Your message dated Tue, 20 Dec 2005 15:32:05 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#342522: fixed in shfs 0.35-5 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 8 Dec 2005 10:18:43 +0000 >From [EMAIL PROTECTED] Thu Dec 08 02:18:43 2005 Return-path: <[EMAIL PROTECTED]> Received: from kuna.verza.com ([80.127.133.6]) by spohr.debian.org with esmtp (Exim 4.50) id 1EkIrL-0007eo-Ey for [EMAIL PROTECTED]; Thu, 08 Dec 2005 02:18:43 -0800 Received: from richii.verza.com (unknown [195.20.32.200]) by kuna.verza.com (Postfix) with ESMTP id 0EE03D5C28F; Thu, 8 Dec 2005 11:21:37 +0100 (CET) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Richard Faasen <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: shfs-source: kernel bug with linux-image-2.6.14-2-686 when installed with module-assistant Message-ID: <[EMAIL PROTECTED]> X-Mailer: reportbug 3.18 Date: Thu, 08 Dec 2005 11:18:11 +0100 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, RCVD_IN_SBLXBL,RCVD_IN_SBLXBL_CBL autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: shfs-source Version: 0.35-4 Severity: critical Justification: breaks the whole system I installed shfs-source using module-assistant with linux-image-2.6.14-2-686. After mounting a filesystem and modifying a few files, and deleting a file, I get the following message in syslog: kernel BUG at fs/inode.c:252! invalid operand: 0000 [#1] Modules linked in: shfs i915 drm lp ipv6 ipt_state ipt_REJECT ipt_limit ipt_LOG ip_conntrack_irc ip_conntrack_ftp ip_conntrack nfnetlink iptable_filter ip_tables vfat fat reiserfs dm_mod 8139cp 8139too mii joydev snd_intel8x0 snd_ac97_codec snd_ac97_bus evdev snd_pcm_oss snd_mixer_oss mousedev snd_pcm snd_timer ide_cd cdrom psmouse i2c_i801 ehci_hcd uhci_hcd snd soundcore shpchp pci_hotplug parport_pc parport serio_raw intel_agp agpgart floppy rtc usbcore pcspkr i2c_core snd_page_alloc ext2 ext3 jbd mbcache ide_disk ide_generic via82cxxx trm290 triflex slc90e66 sis5513 siimage serverworks sc1200 rz1000 piix pdc202xx_old opti621 ns87415 it821x hpt366 hpt34x generic cy82c693 cs5530 cs5520 cmd64x atiixp amd74xx alim15x3 aec62xx pdc202xx_new ide_core CPU: 0 EIP: 0060:[clear_inode+27/272] Not tainted VLI EFLAGS: 00010202 (2.6.14-2-686) kernel: EIP is at clear_inode+0x1b/0x110 eax: 00000002 ebx: dca3be38 ecx: c0b6905c edx: dca3be38 esi: e054cc60 edi: dd0a2b30 ebp: dca3be38 esp: c24adf38 ds: 007b es: 007b ss: 0068 Process kdevelop3 (pid: 5847, threadinfo=c24ac000 task=cb639550) Stack: dca3be38 dca3be38 e054cc60 c017b07a dca3be38 c017b2d2 dca3be5c 00000000 dea13000 c0170d96 dca3be38 dd0a2b30 c0952558 df723d00 cdb8e326 00000016 dea13027 00000010 00000000 00000000 c24adfbc cb639550 b758b0e0 c24adfbc Call Trace: [pg0+538471520/1069777920] shfs_delete_inode+0x0/0x140 [shfs] [generic_delete_inode+122/304] generic_delete_inode+0x7a/0x130 [iput+66/128] iput+0x42/0x80 [sys_unlink+262/336] sys_unlink+0x106/0x150 [syscall_call+7/11] syscall_call+0x7/0xb Code: c0 eb d0 8d b6 00 00 00 00 8d bc 27 00 00 00 00 56 53 83 ec 04 8b 5c 24 10 89 1c 24 e8 ef 79 fe ff 8b 83 c8 00 00 00 85 c0 74 08 <0f> 0b fc 00 67 9c 2e c0 8b 83 2c 01 00 00 a8 10 75 08 0f 0b fe After a while, the whole system becomes unstable and crashes completely. I did the whole process over again after updating the whole system to the latest 'unstable' release with the same result. I went back to linux-image-2.6.12-1-686, reinstalled shfs-source with the above procedure, and then it works fine again. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages shfs-source depends on: ii bzip2 1.0.2-11 high-quality block-sorting file co ii debconf 1.4.62 Debian configuration management sy ii debhelper 5.0.8 helper programs for debian/rules ii module-assistant 0.10.2 tool to make module package creati Versions of packages shfs-source recommends: ii shfs-utils 0.35-4 (secure) SHell File System mount p -- no debconf information --------------------------------------- Received: (at 342522-close) by bugs.debian.org; 20 Dec 2005 23:40:53 +0000 >From [EMAIL PROTECTED] Tue Dec 20 15:40:53 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Eoqxh-00066i-Ti; Tue, 20 Dec 2005 15:32:05 -0800 From: Eduard Bloch <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.65 $ Subject: Bug#342522: fixed in shfs 0.35-5 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 20 Dec 2005 15:32:05 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: shfs Source-Version: 0.35-5 We believe that the bug you reported is fixed in the latest version of shfs, which is due to be installed in the Debian FTP archive: shfs-source_0.35-5_all.deb to pool/main/s/shfs/shfs-source_0.35-5_all.deb shfs-utils_0.35-5_i386.deb to pool/main/s/shfs/shfs-utils_0.35-5_i386.deb shfs_0.35-5.diff.gz to pool/main/s/shfs/shfs_0.35-5.diff.gz shfs_0.35-5.dsc to pool/main/s/shfs/shfs_0.35-5.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Eduard Bloch <[EMAIL PROTECTED]> (supplier of updated shfs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 21 Dec 2005 00:20:53 +0100 Source: shfs Binary: shfs-source shfs-utils Architecture: source i386 all Version: 0.35-5 Distribution: unstable Urgency: low Maintainer: Eduard Bloch <[EMAIL PROTECTED]> Changed-By: Eduard Bloch <[EMAIL PROTECTED]> Description: shfs-source - (secure) SHell File System module source shfs-utils - (secure) SHell File System mount programs Closes: 306905 317507 342522 Changes: shfs (0.35-5) unstable; urgency=low . * added dpatch to solve crashes of kernel 2.6.14, slightly modified (closes: #342522) * moving to DH level 4 * removed the explicite CC setting, handled by module-assistant nowadays or needs other workarounds to deal with the kernel build system anyway (closes: #306905, 317507) Files: b8b125bdfd9ba8d61318b06f754bca07 581 misc optional shfs_0.35-5.dsc 7b370593be760e9ec7d9adee64245815 9851 misc optional shfs_0.35-5.diff.gz 41ea37214fe04c58ee83430c026867d0 36180 misc optional shfs-source_0.35-5_all.deb 19d2dd786f8533adf12c3406118e70f3 85718 misc optional shfs-utils_0.35-5_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDqJJb4QZIHu3wCMURAn9kAJ9830S0Yma6DHUjmMB+JtiKRhTcvgCdH2Cl YyVbL5HGcsad/b6//n98ZAE= =bbT+ -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]