On 18/11/11 16:56, Mike Blumenkrantz wrote:
> On Fri, 18 Nov 2011 16:35:24 +1100
> Jochen Schröder<cycoma...@gmail.com>  wrote:
>
>> On 18/11/11 15:50, Mike Blumenkrantz wrote:
>>> On Fri, 18 Nov 2011 15:48:22 +1100
>>> Jochen Schröder<cycoma...@gmail.com>   wrote:
>>>
>>>> On 18/11/11 13:16, Mike Blumenkrantz wrote:
>>>>> On Fri, 18 Nov 2011 09:18:50 +1100
>>>>> Jochen Schröder<cycoma...@gmail.com>    wrote:
>>>>>
>>>>>> Hi all,
>>>>>>
>>>>>> I'm still trying to get eeze mount to work in E_FM. I have build eeze
>>>>>> with libmount support (2.19.1). And I am building E17 with ./configure
>>>>>> --disable-mount-hal --disable-mount-udisks, here is the relevant
>>>>>> configure output:
>>>>>>
>>>>>>
>>>>>> Preferred Backends:
>>>>>>      * device..............: eeze
>>>>>>      * hal_mount...........: no
>>>>>>      * udisks_mount........: no
>>>>>>      * eeze_mount..........: yes
>>>>>>
>>>>>>
>>>>>> Additionally I have uncommented the following line in sysactions.conf
>>>>>>
>>>>>> # uncomment this line to enable eeze mounting for users
>>>>>> user:   someuser allow: /bin/mount /bin/umount /usr/bin/eject
>>>>>>
>>>>>>
>>>>>> When plugging in a device on the usb port nothing appears on the desktop
>>>>>> or in the file menu. xsession-errrors reports some dbus error
>>>>>> (attached). This system is debian sid. This seems to be the same problem
>>>>>> that was reported here:
>>>>>> http://osdir.com/ml/enlightenment-development-linux-ui/2011-08/msg00503.html
>>>>>>
>>>>>>
>>>>>> Additionally, when logging out E waits until the logout now, wait longer
>>>>>> dialogue shows up (however I have not 100% confirmed that this is
>>>>>> related).
>>>>>>
>>>>>> Cheers
>>>>>> Jochen
>>>>> hmm definitely strange since it looks like your devices are being properly
>>>>> detected. please start your e with EINA_LOG_LEVELS=efm:5 and post back
>>>>> your xsession log again.
>>>>>
>>>>
>>>> For what it's worth if I compile e with udisks mount support only, i.e.
>>>> configure --disable-mount-hal --disable-mount-eeze
>>>>
>>>> Icons show up on the desktop and I can mount and unmount, however when I
>>>> pull the usb drive out, the icon stays on the desktop, another
>>>> xsession-errors attached. Don't know if the two errors are related.
>>>>
>>>> Cheers
>>>> Jochen
>>> ooh looks like you got a nice crash in efm. gdb attach to it and run
>>> whatever you did again to get a backtrace for me
>>>
>>
>> OK here it is:
>>
>> to reproduce I compile e with --disable-mount-hal --disable-mount-eeze
>>
>> start e
>> attach gdb to e_fm
>>
>> plugin usb stick,
>> unmount usb stick
>> pull usb still
>> ->  BOOM
>>
>> first time I did this all screens went black and I had to hard reset
>> (didn't have a 2nd PC to test if I could ssh into the machine).
>>
>> Seems something is writing where it should not.
>>
>>
> hmmmmm super weird. can you run e in valgrind and reproduce this? that would
> give me a better idea of what's breaking
>

OK I was just trying to use valgrind, how do I log to a file and keep 
the console operational to answer the attach debugger questions?

Also I've just had a kernel oops when pulling out the usb stick (dmesg 
below), so not sure if this even is an e problem

Nov 19 15:20:21 aptosidbox kernel: [ 4160.178957] sd 9:0:0:0: [sdc] 
Attached SCSI removable disk
Nov 19 15:20:22 aptosidbox kernel: [ 4160.460176] sd 9:0:0:0: [sdc] 
7856127 512-byte logical blocks: (4.02 GB/3.74 GiB)
Nov 19 15:20:22 aptosidbox kernel: [ 4160.465202]  sdc: sdc1
Nov 19 15:26:32 aptosidbox kernel: [ 4531.039494] usb 1-2.1.2: USB 
disconnect, device number 8
Nov 19 15:26:32 aptosidbox kernel: [ 4531.041185] scsi: killing requests 
for dead queue
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043011] PGD 755ed067 PUD 
755ee067 PMD 0
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043011] CPU 1
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043011] Modules linked in: 
af_packet ppdev lp rfcomm bnep bluetooth rfkill powernow_k8 mperf 
cpufreq_powersave cpufreq_stats cpufreq_conservative pci_stub vboxpci(O) 
vboxnetadp(O) vboxnetflt(O) vboxdrv(O) fuse dm_crypt snd_hda_codec_hdmi 
joydev snd_hda_codec_via snd_hda_intel snd_hda_codec snd_hwdep snd_pcm 
snd_seq snd_timer snd_seq_device snd edac_core soundcore edac_mce_amd 
snd_page_alloc i2c_nforce2 k10temp parport_pc parport evdev pcspkr 
psmouse serio_raw button processor ext4 mbcache jbd2 crc16 dm_mod 
usb_storage uas sg usbhid hid sd_mod sr_mod crc_t10dif cdrom ata_generic 
ohci_hcd radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core 
power_supply pata_acpi sata_nv ehci_hcd pata_amd libata usbcore scsi_mod 
ssb mmc_core pcmcia forcedeth pcmcia_core [last unloaded: scsi_wait_scan]
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] Pid: 1750, comm: 
udisks-daemon Tainted: G           O 3.1-1.slh.4-aptosid-amd64 #1 To Be 
Filled By O.E.M. To Be Filled By O.E.M./N68-S
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] RIP: 
0010:[<ffffffffa029777b>]  [<ffffffffa029777b>] 
sd_revalidate_disk+0x33/0x161d [sd_mod]
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] RSP: 
0018:ffff880075485af8  EFLAGS: 00010246
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] RAX: 0000000000000000 
RBX: ffff88007cc296c0 RCX: 0000000000000002
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] RDX: 0000000000000002 
RSI: ffff880062c8b280 RDI: ffff880015565400
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] RBP: 0000000000000000 
R08: 00000008ffffffff R09: 0000000000000005
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] R10: 0000000000000246 
R11: ffff88007fc91b00 R12: ffff880015565400
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] R13: 0000000000000000 
R14: ffff88007cc296d8 R15: ffff88007cc296c0
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] FS: 
00007fc6c5ca67a0(0000) GS:ffff88007fc80000(0000) knlGS:0000000000000000
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] CS:  0010 DS: 0000 ES: 
0000 CR0: 000000008005003b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] CR2: 0000000000000008 
CR3: 00000000755ec000 CR4: 00000000000006e0
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] DR0: 0000000000000000 
DR1: 0000000000000000 DR2: 0000000000000000
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] DR3: 0000000000000000 
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742] Process udisks-daemon 
(pid: 1750, threadinfo ffff880075484000, task ffff880076255d70)
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  ffff88007fc91b00 
ffffffff810e8b2b ffffffff81172662 ffff880015565448
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  0000000000000000 
ffff880015565400 000000000000001d ffffffff81307448
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  ffff88007fc91b00 
ffff880015565400 ffff88007cc296c0 ffff88007cc296c0
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810e8b2b>] 
? iget5_locked+0x61/0x13d
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81172662>] 
? kref_put+0x3e/0x47
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81307448>] 
? _raw_spin_unlock+0x1d/0x2b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81121495>] 
? rescan_partitions+0xac/0x41b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810fad94>] 
? __blkdev_get+0x1a6/0x37e
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810fb226>] 
? blkdev_get+0x2ba/0x2ba
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810fb13c>] 
? blkdev_get+0x1d0/0x2ba
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81307448>] 
? _raw_spin_unlock+0x1d/0x2b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810fb226>] 
? blkdev_get+0x2ba/0x2ba
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810d3f90>] 
? __dentry_open+0x18c/0x2cc
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810e0703>] 
? do_last+0x45f/0x5a7
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810e0b78>] 
? path_openat+0xce/0x31c
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffffa007fab4>] 
? ioctl_internal_command.constprop.4+0x62/0x15c [scsi_mod]
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81063cec>] 
? module_refcount+0x80/0x95
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810e0e88>] 
? do_filp_open+0x2a/0x6e
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81307448>] 
? _raw_spin_unlock+0x1d/0x2b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810e9e89>] 
? alloc_fd+0x109/0x11b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff810d4e55>] 
? do_sys_open+0x5e/0xe5
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  [<ffffffff81307f52>] 
? system_call_fastpath+0x16/0x1b
Nov 19 15:26:32 aptosidbox kernel: [ 4531.043742]  RSP <ffff880075485af8>
Nov 19 15:26:32 aptosidbox kernel: [ 4531.099217] ---[ end trace 
da2439847618e5d0 ]---

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to