Package: shfs-source Version: 0.35-5 Followup-For: Bug #342522 Dec 25 16:22:54 kernel: kernel BUG at fs/inode.c:252! Dec 25 16:22:54 kernel: invalid operand: 0000 [#1] Dec 25 16:22:54 kernel: PREEMPT Dec 25 16:22:54 kernel: Modules linked in: shfs hidp hci_usb ehci_hcd uhci_hcd sd_mod usb_storage hostap_cs hostap nfs iptable_filter ip_tables binfmt_misc arc4 ieee80211_crypt_wep nfsd exportfs lockd sunrpc rfcomm l2cap bluetooth pktcdvd ipv6 parport_pc lp parport deflate twofish serpent blowfish des sha256 sha1 crypto_null af_key vfat fat nvram af_packet nls_iso8859_1 nls_cp437 speedstep_centrino freq_table snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_pcm intel_agp agpgart tpm_nsc 8250_pci snd_timer snd_page_alloc tpm_atmel tpm ipw2100 ieee80211 ieee80211_crypt hw_random evdev autofs4 snd_mixer_oss snd soundcore sg 8250 serial_core ohci_hcd usbcore pcmcia firmware_class crc32 yenta_socket rsrc_nonstatic pcmcia_core video thermal processor ibm_acpi fan button battery ac aes Dec 25 16:22:54 kernel: CPU: 0 Dec 25 16:22:54 kernel: EIP: 0060:[clear_inode+27/304] Tainted: P M VLI Dec 25 16:22:54 kernel: EFLAGS: 00010202 (2.6.14) Dec 25 16:22:54 kernel: EIP is at clear_inode+0x1b/0x130 Dec 25 16:22:54 kernel: eax: 00000000 ebx: d490604c ecx: 00000008 edx: d490604c Dec 25 16:22:54 kernel: esi: f19947b0 edi: 00000002 ebp: e4418000 esp: e4419d90 Dec 25 16:22:54 kernel: ds: 007b es: 007b ss: 0068 Dec 25 16:22:54 kernel: Process gam_server (pid: 20293, threadinfo=e4418000 task=e6ac8a70) Dec 25 16:22:54 kernel: Stack: d490604c d490604c f19947b0 c0189d05 d490604c e4418000 c025ed71 d490604c Dec 25 16:22:54 kernel: d94854d0 c0189ff3 d490604c c0474980 d490604c c0186b81 d490604c c018706f Dec 25 16:22:54 kernel: e4418000 00000003 dd896bb8 e4419e48 e4419f10 c16d4a40 c01870c4 00000003 Dec 25 16:22:54 kernel: Call Trace: Dec 25 16:22:55 kernel: [pg0+827332528/1068938240] shfs_delete_inode+0x0/0x130 [shfs] Dec 25 16:22:55 kernel: [generic_delete_inode+165/368] generic_delete_inode+0xa5/0x170 Dec 25 16:22:55 kernel: [_atomic_dec_and_lock+49/112] _atomic_dec_and_lock+0x31/0x70 Dec 25 16:22:55 kernel: [iput+99/144] iput+0x63/0x90 Dec 25 16:22:55 kernel: [prune_dcache+321/608] prune_dcache+0x141/0x260 Dec 25 16:22:55 kernel: [select_parent+175/224] select_parent+0xaf/0xe0 Dec 25 16:22:55 kernel: [shrink_dcache_parent+36/48] shrink_dcache_parent+0x24/0x30 Dec 25 16:22:55 kernel: [d_invalidate+272/320] d_invalidate+0x110/0x140 Dec 25 16:22:55 kernel: [do_lookup+123/176] do_lookup+0x7b/0xb0 Dec 25 16:22:55 kernel: [permission+137/160] permission+0x89/0xa0 Dec 25 16:22:55 kernel: [__link_path_walk+1881/3680] __link_path_walk+0x759/0xe60 Dec 25 16:22:55 kernel: [link_path_walk+71/224] link_path_walk+0x47/0xe0 Dec 25 16:22:55 kernel: [path_lookup+140/352] path_lookup+0x8c/0x160 Dec 25 16:22:55 kernel: [__user_walk+51/96] __user_walk+0x33/0x60 Dec 25 16:22:55 kernel: [vfs_stat+31/96] vfs_stat+0x1f/0x60 Dec 25 16:22:55 kernel: [sys_stat64+27/64] sys_stat64+0x1b/0x40 Dec 25 16:22:55 kernel: [syscall_call+7/11] syscall_call+0x7/0xb Dec 25 16:22:55 kernel: Code: dd 3d c0 ff 0d 88 49 47 c0 eb c4 90 8d 74 26 00 56 53 83 ec 04 8b 5c 24 10 89 1c 24 e8 6f 67 fe ff 8b 8b c8 00 00 00 85 c9 74 08 <0f> 0b fc 00 ef 68 39 c0 8b 83 2c 01 00 00 a8 10 75 08 0f 0b fe
-- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (700, 'unstable'), (110, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages shfs-source depends on: ii bzip2 1.0.2-5 high-quality block-sorting file co ii debconf 1.4.58 Debian configuration management sy ii debhelper 4.9.13 helper programs for debian/rules ii module-assistant 0.9.10 tool to make module package creati Versions of packages shfs-source recommends: ii shfs-utils 0.35-3 (secure) SHell File System mount p -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]