[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#420398: confirm the presence



Hi -- I just want to follow up that I encountered the same (or very similar may
be ;-)) problem on 2.6.18-1-686 pretty much under the same conditions
(sshfs link wasn't heavily used -- box was in the middle of upgrade to up to date lenny):


kernel BUG at fs/fuse/control.c:82!
invalid opcode: 0000 [#1]
SMP 
Modules linked in: nls_cp437 vfat fat sd_mod usb_storage scsi_mod nls_koi8_r iso      fs binfmt_misc rfcomm l2cap bluetooth nfs nfsd exportfs lockd nfs_acl sunrpc ppd      ev lp ip6table_filter ip6_tables xt_pkttype iptable_raw xt_CLASSIFY xt_CONNMARK       xt_MARK xt_length xt_connmark xt_physdev bridge xt_policy xt_conntrack iptable_m      angle ipt_ULOG ipt_TTL ipt_ttl ipt_TOS ipt_tos ipt_TCPMSS ipt_SAME ipt_REDIRECT       ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_iprange ipt_hashlimit ipt_ECN ipt_ecn i      pt_DSCP ipt_dscp ipt_CLUSTERIP ipt_ah ipt_addrtype ip_nat_irc ip_nat_tftp ip_nat      _ftp ip_conntrack_irc ip_conntrack_tftp ip_conntrack_ftp ipv6 ipt_REJECT ipt_own      er ipt_LOG xt_limit xt_state xt_tcpudp xt_multiport iptable_nat ip_nat ip_conntr      ack nfnetlink iptable_filter ip_tables x_tables deflate zlib_deflate twofish ser      pent aes blowfish des sha256 sha1 crypto_null af_key efs fuse dm_snapshot dm_mir      ror dm_mod nvidia autofs4 tsdev snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm      _oss snd_pcm snd_mixer_oss snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi sn      d_seq_midi_event snd_seq snd_timer snd_seq_device snd soundcore intel_rng psmous      e i2c_i801 parport_pc intel_agp snd_page_alloc shpchp pci_hotplug serio_raw i2c_      core eth1394 parport pcspkr agpgart floppy rtc evdev ext3 jbd mbcache ide_generi      c ide_cd cdrom ide_disk usbhid piix ohci1394 ieee1394 e1000 ehci_hcd generic ide      _core uhci_hcd usbcore thermal processor fan
CPU:    0
EIP:    0060:[<f8d13cad>]    Tainted: P      VLI
EFLAGS: 00210202   (2.6.18-1-686 #1) 
EIP is at fuse_ctl_add_dentry+0x16/0xcb [fuse]
eax: ee3859d8   ebx: ee3859d8   ecx: c954bd80   edx: ca147880
esi: ca147880   edi: ca147880   ebp: c02ce9c0   esp: c954bd44
ds: 007b   es: 007b   ss: 0068
Process mount (pid: 7294, ti=c954a000 task=ccad1000 task.ti=c954a000)
Stack: ffffffff 00000000 ee3859d8 c954bd80 ca147880 00000000 f8d13db7 00004140 
       00000002 c02ce9c0 c0284e60 c954bd80 f8d1444b 00000002 00000000 c0170032 
       c954bdb0 00000000 c01b760c f7db1601 462e2390 38f89339 f7db1600 f7db1600 
Call Trace:
 [<f8d13db7>] fuse_ctl_add_conn+0x55/0xb9 [fuse]
 [<c0170032>] notify_change+0xcb/0x2c1
 [<c01b760c>] idr_get_new+0xa/0x26
 [<f8d13e76>] fuse_ctl_fill_super+0x5b/0xcb [fuse]
 [<c015fc74>] get_sb_single+0x51/0x97
 [<f8d13e1b>] fuse_ctl_fill_super+0x0/0xcb [fuse]
 [<c015fb6b>] vfs_kern_mount+0x7d/0xf2
 [<f8d13e1b>] fuse_ctl_fill_super+0x0/0xcb [fuse]
 [<c015fc12>] do_kern_mount+0x25/0x36
 [<c0172048>] do_mount+0x5d8/0x648
 [<c01712e6>] mntput_no_expire+0x11/0x6a
 [<c016756c>] link_path_walk+0xb3/0xbd
 [<c014c2de>] __handle_mm_fault+0x408/0x740
 [<c014c0c0>] __handle_mm_fault+0x1ea/0x740
 [<c01678cb>] do_path_lookup+0x20a/0x225
 [<c0145504>] get_page_from_freelist+0x9b/0x36e
 [<c0170f4e>] copy_mount_options+0x26/0x109
 [<c0172125>] sys_mount+0x6d/0xaa
 [<c0102c7b>] syscall_call+0x7/0xb
Code: fa 50 89 e8 53 e8 06 1e 46 c7 83 c4 14 83 c4 20 5b 5e 5f 5d c3 55 57 56 89       d6 53 83 ec 08 83 ba ac 00 00 00 02 8b 6c 24 24 7e 08 <0f> 0b 52 00 39 44 d1 f8       89 ca e8 08 9f 45 c7 85 c0 89 c7 0f 84 
EIP: [<f8d13cad>] fuse_ctl_add_dentry+0x16/0xcb [fuse] SS:ESP 0068:c954bd44


-- 
Yaroslav Halchenko
Research Assistant, Psychology Department, Rutgers-Newark
Student  Ph.D. @ CS Dept. NJIT
Office: (973) 353-5440x263 | FWD: 82823 | Fax: (973) 353-1171
        101 Warren Str, Smith Hall, Rm 4-105, Newark NJ 07102
WWW:     http://www.linkedin.com/in/yarik        



Reply to: