Your message dated Tue, 20 Dec 2005 15:32:05 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#342522: fixed in shfs 0.35-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 8 Dec 2005 10:18:43 +0000
>From [EMAIL PROTECTED] Thu Dec 08 02:18:43 2005
Return-path: <[EMAIL PROTECTED]>
Received: from kuna.verza.com ([80.127.133.6])
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1EkIrL-0007eo-Ey
        for [EMAIL PROTECTED]; Thu, 08 Dec 2005 02:18:43 -0800
Received: from richii.verza.com (unknown [195.20.32.200])
        by kuna.verza.com (Postfix) with ESMTP id 0EE03D5C28F;
        Thu,  8 Dec 2005 11:21:37 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Richard Faasen <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: shfs-source: kernel bug with linux-image-2.6.14-2-686 when installed 
with
 module-assistant
Message-ID: <[EMAIL PROTECTED]>
X-Mailer: reportbug 3.18
Date: Thu, 08 Dec 2005 11:18:11 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        RCVD_IN_SBLXBL,RCVD_IN_SBLXBL_CBL autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02

Package: shfs-source
Version: 0.35-4
Severity: critical
Justification: breaks the whole system

I installed shfs-source using module-assistant with linux-image-2.6.14-2-686. 
After mounting a filesystem and modifying a few files, and deleting a file, I 
get the following message in syslog:

kernel BUG at fs/inode.c:252!
invalid operand: 0000 [#1]
Modules linked in: shfs i915 drm lp ipv6
ipt_state ipt_REJECT ipt_limit ipt_LOG ip_conntrack_irc ip_conntrack_ftp 
ip_conntrack nfnetlink iptable_filter ip_tables vfat fat
reiserfs dm_mod 8139cp 8139too mii joydev snd_intel8x0 snd_ac97_codec 
snd_ac97_bus evdev snd_pcm_oss snd_mixer_oss mousedev
snd_pcm snd_timer ide_cd cdrom psmouse i2c_i801 ehci_hcd uhci_hcd snd soundcore 
shpchp pci_hotplug parport_pc parport serio_raw
intel_agp agpgart floppy rtc usbcore pcspkr i2c_core snd_page_alloc ext2 ext3 
jbd mbcache ide_disk ide_generic via82cxxx trm290 triflex
slc90e66 sis5513 siimage serverworks sc1200 rz1000 piix pdc202xx_old opti621 
ns87415 it821x hpt366 hpt34x generic cy82c693 cs5530
cs5520 cmd64x atiixp amd74xx alim15x3 aec62xx pdc202xx_new ide_core
CPU:    0
EIP:    0060:[clear_inode+27/272]    Not tainted VLI
EFLAGS: 00010202   (2.6.14-2-686)
kernel: EIP is at clear_inode+0x1b/0x110
eax: 00000002   ebx: dca3be38   ecx: c0b6905c   edx: dca3be38
esi: e054cc60   edi: dd0a2b30   ebp: dca3be38   esp: c24adf38
ds: 007b   es: 007b   ss: 0068 
Process kdevelop3 (pid: 5847, threadinfo=c24ac000 task=cb639550)
Stack: dca3be38 dca3be38 e054cc60 c017b07a dca3be38 c017b2d2 dca3be5c 00000000
       dea13000 c0170d96 dca3be38 dd0a2b30 c0952558 df723d00 cdb8e326 00000016
       dea13027 00000010 00000000 00000000 c24adfbc cb639550 b758b0e0 c24adfbc
Call Trace:
 [pg0+538471520/1069777920] shfs_delete_inode+0x0/0x140 [shfs]
 [generic_delete_inode+122/304] generic_delete_inode+0x7a/0x130
 [iput+66/128] iput+0x42/0x80
 [sys_unlink+262/336] sys_unlink+0x106/0x150
 [syscall_call+7/11] syscall_call+0x7/0xb
Code: c0 eb d0 8d b6 00 00 00 00 8d bc 27 00 00 00 00 56 53 83 ec 04 8b 5c 24 
10 89 1c 24 e8 ef 79 fe ff 8b 83 c8 00 00 00 85 c0 74 08 <0f> 0b fc 00 67 9c 2e 
c0 8b 83 2c 01 00 00 a8 10 75 08 0f 0b fe


After a while, the whole system becomes unstable and crashes completely.
I did the whole process over again after updating the whole system to
the latest 'unstable' release with the same result.

I went back to linux-image-2.6.12-1-686, reinstalled shfs-source with
the above procedure, and then it works fine again.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages shfs-source depends on:
ii  bzip2                         1.0.2-11   high-quality block-sorting file co
ii  debconf                       1.4.62     Debian configuration management sy
ii  debhelper                     5.0.8      helper programs for debian/rules
ii  module-assistant              0.10.2     tool to make module package creati

Versions of packages shfs-source recommends:
ii  shfs-utils                    0.35-4     (secure) SHell File System mount p

-- no debconf information

---------------------------------------
Received: (at 342522-close) by bugs.debian.org; 20 Dec 2005 23:40:53 +0000
>From [EMAIL PROTECTED] Tue Dec 20 15:40:53 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1Eoqxh-00066i-Ti; Tue, 20 Dec 2005 15:32:05 -0800
From: Eduard Bloch <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#342522: fixed in shfs 0.35-5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 20 Dec 2005 15:32:05 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: shfs
Source-Version: 0.35-5

We believe that the bug you reported is fixed in the latest version of
shfs, which is due to be installed in the Debian FTP archive:

shfs-source_0.35-5_all.deb
  to pool/main/s/shfs/shfs-source_0.35-5_all.deb
shfs-utils_0.35-5_i386.deb
  to pool/main/s/shfs/shfs-utils_0.35-5_i386.deb
shfs_0.35-5.diff.gz
  to pool/main/s/shfs/shfs_0.35-5.diff.gz
shfs_0.35-5.dsc
  to pool/main/s/shfs/shfs_0.35-5.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Eduard Bloch <[EMAIL PROTECTED]> (supplier of updated shfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 21 Dec 2005 00:20:53 +0100
Source: shfs
Binary: shfs-source shfs-utils
Architecture: source i386 all
Version: 0.35-5
Distribution: unstable
Urgency: low
Maintainer: Eduard Bloch <[EMAIL PROTECTED]>
Changed-By: Eduard Bloch <[EMAIL PROTECTED]>
Description: 
 shfs-source - (secure) SHell File System module source
 shfs-utils - (secure) SHell File System mount programs
Closes: 306905 317507 342522
Changes: 
 shfs (0.35-5) unstable; urgency=low
 .
   * added dpatch to solve crashes of kernel 2.6.14, slightly modified
     (closes: #342522)
   * moving to DH level 4
   * removed the explicite CC setting, handled by module-assistant nowadays or
     needs other workarounds to deal with the kernel build system anyway
     (closes: #306905, 317507)
Files: 
 b8b125bdfd9ba8d61318b06f754bca07 581 misc optional shfs_0.35-5.dsc
 7b370593be760e9ec7d9adee64245815 9851 misc optional shfs_0.35-5.diff.gz
 41ea37214fe04c58ee83430c026867d0 36180 misc optional shfs-source_0.35-5_all.deb
 19d2dd786f8533adf12c3406118e70f3 85718 misc optional shfs-utils_0.35-5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDqJJb4QZIHu3wCMURAn9kAJ9830S0Yma6DHUjmMB+JtiKRhTcvgCdH2Cl
YyVbL5HGcsad/b6//n98ZAE=
=bbT+
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to