Re: x86-64 bad pmds in 2.6.11.6
Devices [AMD] K8 [Athlon64/Opteron] HyperTransport Technology Configuration :00:18.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Address Map :00:18.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] DRAM Controller :00:18.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Miscellaneous Control :00:19.0 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] HyperTransport Technology Configuration :00:19.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Address Map :00:19.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] DRAM Controller :00:19.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Miscellaneous Control :01:01.0 PCI bridge: IBM PCI-X to PCI-X Bridge (rev 02) :02:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID (rev 02) :03:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller :03:04.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller :04:00.0 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b) :04:00.1 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b) :04:06.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27) [EMAIL PROTECTED] rathamahata $ e1000 is handled by by intel's e1000 driver usb is not compiled in [EMAIL PROTECTED] linux-2.6.11 $ grep CONFIG_USB .config # CONFIG_USB is not set CONFIG_USB_ARCH_HAS_HCD=y CONFIG_USB_ARCH_HAS_OHCI=y # CONFIG_USB_GADGET is not set [EMAIL PROTECTED] linux-2.6.11 $ -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: x86-64 bad pmds in 2.6.11.6
Devices [AMD] K8 [Athlon64/Opteron] HyperTransport Technology Configuration :00:19.1 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Address Map :00:19.2 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] DRAM Controller :00:19.3 Host bridge: Advanced Micro Devices [AMD] K8 [Athlon64/Opteron] Miscellaneous Control :01:01.0 PCI bridge: IBM PCI-X to PCI-X Bridge (rev 02) :02:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID (rev 02) :03:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller :03:04.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller :04:00.0 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b) :04:00.1 USB Controller: Advanced Micro Devices [AMD] AMD-8111 USB (rev 0b) :04:06.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27) [EMAIL PROTECTED] rathamahata $ e1000 is handled by by intel's e1000 driver usb is not compiled in [EMAIL PROTECTED] linux-2.6.11 $ grep CONFIG_USB .config # CONFIG_USB is not set CONFIG_USB_ARCH_HAS_HCD=y CONFIG_USB_ARCH_HAS_OHCI=y # CONFIG_USB_GADGET is not set [EMAIL PROTECTED] linux-2.6.11 $ -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: 2.6.10 devfs oops without devfs mounted at all
On Thursday 10 February 2005 12:49, Sergey S. Kostyliov wrote: > On Thursday 10 February 2005 03:36, Andrew Morton wrote: > > "Sergey S. Kostyliov" <[EMAIL PROTECTED]> wrote: > > > > > > Here is an oops I've just get on my smp system: > > > > > > Unable to handle kernel NULL pointer dereference at virtual address > > > 001c > > > printing eip: > > > c01afe5b > > > *pde = > > > Oops: [#1] > > > PREEMPT SMP > > > Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter > > > CPU:2 > > > EIP:0060:[]Not tainted VLI > > > EFLAGS: 00010286 (2.6.10) > > > EIP is at devfsd_close+0x1b/0xc8 > > > eax: f7440a00 ebx: ecx: c01afe40 edx: ed395280 > > > esi: edi: f7f17800 ebp: f74f96c8 esp: cdc70f84 > > > ds: 007b es: 007b ss: 0068 > > > Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520) > > > Stack: ed395280 ed395280 f7f17800 c0150c76 ee9e87f8 ed395280 > > > > > >f1985c80 cdc7 c014f50f 0003 0003 080caa60 > > > c01024df > > >0003 080cc700 bfffe4f8 080caa60 bfffe4fc 0006 > > > 007b > > > Call Trace: > > > [] __fput+0x106/0x120 > > > [] filp_close+0x4f/0x80 > > > [] syscall_call+0x7/0xb > > > > Can you work out what file is being closed? One way of doing that would be > > to work out how megamgr.bin is being invoked and to then run it by hand: > > > > strace -f -o log megamgr.bin > > > > and we can then use the strace output to work out the pathname of the > > offending file. > > [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log > 5255 open("/usr/share/terminfo/l/linux", O_RDONLY) = 3 > 5255 open("/dev/megadev0", O_RDONLY) = 3 > [EMAIL PROTECTED] rathamahata $ Sorry, I forgot this part: [EMAIL PROTECTED] rathamahata $ grep 'close(' mg.log 5255 close(3) = 0 [EMAIL PROTECTED] rathamahata $ > > I guess it's /dev/megadev0 (manually created character device) > > [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0 > crw-r--r-- 1 root root 253, 0 Feb 8 16:26 /dev/megadev0 > [EMAIL PROTECTED] rathamahata > -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: 2.6.10 devfs oops without devfs mounted at all
On Thursday 10 February 2005 03:36, Andrew Morton wrote: > "Sergey S. Kostyliov" <[EMAIL PROTECTED]> wrote: > > > > Here is an oops I've just get on my smp system: > > > > Unable to handle kernel NULL pointer dereference at virtual address 001c > > printing eip: > > c01afe5b > > *pde = > > Oops: [#1] > > PREEMPT SMP > > Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter > > CPU:2 > > EIP:0060:[]Not tainted VLI > > EFLAGS: 00010286 (2.6.10) > > EIP is at devfsd_close+0x1b/0xc8 > > eax: f7440a00 ebx: ecx: c01afe40 edx: ed395280 > > esi: edi: f7f17800 ebp: f74f96c8 esp: cdc70f84 > > ds: 007b es: 007b ss: 0068 > > Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520) > > Stack: ed395280 ed395280 f7f17800 c0150c76 ee9e87f8 ed395280 > > > >f1985c80 cdc7 c014f50f 0003 0003 080caa60 > > c01024df > >0003 080cc700 bfffe4f8 080caa60 bfffe4fc 0006 > > 007b > > Call Trace: > > [] __fput+0x106/0x120 > > [] filp_close+0x4f/0x80 > > [] syscall_call+0x7/0xb > > Can you work out what file is being closed? One way of doing that would be > to work out how megamgr.bin is being invoked and to then run it by hand: > > strace -f -o log megamgr.bin > > and we can then use the strace output to work out the pathname of the > offending file. [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log 5255 open("/usr/share/terminfo/l/linux", O_RDONLY) = 3 5255 open("/dev/megadev0", O_RDONLY) = 3 [EMAIL PROTECTED] rathamahata $ I guess it's /dev/megadev0 (manually created character device) [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0 crw-r--r-- 1 root root 253, 0 Feb 8 16:26 /dev/megadev0 [EMAIL PROTECTED] rathamahata -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: 2.6.10 devfs oops without devfs mounted at all
On Thursday 10 February 2005 03:36, Andrew Morton wrote: Sergey S. Kostyliov [EMAIL PROTECTED] wrote: Here is an oops I've just get on my smp system: Unable to handle kernel NULL pointer dereference at virtual address 001c printing eip: c01afe5b *pde = Oops: [#1] PREEMPT SMP Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter CPU:2 EIP:0060:[c01afe5b]Not tainted VLI EFLAGS: 00010286 (2.6.10) EIP is at devfsd_close+0x1b/0xc8 eax: f7440a00 ebx: ecx: c01afe40 edx: ed395280 esi: edi: f7f17800 ebp: f74f96c8 esp: cdc70f84 ds: 007b es: 007b ss: 0068 Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520) Stack: ed395280 ed395280 f7f17800 c0150c76 ee9e87f8 ed395280 f1985c80 cdc7 c014f50f 0003 0003 080caa60 c01024df 0003 080cc700 bfffe4f8 080caa60 bfffe4fc 0006 007b Call Trace: [c0150c76] __fput+0x106/0x120 [c014f50f] filp_close+0x4f/0x80 [c01024df] syscall_call+0x7/0xb Can you work out what file is being closed? One way of doing that would be to work out how megamgr.bin is being invoked and to then run it by hand: strace -f -o log megamgr.bin args and we can then use the strace output to work out the pathname of the offending file. [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log 5255 open(/usr/share/terminfo/l/linux, O_RDONLY) = 3 5255 open(/dev/megadev0, O_RDONLY) = 3 [EMAIL PROTECTED] rathamahata $ I guess it's /dev/megadev0 (manually created character device) [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0 crw-r--r-- 1 root root 253, 0 Feb 8 16:26 /dev/megadev0 [EMAIL PROTECTED] rathamahata -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: 2.6.10 devfs oops without devfs mounted at all
On Thursday 10 February 2005 12:49, Sergey S. Kostyliov wrote: On Thursday 10 February 2005 03:36, Andrew Morton wrote: Sergey S. Kostyliov [EMAIL PROTECTED] wrote: Here is an oops I've just get on my smp system: Unable to handle kernel NULL pointer dereference at virtual address 001c printing eip: c01afe5b *pde = Oops: [#1] PREEMPT SMP Modules linked in: ipt_REJECT ipt_state ip_conntrack iptable_filter CPU:2 EIP:0060:[c01afe5b]Not tainted VLI EFLAGS: 00010286 (2.6.10) EIP is at devfsd_close+0x1b/0xc8 eax: f7440a00 ebx: ecx: c01afe40 edx: ed395280 esi: edi: f7f17800 ebp: f74f96c8 esp: cdc70f84 ds: 007b es: 007b ss: 0068 Process megamgr.bin (pid: 12844, threadinfo=cdc7 task=dd81e520) Stack: ed395280 ed395280 f7f17800 c0150c76 ee9e87f8 ed395280 f1985c80 cdc7 c014f50f 0003 0003 080caa60 c01024df 0003 080cc700 bfffe4f8 080caa60 bfffe4fc 0006 007b Call Trace: [c0150c76] __fput+0x106/0x120 [c014f50f] filp_close+0x4f/0x80 [c01024df] syscall_call+0x7/0xb Can you work out what file is being closed? One way of doing that would be to work out how megamgr.bin is being invoked and to then run it by hand: strace -f -o log megamgr.bin args and we can then use the strace output to work out the pathname of the offending file. [EMAIL PROTECTED] rathamahata $ grep 'open(' mg.log 5255 open(/usr/share/terminfo/l/linux, O_RDONLY) = 3 5255 open(/dev/megadev0, O_RDONLY) = 3 [EMAIL PROTECTED] rathamahata $ Sorry, I forgot this part: [EMAIL PROTECTED] rathamahata $ grep 'close(' mg.log 5255 close(3) = 0 [EMAIL PROTECTED] rathamahata $ I guess it's /dev/megadev0 (manually created character device) [EMAIL PROTECTED] rathamahata $ ls -la /dev/megadev0 crw-r--r-- 1 root root 253, 0 Feb 8 16:26 /dev/megadev0 [EMAIL PROTECTED] rathamahata -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
2.6.10 devfs oops without devfs mounted at all
dev/sda7 /var/lib/mysql-innodb reiserfs rw,noatime,nodiratime 0 0 /dev/sda8 /var/log reiserfs rw,noatime,nodiratime 0 0 /dev/sda9 /var/log/innodb reiserfs rw,noatime,nodiratime 0 0 -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
2.6.10 devfs oops without devfs mounted at all
.byte 0xc4 1 error issued. Results may not be reliable. [EMAIL PROTECTED] rathamahata $ What is interesting is that devfs doesn't seem to be mounted at all ... [EMAIL PROTECTED] rathamahata $ cat /proc/mounts rootfs / rootfs rw 0 0 /dev/root / reiserfs rw,noatime,nodiratime 0 0 none /proc proc rw,nodiratime 0 0 none /sys sysfs rw 0 0 none /dev ramfs rw 0 0 none /dev/pts devpts rw 0 0 /dev/sda5 /var/www reiserfs rw,noatime,nodiratime 0 0 /dev/sda6 /var/lib reiserfs rw,noatime,nodiratime 0 0 /dev/sda7 /var/lib/mysql-innodb reiserfs rw,noatime,nodiratime 0 0 /dev/sda8 /var/log reiserfs rw,noatime,nodiratime 0 0 /dev/sda9 /var/log/innodb reiserfs rw,noatime,nodiratime 0 0 -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362
On Thursday 27 January 2005 13:17, Vladimir Saveliev wrote: > Hello > > On Thu, 2005-01-27 at 10:24, Sergey S. Kostyliov wrote: > > Hello all, > > > > Here is a BUG() I've just hited on quota enabled reiserfs disk. > > > > [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2 > > /dev/sdb2 on /var/www type reiserfs > > (rw,noatime,nodiratime,data=writeback,grpquota,usrquota) > > [EMAIL PROTECTED] rathamahata $ > > > > REISERFS: panic (device sdb2): journal_begin called without kernel lock held > > Would you check whether this patch helps, please? That fixes it. Thank you! -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362
On Thursday 27 January 2005 13:17, Vladimir Saveliev wrote: Hello On Thu, 2005-01-27 at 10:24, Sergey S. Kostyliov wrote: Hello all, Here is a BUG() I've just hited on quota enabled reiserfs disk. [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2 /dev/sdb2 on /var/www type reiserfs (rw,noatime,nodiratime,data=writeback,grpquota,usrquota) [EMAIL PROTECTED] rathamahata $ REISERFS: panic (device sdb2): journal_begin called without kernel lock held Would you check whether this patch helps, please? That fixes it. Thank you! -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362
Hello all, Here is a BUG() I've just hited on quota enabled reiserfs disk. [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2 /dev/sdb2 on /var/www type reiserfs (rw,noatime,nodiratime,data=writeback,grpquota,usrquota) [EMAIL PROTECTED] rathamahata $ REISERFS: panic (device sdb2): journal_begin called without kernel lock held [ cut here ] kernel BUG at fs/reiserfs/prints.c:362! invalid operand: [#1] PREEMPT SMP Modules linked in: CPU:0 EIP:0060:[]Not tainted VLI EFLAGS: 00010296 (2.6.11-rc2) EIP is at reiserfs_panic+0x4b/0x80 eax: 0050 ebx: c02b75b2 ecx: f7fe4270 edx: f1034e38 esi: f7543600 edi: f7543770 ebp: 00f2 esp: f1034e34 ds: 007b es: 007b ss: 0068 Process qmail-local (pid: 10803, threadinfo=f1034000 task=cc440a60) Stack: c02bbb00 f7543770 c03b89c0 f7543600 f1034ecc f89af000 c01a8a0e f7543600 c02bcf20 c02b7db8 c01ac186 f74b66c0 00f2 f1034ecc c0167403 f74b6900 c02f2740 fff4 f74b6960 00295e98 c01679dc 00295e98 f74b6090 f74b66c0 Call Trace: [] reiserfs_check_lock_depth+0x2e/0x30 [] do_journal_begin_r+0x26/0x2d0 [] d_alloc+0x133/0x180 [] __d_lookup+0x11c/0x130 [] journal_begin+0x61/0xf0 [] reiserfs_dquot_initialize+0x25/0x60 [] link_path_walk+0x48d/0xd20 [] permission+0x76/0xa0 [] vfs_create+0xc8/0x110 [] open_namei+0x57f/0x5d0 [] filp_open+0x2d/0x60 [] get_unused_fd+0x94/0xc0 [] getname+0x67/0xb0 [] sys_open+0x3c/0x80 [] sysenter_past_esp+0x52/0x75 Code: 8d be 70 01 00 00 e8 a5 fd ff ff c7 04 24 00 bb 2b c0 85 f6 89 d8 0f 45 c7 ba c0 893b c0 89 54 24 08 89 44 24 04 e8 25 9d f7 ff <0f> 0b 6a 01 1a 7b 2b c0 c7 04 24 40 bb 2b c0 85 f6 be c0 89 3b <0>REISERFS: panic (device sdb2): journal_begin called without kernel lock held [ cut here ]---- -- Sergey S. Kostyliov <[EMAIL PROTECTED]> Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[2.6.11-rc2] kernel BUG at fs/reiserfs/prints.c:362
Hello all, Here is a BUG() I've just hited on quota enabled reiserfs disk. [EMAIL PROTECTED] rathamahata $ mount | grep /dev/sdb2 /dev/sdb2 on /var/www type reiserfs (rw,noatime,nodiratime,data=writeback,grpquota,usrquota) [EMAIL PROTECTED] rathamahata $ REISERFS: panic (device sdb2): journal_begin called without kernel lock held [ cut here ] kernel BUG at fs/reiserfs/prints.c:362! invalid operand: [#1] PREEMPT SMP Modules linked in: CPU:0 EIP:0060:[c019e9fb]Not tainted VLI EFLAGS: 00010296 (2.6.11-rc2) EIP is at reiserfs_panic+0x4b/0x80 eax: 0050 ebx: c02b75b2 ecx: f7fe4270 edx: f1034e38 esi: f7543600 edi: f7543770 ebp: 00f2 esp: f1034e34 ds: 007b es: 007b ss: 0068 Process qmail-local (pid: 10803, threadinfo=f1034000 task=cc440a60) Stack: c02bbb00 f7543770 c03b89c0 f7543600 f1034ecc f89af000 c01a8a0e f7543600 c02bcf20 c02b7db8 c01ac186 f74b66c0 00f2 f1034ecc c0167403 f74b6900 c02f2740 fff4 f74b6960 00295e98 c01679dc 00295e98 f74b6090 f74b66c0 Call Trace: [c01a8a0e] reiserfs_check_lock_depth+0x2e/0x30 [c01ac186] do_journal_begin_r+0x26/0x2d0 [c0167403] d_alloc+0x133/0x180 [c01679dc] __d_lookup+0x11c/0x130 [c01ac641] journal_begin+0x61/0xf0 [c019d445] reiserfs_dquot_initialize+0x25/0x60 [c015db2d] link_path_walk+0x48d/0xd20 [c015d1c6] permission+0x76/0xa0 [c015ea98] vfs_create+0xc8/0x110 [c015f2cf] open_namei+0x57f/0x5d0 [c014fcfd] filp_open+0x2d/0x60 [c0150014] get_unused_fd+0x94/0xc0 [c015cff7] getname+0x67/0xb0 [c015012c] sys_open+0x3c/0x80 [c01026b1] sysenter_past_esp+0x52/0x75 Code: 8d be 70 01 00 00 e8 a5 fd ff ff c7 04 24 00 bb 2b c0 85 f6 89 d8 0f 45 c7 ba c0 893b c0 89 54 24 08 89 44 24 04 e8 25 9d f7 ff 0f 0b 6a 01 1a 7b 2b c0 c7 04 24 40 bb 2b c0 85 f6 be c0 89 3b 0REISERFS: panic (device sdb2): journal_begin called without kernel lock held [ cut here ] -- Sergey S. Kostyliov [EMAIL PROTECTED] Jabber ID: [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/