I'm reading my emails frequently, eagerly awaiting a reply to this bug report!
Note, I am going to move up to the 2.6.25.6 kernel for Puppy Linux, and if you Unionfs developer guys can figure out why I'm getting crashing, I'll apply the fixed patch -- well, I can't use 2.3.3 as-is, so have to wait until you can come up with something. Regards, Barry Kauler > I'm using a plain-vanilla 2.6.25.4 kernel, except for unionfs 2.3.3 and > squashfs patches. > I have a layered f.s. on '/', top branch is a tmpfs, under that is a > loop-mounted file that is used as the "save file" and on the bottom is a > loop mounted squashfs file that has all the Puppy Linux filesystem. > > Unfortunately, it is crashing frequently. Mostly at shutdown, and I have > not captured a log of that. However today I got a crash when exiting from > X to the tty and I still had a working commandline, so I saved > /var/log/messages. Here is the end of it: > > Jun 14 07:35:10 (none) auth.info login[17273]: root login on 'tty1' > Jun 14 07:58:16 (none) user.info kernel: unionfs: new lower inode mtime > (bindex=0, name=.geany) > Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL > vfsmount > Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted > 2.6.25.4 #1 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169401>] > dentry_open+0x61/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c890b>] > __unionfs_file_revalidate+0x67b/0xcb0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00bee4b>] > __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c017bf35>] iput+0x35/0x70 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c8f9d>] > unionfs_file_revalidate+0x5d/0x90 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01755f0>] filldir64+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00ca113>] > unionfs_readdir+0x53/0x2a0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01755f0>] filldir64+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c017364d>] > do_unlinkat+0x4d/0x150 > Jun 14 08:25:34 (none) user.warn kernel: [<c01755f0>] filldir64+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c0175831>] > vfs_readdir+0x81/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<c01758bf>] > sys_getdents64+0x6f/0xc0 > Jun 14 08:25:34 (none) user.warn kernel: [<c01040f2>] > syscall_call+0x7/0xb > Jun 14 08:25:34 (none) user.warn kernel: ======================= > Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL > vfsmount > Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted > 2.6.25.4 #1 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169401>] > dentry_open+0x61/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c890b>] > __unionfs_file_revalidate+0x67b/0xcb0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00bee4b>] > __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c017bf35>] iput+0x35/0x70 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c8f9d>] > unionfs_file_revalidate+0x5d/0x90 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00ca113>] > unionfs_readdir+0x53/0x2a0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c017364d>] > do_unlinkat+0x4d/0x150 > Jun 14 08:25:34 (none) user.warn kernel: [<c01755f0>] filldir64+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c0124f93>] > current_fs_time+0x13/0x20 > Jun 14 08:25:34 (none) user.warn kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c0175831>] > vfs_readdir+0x81/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<c0175abb>] > sys_getdents+0x6b/0xc0 > Jun 14 08:25:34 (none) user.warn kernel: [<c01040f2>] > syscall_call+0x7/0xb > Jun 14 08:25:34 (none) user.warn kernel: ======================= > Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL > vfsmount > Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted > 2.6.25.4 #1 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169401>] > dentry_open+0x61/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c890b>] > __unionfs_file_revalidate+0x67b/0xcb0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00bee4b>] > __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00c8f9d>] > unionfs_file_revalidate+0x5d/0x90 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00ca29e>] > unionfs_readdir+0x1de/0x2a0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c8f9d>] > unionfs_file_revalidate+0x5d/0x90 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00c9023>] > unionfs_flush+0x53/0x100 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c0167e4c>] > filp_close+0x2c/0x80 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169345>] sys_close+0x65/0xc0 > Jun 14 08:25:34 (none) user.warn kernel: [<c01040f2>] > syscall_call+0x7/0xb > Jun 14 08:25:34 (none) user.warn kernel: ======================= > Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL > vfsmount > Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted > 2.6.25.4 #1 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169401>] > dentry_open+0x61/0xa0 > Jun 14 08:25:34 (none) user.warn kernel: [<e00c890b>] > __unionfs_file_revalidate+0x67b/0xcb0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00bee4b>] > __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00c8f9d>] > unionfs_file_revalidate+0x5d/0x90 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<e00c91fd>] > unionfs_file_release+0x6d/0x260 [unionfs] > Jun 14 08:25:34 (none) user.warn kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.warn kernel: [<c016aba7>] __fput+0xa7/0x190 > Jun 14 08:25:34 (none) user.warn kernel: [<c0167e67>] > filp_close+0x47/0x80 > Jun 14 08:25:34 (none) user.warn kernel: [<c0169345>] sys_close+0x65/0xc0 > Jun 14 08:25:34 (none) user.warn kernel: [<c01040f2>] > syscall_call+0x7/0xb > Jun 14 08:25:34 (none) user.warn kernel: ======================= > Jun 14 08:25:34 (none) user.alert kernel: BUG: unable to handle kernel > NULL pointer dereference at 0000001d > Jun 14 08:25:34 (none) user.alert kernel: IP: [<c01694d2>] > vfs_llseek+0x12/0x50 > Jun 14 08:25:34 (none) user.warn kernel: *pde = 00000000 > Jun 14 08:25:34 (none) user.emerg kernel: Oops: 0000 [#1] SMP > Jun 14 08:25:34 (none) user.warn kernel: Modules linked in: evdev > parport_pc lp parport snd_mixer_oss fan serio_raw pcspkr wmi battery > container thermal button processor ac tifm_sd mmc_block mmc_core tifm_7xx1 > tifm_core yenta_socket rsrc_nonstatic arc4 ecb crypto_blkc > Jun 14 08:25:34 (none) user.warn kernel: > Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted > (2.6.25.4 #1) > Jun 14 08:25:34 (none) user.warn kernel: EIP: 0060:[<c01694d2>] EFLAGS: > 00010282 CPU: 0 > Jun 14 08:25:34 (none) user.warn kernel: EIP is at vfs_llseek+0x12/0x50 > Jun 14 08:25:34 (none) user.warn kernel: EAX: 00000001 EBX: 00000001 ECX: > 00000000 EDX: 00000000 > Jun 14 08:25:34 (none) user.warn kernel: ESI: c01694b0 EDI: dd4835c0 EBP: > deca0ac0 ESP: df321f20 > Jun 14 08:25:34 (none) user.warn kernel: DS: 007b ES: 007b FS: 00d8 GS: > 0033 SS: 0068 > Jun 14 08:25:34 (none) user.emerg kernel: Process rm (pid: 3161, > ti=df320000 task=df08e130 task.ti=df320000) > Jun 14 08:25:34 (none) user.emerg kernel: Stack: e00c3fdb de9df840 > 00000001 e00ca1ab 00000000 c01756d0 df321f94 00000000 > Jun 14 08:25:34 (none) user.emerg kernel: dec9f8d0 00000001 > de9df840 df321f94 00000000 00000000 00000000 c01756d0 > Jun 14 08:25:34 (none) user.emerg kernel: de94e000 e00d0a60 > dd4835c0 deca0ac0 c01756d0 c0175831 df321f94 deca0b34 > Jun 14 08:25:34 (none) user.emerg kernel: Call Trace: > Jun 14 08:25:34 (none) user.emerg kernel: [<e00c3fdb>] > init_rdstate+0x1b/0x40 [unionfs] > Jun 14 08:25:34 (none) user.emerg kernel: [<e00ca1ab>] > unionfs_readdir+0xeb/0x2a0 [unionfs] > Jun 14 08:25:34 (none) user.emerg kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.emerg kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.emerg kernel: [<c01756d0>] filldir+0x0/0xe0 > Jun 14 08:25:34 (none) user.emerg kernel: [<c0175831>] > vfs_readdir+0x81/0xa0 > Jun 14 08:25:34 (none) user.emerg kernel: [<c0175abb>] > sys_getdents+0x6b/0xc0 > Jun 14 08:25:34 (none) user.emerg kernel: [<c01040f2>] > syscall_call+0x7/0xb > Jun 14 08:25:34 (none) user.emerg kernel: ======================= > Jun 14 08:25:34 (none) user.emerg kernel: Code: 90 90 90 90 90 90 90 90 90 > b8 e3 ff ff ff ba ff ff ff ff c3 90 8d 74 26 00 83 ec 0c 89 5c 24 04 89 c3 > 89 74 24 08 be b0 94 16 c0 <f6> 40 1c 04 74 13 8b 40 10 be 60 a3 16 c0 85 > c0 74 07 8b 70 04 > Jun 14 08:25:34 (none) user.emerg kernel: EIP: [<c01694d2>] > vfs_llseek+0x12/0x50 SS:ESP 0068:df321f20 > Jun 14 08:25:34 (none) user.warn kernel: ---[ end trace c6afe926b3f4a80d > ]--- > > ---------------- > Regards, > Barry Kauler > > > _______________________________________________ > unionfs mailing list: http://unionfs.filesystems.org/ > unionfs@mail.fsl.cs.sunysb.edu > http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs > _______________________________________________ unionfs mailing list: http://unionfs.filesystems.org/ unionfs@mail.fsl.cs.sunysb.edu http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs