[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#416524: marked as done (linux-image-2.6.18-3-xen-686: kernel BUG at fs/fuse/control.c:82!)



Your message dated Sun, 6 Jul 2008 11:26:50 +0200
with message-id <20080706092650.GD21779@stro.at>
and subject line Re: linux-image-2.6.18-4-xen-686: domU NFS server crashes dom0
has caused the Debian Bug report #416524,
regarding linux-image-2.6.18-3-xen-686: kernel BUG at fs/fuse/control.c:82!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
416524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416524
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.18-3-xen-686
Version: 2.6.18-8
Severity: normal


I have a directory on a remote machine mounted to my machine via
sshfs.  Earlier today there was a networking issue, which I
suspect is related to the bug.  For over an hour my machine was
unable to see the remote machine.  I had forgotten that I had
the directory mounted, until hours later syslog notified me that
there had been an oops.  I am not aware of anything that would
have tried to access the sshfs filesystem before the oops.

Without rebooting or remounting the sshfs filesystem, I can
access it now.

Here is the oops:

Mar 28 17:24:50 marmite kernel: kernel BUG at fs/fuse/control.c:82!
Mar 28 17:24:50 marmite kernel: invalid opcode: 0000 [#1]
Mar 28 17:24:50 marmite kernel: SMP 
Mar 28 17:24:50 marmite kernel: Modules linked in: nls_cp437 vfat fat sd_mod usb_storage scsi_mod tun nls_iso8859_1 ncpfs binfmt_misc nbd ipv6 aoe fuse tsdev snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd i2c_i801 soundcore snd_page_alloc i2c_core serial_core psmouse floppy rtc intel_rng pcspkr intel_agp agpgart shpchp pci_hotplug evdev serio_raw ext3 jbd mbcache dm_mirror dm_snapshot dm_mod ide_cd cdrom ide_disk piix e100 mii generic ide_core ehci_hcd uhci_hcd usbcore thermal processor fan
Mar 28 17:24:50 marmite kernel: CPU:    0
Mar 28 17:24:50 marmite kernel: EIP:    0061:[<f49d4d65>]    Not tainted VLI
Mar 28 17:24:50 marmite kernel: EFLAGS: 00010202   (2.6.18-3-xen-686 #1) 
Mar 28 17:24:50 marmite kernel: EIP is at fuse_ctl_add_dentry+0x16/0xcb [fuse]
Mar 28 17:24:50 marmite kernel: eax: c0621744   ebx: c0621744   ecx: ded63d80   edx: cd044d80
Mar 28 17:24:50 marmite kernel: esi: cd044d80   edi: cd044d80   ebp: c02cfc40   esp: ded63d44
Mar 28 17:24:50 marmite kernel: ds: 007b   es: 007b   ss: 0069
Mar 28 17:24:50 marmite kernel: Process mount (pid: 6332, ti=ded62000 task=f229e550 task.ti=ded62000)
Mar 28 17:24:50 marmite kernel: Stack: ffffffff 00000000 c0621744 ded63d80 cd044d80 00000000 f49d4e6f 00004140 
Mar 28 17:24:50 marmite kernel:        00000002 c02cfc40 c0288ca0 ded63d80 f49d54eb 00000004 00000000 c0170034 
Mar 28 17:24:50 marmite kernel:        ded63db0 00000000 c01b2f9c ed753201 460a88c2 0cdac0dd ed753200 ed753200 
Mar 28 17:24:50 marmite kernel: Call Trace:
Mar 28 17:24:50 marmite kernel:  [<f49d4e6f>] fuse_ctl_add_conn+0x55/0xb9 [fuse]
Mar 28 17:24:50 marmite kernel:  [<c0170034>] seq_read+0x201/0x279
Mar 28 17:24:50 marmite kernel:  [<c01b2f9c>] idr_get_new+0xa/0x26
Mar 28 17:24:50 marmite kernel:  [<f49d4f2e>] fuse_ctl_fill_super+0x5b/0xb9 [fuse]
Mar 28 17:24:50 marmite kernel:  [<c015aee0>] get_sb_single+0x51/0x97
Mar 28 17:24:50 marmite kernel:  [<f49d4ed3>] fuse_ctl_fill_super+0x0/0xb9 [fuse]
Mar 28 17:24:50 marmite kernel:  [<c015add7>] vfs_kern_mount+0x7d/0xf2
Mar 28 17:24:50 marmite kernel:  [<f49d4ed3>] fuse_ctl_fill_super+0x0/0xb9 [fuse]
Mar 28 17:24:50 marmite kernel:  [<c015ae7e>] do_kern_mount+0x25/0x36
Mar 28 17:24:50 marmite kernel:  [<c016d3b0>] do_mount+0x5d8/0x648
Mar 28 17:24:50 marmite kernel:  [<c016c64e>] mntput_no_expire+0x11/0x6a
Mar 28 17:24:50 marmite kernel:  [<c01628a8>] link_path_walk+0xb3/0xbd
Mar 28 17:24:50 marmite kernel:  [<c014642a>] __handle_mm_fault+0x63b/0xb12
Mar 28 17:24:50 marmite kernel:  [<c013abc6>] find_get_page+0x37/0x3c
Mar 28 17:24:50 marmite kernel:  [<c013ea5b>] get_page_from_freelist+0x96/0x35b
Mar 28 17:24:50 marmite kernel:  [<c013ebac>] get_page_from_freelist+0x1e7/0x35b
Mar 28 17:24:50 marmite kernel:  [<c016c2b6>] copy_mount_options+0x26/0x109
Mar 28 17:24:50 marmite kernel:  [<c016d48d>] sys_mount+0x6d/0xaa
Mar 28 17:24:50 marmite kernel:  [<c010480b>] syscall_call+0x7/0xb
Mar 28 17:24:50 marmite kernel: Code: fa 50 89 e8 53 e8 c2 c0 79 cb 83 c4 14 83 c4 20 5b 5e 5f 5d c3 55 57 56 89 d6 53 83 ec 08 83 ba ac 00 00 00 02 8b 6c 24 24 7e 08 <0f> 0b 52 00 d9 54 9d f4 89 ca e8 b8 41 79 cb 85 c0 89 c7 0f 84 
Mar 28 17:24:50 marmite kernel: EIP: [<f49d4d65>] fuse_ctl_add_dentry+0x16/0xcb [fuse] SS:ESP 0069:ded63d44

I apologise if this is a DUP, but I didn't see anything that
mentioned fuse.

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (900, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages linux-image-2.6.18-3-xen-686 depends on:
ii  initramfs-tools               0.85f      tools for generating an initramfs
ii  linux-modules-2.6.18-3-xen-68 2.6.18-8   Linux 2.6.18 modules on PPro/Celer

Versions of packages linux-image-2.6.18-3-xen-686 recommends:
ii  libc6-xen                   2.3.6.ds1-13 GNU C Library: Shared libraries [X

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2.6.25-1

upstream merged paravirt_ops Xen. it features enhanced netxen
and block modules.

as this code got rewritten old bug no longer apply.
for guest system it is recommend to upgrade to newer xen.
for more infos on upstream merge status see
http://wiki.xensource.com/xenwiki/XenParavirtOps

for latest 2.6.26-rc8 linux images see
http://wiki.debian.org/DebianKernel

thanks for your report.


-- 
maks


--- End Message ---

Reply to: