On Thu, 14 Feb 2008 [EMAIL PROTECTED] wrote: > Will you show me the actual case (your operation or stack trace)? > I don't think this fix is meaningful.
This is a 2.6.24.2 debian based kernel. I'm using aufs on an NSFv4 ro fs and a tmpfs as a NFSroot. Without this patch I get this BUG, and the patch fixes it. aufs: no version for "struct_module" found: kernel tainted. aufs 20080211 aufs test_add:387:exe[1174]: uid/gid/perm /live/image/live/filesystem.dir 0/0/0755, 0/0/01777 BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000 printing eip: d08cd9f9 *pde = 00000000 Oops: 0000 [#1] SMP Modules linked in: aufs(F) nfs lockd nfs_acl sunrpc pcnet32 mii thermal processor fan Pid: 2677, comm: exe Tainted: GF (2.6.24-1-686 #1) EIP: 0060:[<d08cd9f9>] EFLAGS: 00010286 CPU: 0 EIP is at hdput+0xe/0x3f [aufs] EAX: cd955b00 EBX: 00000000 ECX: cecfd87c EDX: d08cc401 ESI: cecf22f8 EDI: cd955b4c EBP: cd8fc000 ESP: cdb77f14 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 Process exe (pid: 2677, ti=cdb76000 task=cf087930 task.ti=cdb76000) Stack: cd955b4c cecf22f8 cecfd84c d08cc531 0101dd40 cecfd84c cecfd954 b0186b07 cecfd84c b0186b57 cecfd84c 00000000 b0186e50 cecfec08 b0181393 cdb77f54 cecfd954 cf00dd40 123d39ab 0000000e cd8fc018 00000010 00000000 00000000 Call Trace: [<d08cc531>] aufs_d_release+0x35/0x61 [aufs] [<b0186b07>] d_free+0x15/0x2e [<b0186b57>] d_kill+0x37/0x46 [<b0186e50>] dput+0xd5/0xdc [<b0181393>] do_unlinkat+0xa0/0x125 [<b0103ede>] syscall_call+0x7/0xb ======================= Code: 77 8a df 89 fa eb 0a 89 d1 8b 12 39 f1 75 c7 31 d2 b0 01 86 43 04 5b 89 d0 5e 5f 5d c3 57 89 c7 56 53 8b 40 08 85 c0 74 29 8b 18 <8b> 33 eb 17 8b 43 0c 85 c0 74 05 e8 79 be 8a df 89 d8 89 f3 e8 EIP: [<d08cd9f9>] hdput+0xe/0x3f [aufs] SS:ESP 0068:cdb77f14 ---[ end trace a8ec271c10651301 ]--- Jan-Marek ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/