I'm reading my emails frequently, eagerly awaiting a reply to this bug
report!

Note, I am going to move up to the 2.6.25.6 kernel for Puppy Linux, and if
you Unionfs developer guys can figure out why I'm getting crashing, I'll
apply
the fixed patch -- well, I can't use 2.3.3 as-is, so have to wait until
you can
come up with something.

Regards,
Barry Kauler

> I'm using a plain-vanilla 2.6.25.4 kernel, except for unionfs 2.3.3 and
> squashfs patches.
> I have a layered f.s. on '/', top branch is a tmpfs, under that is a
> loop-mounted file that is used as the "save file" and on the bottom is a
> loop mounted squashfs file that has all the Puppy Linux filesystem.
>
> Unfortunately, it is crashing frequently. Mostly at shutdown, and I have
> not captured a log of that. However today I got a crash when exiting from
> X to the tty and I still had a working commandline, so I saved
> /var/log/messages. Here is the end of it:
>
> Jun 14 07:35:10 (none) auth.info login[17273]: root login on 'tty1'
> Jun 14 07:58:16 (none) user.info kernel: unionfs: new lower inode mtime
> (bindex=0, name=.geany)
> Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL
> vfsmount
> Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted
> 2.6.25.4 #1
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169401>]
> dentry_open+0x61/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c890b>]
> __unionfs_file_revalidate+0x67b/0xcb0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00bee4b>]
> __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c017bf35>] iput+0x35/0x70
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c8f9d>]
> unionfs_file_revalidate+0x5d/0x90 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01755f0>] filldir64+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00ca113>]
> unionfs_readdir+0x53/0x2a0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01755f0>] filldir64+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c017364d>]
> do_unlinkat+0x4d/0x150
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01755f0>] filldir64+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0175831>]
> vfs_readdir+0x81/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01758bf>]
> sys_getdents64+0x6f/0xc0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01040f2>]
> syscall_call+0x7/0xb
> Jun 14 08:25:34 (none) user.warn kernel:  =======================
> Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL
> vfsmount
> Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted
> 2.6.25.4 #1
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169401>]
> dentry_open+0x61/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c890b>]
> __unionfs_file_revalidate+0x67b/0xcb0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00bee4b>]
> __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c017bf35>] iput+0x35/0x70
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c8f9d>]
> unionfs_file_revalidate+0x5d/0x90 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00ca113>]
> unionfs_readdir+0x53/0x2a0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c017364d>]
> do_unlinkat+0x4d/0x150
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01755f0>] filldir64+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0124f93>]
> current_fs_time+0x13/0x20
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0175831>]
> vfs_readdir+0x81/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0175abb>]
> sys_getdents+0x6b/0xc0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01040f2>]
> syscall_call+0x7/0xb
> Jun 14 08:25:34 (none) user.warn kernel:  =======================
> Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL
> vfsmount
> Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted
> 2.6.25.4 #1
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169401>]
> dentry_open+0x61/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c890b>]
> __unionfs_file_revalidate+0x67b/0xcb0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00bee4b>]
> __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c8f9d>]
> unionfs_file_revalidate+0x5d/0x90 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00ca29e>]
> unionfs_readdir+0x1de/0x2a0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c8f9d>]
> unionfs_file_revalidate+0x5d/0x90 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c9023>]
> unionfs_flush+0x53/0x100 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0167e4c>]
> filp_close+0x2c/0x80
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169345>] sys_close+0x65/0xc0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01040f2>]
> syscall_call+0x7/0xb
> Jun 14 08:25:34 (none) user.warn kernel:  =======================
> Jun 14 08:25:34 (none) user.warn kernel: dentry_open called with NULL
> vfsmount
> Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted
> 2.6.25.4 #1
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169401>]
> dentry_open+0x61/0xa0
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c890b>]
> __unionfs_file_revalidate+0x67b/0xcb0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00bee4b>]
> __unionfs_d_revalidate_chain+0x29b/0x3f0 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c8f9d>]
> unionfs_file_revalidate+0x5d/0x90 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<e00c91fd>]
> unionfs_file_release+0x6d/0x260 [unionfs]
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c016aba7>] __fput+0xa7/0x190
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0167e67>]
> filp_close+0x47/0x80
> Jun 14 08:25:34 (none) user.warn kernel:  [<c0169345>] sys_close+0x65/0xc0
> Jun 14 08:25:34 (none) user.warn kernel:  [<c01040f2>]
> syscall_call+0x7/0xb
> Jun 14 08:25:34 (none) user.warn kernel:  =======================
> Jun 14 08:25:34 (none) user.alert kernel: BUG: unable to handle kernel
> NULL pointer dereference at 0000001d
> Jun 14 08:25:34 (none) user.alert kernel: IP: [<c01694d2>]
> vfs_llseek+0x12/0x50
> Jun 14 08:25:34 (none) user.warn kernel: *pde = 00000000
> Jun 14 08:25:34 (none) user.emerg kernel: Oops: 0000 [#1] SMP
> Jun 14 08:25:34 (none) user.warn kernel: Modules linked in: evdev
> parport_pc lp parport snd_mixer_oss fan serio_raw pcspkr wmi battery
> container thermal button processor ac tifm_sd mmc_block mmc_core tifm_7xx1
> tifm_core yenta_socket rsrc_nonstatic arc4 ecb crypto_blkc
> Jun 14 08:25:34 (none) user.warn kernel:
> Jun 14 08:25:34 (none) user.warn kernel: Pid: 3161, comm: rm Not tainted
> (2.6.25.4 #1)
> Jun 14 08:25:34 (none) user.warn kernel: EIP: 0060:[<c01694d2>] EFLAGS:
> 00010282 CPU: 0
> Jun 14 08:25:34 (none) user.warn kernel: EIP is at vfs_llseek+0x12/0x50
> Jun 14 08:25:34 (none) user.warn kernel: EAX: 00000001 EBX: 00000001 ECX:
> 00000000 EDX: 00000000
> Jun 14 08:25:34 (none) user.warn kernel: ESI: c01694b0 EDI: dd4835c0 EBP:
> deca0ac0 ESP: df321f20
> Jun 14 08:25:34 (none) user.warn kernel:  DS: 007b ES: 007b FS: 00d8 GS:
> 0033 SS: 0068
> Jun 14 08:25:34 (none) user.emerg kernel: Process rm (pid: 3161,
> ti=df320000 task=df08e130 task.ti=df320000)
> Jun 14 08:25:34 (none) user.emerg kernel: Stack: e00c3fdb de9df840
> 00000001 e00ca1ab 00000000 c01756d0 df321f94 00000000
> Jun 14 08:25:34 (none) user.emerg kernel:        dec9f8d0 00000001
> de9df840 df321f94 00000000 00000000 00000000 c01756d0
> Jun 14 08:25:34 (none) user.emerg kernel:        de94e000 e00d0a60
> dd4835c0 deca0ac0 c01756d0 c0175831 df321f94 deca0b34
> Jun 14 08:25:34 (none) user.emerg kernel: Call Trace:
> Jun 14 08:25:34 (none) user.emerg kernel:  [<e00c3fdb>]
> init_rdstate+0x1b/0x40 [unionfs]
> Jun 14 08:25:34 (none) user.emerg kernel:  [<e00ca1ab>]
> unionfs_readdir+0xeb/0x2a0 [unionfs]
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c01756d0>] filldir+0x0/0xe0
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c0175831>]
> vfs_readdir+0x81/0xa0
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c0175abb>]
> sys_getdents+0x6b/0xc0
> Jun 14 08:25:34 (none) user.emerg kernel:  [<c01040f2>]
> syscall_call+0x7/0xb
> Jun 14 08:25:34 (none) user.emerg kernel:  =======================
> Jun 14 08:25:34 (none) user.emerg kernel: Code: 90 90 90 90 90 90 90 90 90
> b8 e3 ff ff ff ba ff ff ff ff c3 90 8d 74 26 00 83 ec 0c 89 5c 24 04 89 c3
> 89 74 24 08 be b0 94 16 c0 <f6> 40 1c 04 74 13 8b 40 10 be 60 a3 16 c0 85
> c0 74 07 8b 70 04
> Jun 14 08:25:34 (none) user.emerg kernel: EIP: [<c01694d2>]
> vfs_llseek+0x12/0x50 SS:ESP 0068:df321f20
> Jun 14 08:25:34 (none) user.warn kernel: ---[ end trace c6afe926b3f4a80d
> ]---
>
> ----------------
> Regards,
> Barry Kauler
>
>
> _______________________________________________
> unionfs mailing list: http://unionfs.filesystems.org/
> unionfs@mail.fsl.cs.sunysb.edu
> http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs
>


_______________________________________________
unionfs mailing list: http://unionfs.filesystems.org/
unionfs@mail.fsl.cs.sunysb.edu
http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs

Reply via email to