[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#460597: marked as done (linux-source-2.6.22: system segfaulted with message: kernel BUG at fs/inode.c:173!)



Your message dated Mon, 14 Jan 2008 00:43:41 +0100
with message-id <20080113234341.GA29880@wavehammer.waldi.eu.org>
and subject line Bug#460597: linux-source-2.6.22: system segfaulted with message: kernel BUG at fs/inode.c:173!
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: linux-source-2.6.22
Version: 2.6.22-6
Severity: important

The system hangs perhaps once every two weeks, with nothing in the log. 
This time I had a DVD-RAM with UDF filesystem mounted on /mnt. 
On the command # umount /mnt 
the system suffered a segmentation fault, with kernel.log as below. 
The crash is not reproducible.


Jan 13 21:04:02 ced2 kernel: kernel BUG at fs/inode.c:173!
Jan 13 21:04:02 ced2 kernel: invalid opcode: 0000 [1] SMP 
Jan 13 21:04:02 ced2 kernel: CPU 2 
Jan 13 21:04:02 ced2 kernel: Modules linked in: usblp iptable_filter ip_tables x_tables ppdev lp button ac battery ipv6 dm_snapshot dm_mirror sbp2 joydev usbhid hid 
cx88_alsa cx22702 cx88_dvb cx88_vp3054_i2c dvb_pll video_buf_dvb dvb_core tuner snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi 
snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device ohci1394 cx8800 snd cx8802 cx88xx ir_common ieee1394 i2c_nforce2 i2c_algo_bit compat_ioctl32 tveeprom 
videodev v4l2_common v4l1_compat video_buf btcx_risc i2c_core soundcore snd_page_alloc ohci_hcd forcedeth ehci_hcd tsdev evdev
Jan 13 21:04:02 ced2 kernel: Pid: 18794, comm: umount Tainted: G   M   2.6.22-ver.1.3 #1
Jan 13 21:04:02 ced2 kernel: RIP: 0010:[<ffffffff80294e17>]  [<ffffffff80294e17>] destroy_inode+0xd/0x4f
Jan 13 21:04:02 ced2 kernel: RSP: 0018:ffff8101bc37bdd8  EFLAGS: 00010202
Jan 13 21:04:02 ced2 kernel: RAX: 0000000000000001 RBX: ffff8101bed98af0 RCX: ffff8101bed98af0
Jan 13 21:04:02 ced2 kernel: RDX: 0000000000000003 RSI: ffff8101bed98cf8 RDI: ffff8101bed98af0
Jan 13 21:04:02 ced2 kernel: RBP: ffff8101bed98af0 R08: 0000000000000001 R09: ffff8101bc37bd58
Jan 13 21:04:02 ced2 kernel: R10: ffff810234d543c0 R11: 00000000fffffffa R12: 0000000000000003
Jan 13 21:04:02 ced2 kernel: R13: ffff8101bc37be18 R14: ffff81010b5c0328 R15: 0000000000000000
Jan 13 21:04:02 ced2 kernel: FS:  00002ae78746daf0(0000) GS:ffff8102346ecb40(0000) knlGS:0000000000000000
Jan 13 21:04:02 ced2 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
Jan 13 21:04:02 ced2 kernel: CR2: 00002aeaf39a2000 CR3: 00000001f46fd000 CR4: 00000000000006e0
Jan 13 21:04:02 ced2 kernel: Process umount (pid: 18794, threadinfo ffff8101bc37a000, task ffff8102185fd1e0)
Jan 13 21:04:02 ced2 kernel: Stack:  ffff8101bed98b00 ffffffff8029570e ffffffff80555f40 ffff81010b5c0090
Jan 13 21:04:02 ced2 kernel:  ffff8102232ce0c0 0000000000000007 ffff8102232ce0c0 ffffffff80295b41
Jan 13 21:04:02 ced2 kernel:  ffff8101bed98120 ffff81010b5c0318 0000000000000000 ffff8102232ce000
Jan 13 21:04:02 ced2 kernel: Call Trace:
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8029570e>] dispose_list+0xc3/0xf5
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80295b41>] invalidate_inodes+0xcd/0xeb
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284d4f>] generic_shutdown_super+0x39/0xf1
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284e14>] kill_block_super+0xd/0x1e
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284edf>] deactivate_super+0x6a/0x82
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80297c72>] sys_umount+0x24d/0x283
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8028637a>] sys_newstat+0x19/0x31
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8026ffbd>] do_munmap+0x254/0x276
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80361053>] __up_write+0x21/0x10e
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80209d8e>] system_call+0x7e/0x83
Jan 13 21:04:02 ced2 kernel: 
Jan 13 21:04:02 ced2 kernel: 
Jan 13 21:04:02 ced2 kernel: Code: 0f 0b eb fe 48 8b 05 3e fe 4f 00 48 89 df ff 90 18 01 00 00 
Jan 13 21:04:02 ced2 kernel: RIP  [<ffffffff80294e17>] destroy_inode+0xd/0x4f
Jan 13 21:04:02 ced2 kernel:  RSP <ffff8101bc37bdd8>
Jan 13 21:04:02 ced2 kernel: WARNING: at kernel/exit.c:869 do_exit()
Jan 13 21:04:02 ced2 kernel: 
Jan 13 21:04:02 ced2 kernel: Call Trace:
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80234f08>] do_exit+0x51/0x7ee
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8020b889>] kernel_math_error+0x0/0x71
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8020bec2>] do_invalid_op+0x85/0x8f
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80294e17>] destroy_inode+0xd/0x4f
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80243e65>] wake_up_bit+0x11/0x22
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8029dd88>] __writeback_single_inode+0x395/0x3a7
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80325f5d>] udf_current_aext+0xe7/0x142
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8052c15d>] error_exit+0x0/0x84
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80294e17>] destroy_inode+0xd/0x4f
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80294e13>] destroy_inode+0x9/0x4f
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8029570e>] dispose_list+0xc3/0xf5
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80295b41>] invalidate_inodes+0xcd/0xeb
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284d4f>] generic_shutdown_super+0x39/0xf1
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284e14>] kill_block_super+0xd/0x1e
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80284edf>] deactivate_super+0x6a/0x82
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80297c72>] sys_umount+0x24d/0x283
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8028637a>] sys_newstat+0x19/0x31
Jan 13 21:04:02 ced2 kernel:  [<ffffffff8026ffbd>] do_munmap+0x254/0x276
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80361053>] __up_write+0x21/0x10e
Jan 13 21:04:02 ced2 kernel:  [<ffffffff80209d8e>] system_call+0x7e/0x83
Jan 13 21:04:02 ced2 kernel: 
Jan 13 21:22:43 ced2 kernel: klogd 1.5.0#1, log source = /proc/kmsg started.




-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-ver.1.3 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-source-2.6.22 depends on:
hi  binutils            2.18.1~cvs20071027-1 The GNU assembler, linker and bina
hi  bzip2               1.0.3-7              high-quality block-sorting file co

Versions of packages linux-source-2.6.22 recommends:
hi  gcc                           4:4.2.1-6  The GNU C compiler
ii  libc6-dev [libc-dev]          2.7-5      GNU C Library: Development Librari
hi  make                          3.81-3     The GNU version of the "make" util

-- no debconf information



--- End Message ---
--- Begin Message ---
On Sun, Jan 13, 2008 at 10:43:23PM +0000, richard wrote:
> the system suffered a segmentation fault, with kernel.log as below. 
> The crash is not reproducible.

> Jan 13 21:04:02 ced2 kernel: Pid: 18794, comm: umount Tainted: G   M   2.6.22-ver.1.3 #1

The kernel is tainted because of a machine check and this is no Debian
kernel. We don't support this.

Bastian

-- 
The more complex the mind, the greater the need for the simplicity of play.
		-- Kirk, "Shore Leave", stardate 3025.8


--- End Message ---

Reply to: