 to work out how megamgr.bin is being invoked and to then run it by hand:
 
  strace -f -o log megamgr.bin args
 
 and we can then use the strace output to work out the pathname of the
 offending file.

[EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log
5255  open(/usr/share/terminfo/l/linux, O_RDONLY) = 3
5255  open(/dev/megadev0, O_RDONLY)   = 3
[EMAIL PROTECTED] rathamahata $ 

I guess it's /dev/megadev0 (manually created character device)

[EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0
crw-r--r--  1 root root 253, 0 Feb  8 16:26 /dev/megadev0
[EMAIL PROTECTED] rathamahata 

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: 2.6.10 devfs oops without devfs mounted at all

2005-02-10 Thread Sergey S. Kostyliov
On Thursday 10 February 2005 12:49, Sergey S. Kostyliov wrote:
 On Thursday 10 February 2005 03:36, Andrew Morton wrote:
  Sergey S. Kostyliov [EMAIL PROTECTED] wrote:
  
   Here is an oops I've just get on my smp system:
   
   Unable to handle kernel NULL pointer dereference at virtual address 
   001c
printing eip:
   c01afe5b
   *pde = 
   Oops:  [#1]
   PREEMPT SMP
   Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter
   CPU:2
   EIP:0060:[c01afe5b]Not tainted VLI
   EFLAGS: 00010286   (2.6.10)
   EIP is at devfsd_close+0x1b/0xc8
   eax: f7440a00   ebx:    ecx: c01afe40   edx: ed395280
   esi:    edi: f7f17800   ebp: f74f96c8   esp: cdc70f84
   ds: 007b   es: 007b   ss: 0068
   Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520)
   Stack: ed395280 ed395280  f7f17800 c0150c76 ee9e87f8 ed395280 
   
  f1985c80 cdc7 c014f50f 0003 0003 080caa60  
   c01024df
  0003 080cc700 bfffe4f8 080caa60  bfffe4fc 0006 
   007b
   Call Trace:
[c0150c76] __fput+0x106/0x120
[c014f50f] filp_close+0x4f/0x80
[c01024df] syscall_call+0x7/0xb
  
  Can you work out what file is being closed?  One way of doing that would be
  to work out how megamgr.bin is being invoked and to then run it by hand:
  
   strace -f -o log megamgr.bin args
  
  and we can then use the strace output to work out the pathname of the
  offending file.
 
 [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log
 5255  open(/usr/share/terminfo/l/linux, O_RDONLY) = 3
 5255  open(/dev/megadev0, O_RDONLY)   = 3
 [EMAIL PROTECTED] rathamahata $
Sorry, I forgot this part:
[EMAIL PROTECTED] rathamahata $ grep 'close(' mg.log
5255  close(3)  = 0
[EMAIL PROTECTED] rathamahata $

 
 I guess it's /dev/megadev0 (manually created character device)
 
 [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0
 crw-r--r--  1 root root 253, 0 Feb  8 16:26 /dev/megadev0
 [EMAIL PROTECTED] rathamahata 
 

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.10 devfs oops without devfs mounted at all

2005-02-08 Thread Sergey S. Kostyliov
dev/sda7 /var/lib/mysql-innodb reiserfs rw,noatime,nodiratime 0 0
/dev/sda8 /var/log reiserfs rw,noatime,nodiratime 0 0
/dev/sda9 /var/log/innodb reiserfs rw,noatime,nodiratime 0 0

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.10 devfs oops without devfs mounted at all

2005-02-08 Thread Sergey S. Kostyliov
.byte 0xc4

1 error issued.  Results may not be reliable.
[EMAIL PROTECTED] rathamahata $

What is interesting is that devfs doesn't seem to be mounted at all ...

[EMAIL PROTECTED] rathamahata $ cat /proc/mounts
rootfs / rootfs rw 0 0
/dev/root / reiserfs rw,noatime,nodiratime 0 0
none /proc proc rw,nodiratime 0 0
none /sys sysfs rw 0 0
none /dev ramfs rw 0 0
none /dev/pts devpts rw 0 0
/dev/sda5 /var/www reiserfs rw,noatime,nodiratime 0 0
/dev/sda6 /var/lib reiserfs rw,noatime,nodiratime 0 0
/dev/sda7 /var/lib/mysql-innodb reiserfs rw,noatime,nodiratime 0 0
/dev/sda8 /var/log reiserfs rw,noatime,nodiratime 0 0
/dev/sda9 /var/log/innodb reiserfs rw,noatime,nodiratime 0 0

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362

2005-01-27 Thread Sergey S. Kostyliov
On Thursday 27 January 2005 13:17, Vladimir Saveliev wrote:
> Hello
> 
> On Thu, 2005-01-27 at 10:24, Sergey S. Kostyliov wrote:
> > Hello all,
> > 
> > Here is a BUG() I've just hited on quota enabled reiserfs disk.
> > 
> > [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2
> > /dev/sdb2 on /var/www type reiserfs 
> > (rw,noatime,nodiratime,data=writeback,grpquota,usrquota)
> > [EMAIL PROTECTED] rathamahata $
> > 
> > REISERFS: panic (device sdb2): journal_begin called without kernel lock held
> 
> Would you check whether this patch helps, please?
That fixes it. Thank you!

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362

2005-01-27 Thread Sergey S. Kostyliov
On Thursday 27 January 2005 13:17, Vladimir Saveliev wrote:
 Hello
 
 On Thu, 2005-01-27 at 10:24, Sergey S. Kostyliov wrote:
  Hello all,
  
  Here is a BUG() I've just hited on quota enabled reiserfs disk.
  
  [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2
  /dev/sdb2 on /var/www type reiserfs 
  (rw,noatime,nodiratime,data=writeback,grpquota,usrquota)
  [EMAIL PROTECTED] rathamahata $
  
  REISERFS: panic (device sdb2): journal_begin called without kernel lock held
 
 Would you check whether this patch helps, please?
That fixes it. Thank you!

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


[2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362

2005-01-26 Thread Sergey S. Kostyliov
Hello all,

Here is a BUG() I've just hited on quota enabled reiserfs disk.

[EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2
/dev/sdb2 on /var/www type reiserfs 
(rw,noatime,nodiratime,data=writeback,grpquota,usrquota)
[EMAIL PROTECTED] rathamahata $

REISERFS: panic (device sdb2): journal_begin called without kernel lock held
[ cut here ]
kernel BUG at fs/reiserfs/prints.c:362!
invalid operand:  [#1]
PREEMPT SMP
Modules linked in:
CPU:0
EIP:0060:[]Not tainted VLI
EFLAGS: 00010296   (2.6.11-rc2)
EIP is at reiserfs_panic+0x4b/0x80
eax: 0050   ebx: c02b75b2   ecx: f7fe4270   edx: f1034e38
esi: f7543600   edi: f7543770   ebp: 00f2   esp: f1034e34
ds: 007b   es: 007b   ss: 0068
Process qmail-local (pid: 10803, threadinfo=f1034000 task=cc440a60)
Stack: c02bbb00 f7543770 c03b89c0 f7543600 f1034ecc f89af000 c01a8a0e f7543600
   c02bcf20 c02b7db8 c01ac186 f74b66c0 00f2 f1034ecc c0167403 f74b6900
   c02f2740 fff4 f74b6960 00295e98 c01679dc 00295e98 f74b6090 f74b66c0
Call Trace:
 [] reiserfs_check_lock_depth+0x2e/0x30
 [] do_journal_begin_r+0x26/0x2d0
 [] d_alloc+0x133/0x180
 [] __d_lookup+0x11c/0x130
 [] journal_begin+0x61/0xf0
 [] reiserfs_dquot_initialize+0x25/0x60
 [] link_path_walk+0x48d/0xd20
 [] permission+0x76/0xa0
 [] vfs_create+0xc8/0x110
 [] open_namei+0x57f/0x5d0
 [] filp_open+0x2d/0x60
 [] get_unused_fd+0x94/0xc0
 [] getname+0x67/0xb0
 [] sys_open+0x3c/0x80
 [] sysenter_past_esp+0x52/0x75
Code: 8d be 70 01 00 00 e8 a5 fd ff ff c7 04 24 00 bb 2b c0 85 f6 89 d8 0f 45 
c7 ba c0 893b c0 89 54 24 08 89 44 24 04 e8 25 9d f7 ff <0f> 0b 6a 01 1a 7b 2b 
c0 c7 04 24 40 bb 2b c0 85 f6 be c0 89 3b
 <0>REISERFS: panic (device sdb2): journal_begin called without kernel lock held
[ cut here ]----

-- 
Sergey S. Kostyliov <[EMAIL PROTECTED]>
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


[2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362

2005-01-26 Thread Sergey S. Kostyliov
Hello all,

Here is a BUG() I've just hited on quota enabled reiserfs disk.

[EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2
/dev/sdb2 on /var/www type reiserfs 
(rw,noatime,nodiratime,data=writeback,grpquota,usrquota)
[EMAIL PROTECTED] rathamahata $

REISERFS: panic (device sdb2): journal_begin called without kernel lock held
[ cut here ]
kernel BUG at fs/reiserfs/prints.c:362!
invalid operand:  [#1]
PREEMPT SMP
Modules linked in:
CPU:0
EIP:0060:[c019e9fb]Not tainted VLI
EFLAGS: 00010296   (2.6.11-rc2)
EIP is at reiserfs_panic+0x4b/0x80
eax: 0050   ebx: c02b75b2   ecx: f7fe4270   edx: f1034e38
esi: f7543600   edi: f7543770   ebp: 00f2   esp: f1034e34
ds: 007b   es: 007b   ss: 0068
Process qmail-local (pid: 10803, threadinfo=f1034000 task=cc440a60)
Stack: c02bbb00 f7543770 c03b89c0 f7543600 f1034ecc f89af000 c01a8a0e f7543600
   c02bcf20 c02b7db8 c01ac186 f74b66c0 00f2 f1034ecc c0167403 f74b6900
   c02f2740 fff4 f74b6960 00295e98 c01679dc 00295e98 f74b6090 f74b66c0
Call Trace:
 [c01a8a0e] reiserfs_check_lock_depth+0x2e/0x30
 [c01ac186] do_journal_begin_r+0x26/0x2d0
 [c0167403] d_alloc+0x133/0x180
 [c01679dc] __d_lookup+0x11c/0x130
 [c01ac641] journal_begin+0x61/0xf0
 [c019d445] reiserfs_dquot_initialize+0x25/0x60
 [c015db2d] link_path_walk+0x48d/0xd20
 [c015d1c6] permission+0x76/0xa0
 [c015ea98] vfs_create+0xc8/0x110
 [c015f2cf] open_namei+0x57f/0x5d0
 [c014fcfd] filp_open+0x2d/0x60
 [c0150014] get_unused_fd+0x94/0xc0
 [c015cff7] getname+0x67/0xb0
 [c015012c] sys_open+0x3c/0x80
 [c01026b1] sysenter_past_esp+0x52/0x75
Code: 8d be 70 01 00 00 e8 a5 fd ff ff c7 04 24 00 bb 2b c0 85 f6 89 d8 0f 45 
c7 ba c0 893b c0 89 54 24 08 89 44 24 04 e8 25 9d f7 ff 0f 0b 6a 01 1a 7b 2b 
c0 c7 04 24 40 bb 2b c0 85 f6 be c0 89 3b
 0REISERFS: panic (device sdb2): journal_begin called without kernel lock held
[ cut here ]

-- 
Sergey S. Kostyliov [EMAIL PROTECTED]
Jabber ID: [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/