Package: shfs-source
Version: 0.35-5
Followup-For: Bug #342522

Dec 25 16:22:54 kernel: kernel BUG at fs/inode.c:252!
Dec 25 16:22:54 kernel: invalid operand: 0000 [#1]
Dec 25 16:22:54 kernel: PREEMPT
Dec 25 16:22:54 kernel: Modules linked in: shfs hidp hci_usb
ehci_hcd uhci_hcd sd_mod usb_storage hostap_cs hostap nfs iptable_filter
ip_tables binfmt_misc arc4 ieee80211_crypt_wep nfsd exportfs lockd
sunrpc rfcomm l2cap bluetooth pktcdvd ipv6 parport_pc lp parport deflate
twofish serpent blowfish des sha256 sha1 crypto_null af_key vfat fat
nvram af_packet nls_iso8859_1 nls_cp437 speedstep_centrino
freq_table snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_pcm
intel_agp agpgart tpm_nsc 8250_pci snd_timer snd_page_alloc tpm_atmel
tpm ipw2100 ieee80211 ieee80211_crypt hw_random evdev autofs4
snd_mixer_oss snd soundcore sg 8250 serial_core ohci_hcd usbcore pcmcia
firmware_class crc32 yenta_socket rsrc_nonstatic pcmcia_core video
thermal processor ibm_acpi fan button battery ac aes
Dec 25 16:22:54 kernel: CPU:    0
Dec 25 16:22:54 kernel: EIP:    0060:[clear_inode+27/304] Tainted: P   M  VLI
Dec 25 16:22:54 kernel: EFLAGS: 00010202   (2.6.14)
Dec 25 16:22:54 kernel: EIP is at clear_inode+0x1b/0x130
Dec 25 16:22:54 kernel: eax: 00000000   ebx: d490604c   ecx: 00000008   edx: 
d490604c
Dec 25 16:22:54 kernel: esi: f19947b0   edi: 00000002   ebp: e4418000   esp: 
e4419d90
Dec 25 16:22:54 kernel: ds: 007b   es: 007b   ss: 0068
Dec 25 16:22:54 kernel: Process gam_server (pid: 20293, threadinfo=e4418000 
task=e6ac8a70)
Dec 25 16:22:54 kernel: Stack: d490604c d490604c f19947b0 c0189d05 d490604c 
e4418000 c025ed71 d490604c
Dec 25 16:22:54 kernel:        d94854d0 c0189ff3 d490604c c0474980 d490604c 
c0186b81 d490604c c018706f
Dec 25 16:22:54 kernel:        e4418000 00000003 dd896bb8 e4419e48 e4419f10 
c16d4a40 c01870c4 00000003
Dec 25 16:22:54 kernel: Call Trace:
Dec 25 16:22:55 kernel:  [pg0+827332528/1068938240] shfs_delete_inode+0x0/0x130 
[shfs]
Dec 25 16:22:55 kernel:  [generic_delete_inode+165/368] 
generic_delete_inode+0xa5/0x170
Dec 25 16:22:55 kernel:  [_atomic_dec_and_lock+49/112] 
_atomic_dec_and_lock+0x31/0x70
Dec 25 16:22:55 kernel:  [iput+99/144] iput+0x63/0x90
Dec 25 16:22:55 kernel:  [prune_dcache+321/608] prune_dcache+0x141/0x260
Dec 25 16:22:55 kernel:  [select_parent+175/224] select_parent+0xaf/0xe0
Dec 25 16:22:55 kernel:  [shrink_dcache_parent+36/48] 
shrink_dcache_parent+0x24/0x30
Dec 25 16:22:55 kernel:  [d_invalidate+272/320] d_invalidate+0x110/0x140
Dec 25 16:22:55 kernel:  [do_lookup+123/176] do_lookup+0x7b/0xb0
Dec 25 16:22:55 kernel:  [permission+137/160] permission+0x89/0xa0
Dec 25 16:22:55 kernel:  [__link_path_walk+1881/3680] 
__link_path_walk+0x759/0xe60
Dec 25 16:22:55 kernel:  [link_path_walk+71/224] link_path_walk+0x47/0xe0
Dec 25 16:22:55 kernel:  [path_lookup+140/352] path_lookup+0x8c/0x160
Dec 25 16:22:55 kernel:  [__user_walk+51/96] __user_walk+0x33/0x60
Dec 25 16:22:55 kernel:  [vfs_stat+31/96] vfs_stat+0x1f/0x60
Dec 25 16:22:55 kernel:  [sys_stat64+27/64] sys_stat64+0x1b/0x40
Dec 25 16:22:55 kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Dec 25 16:22:55 kernel: Code: dd 3d c0 ff 0d 88 49 47 c0 eb c4 90 8d 74 26 00 
56 53 83 ec 04 8b 5c 24 10 89 1c 24 e8 6f 67 fe ff 8b 8b c8 00 00 00 85 c9 74 
08 <0f> 0b fc 00 ef 68 39 c0 8b 83 2c 01 00 00 a8 10 75 08 0f 0b fe

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (700, 'unstable'), (110, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages shfs-source depends on:
ii  bzip2                         1.0.2-5    high-quality block-sorting file co
ii  debconf                       1.4.58     Debian configuration management sy
ii  debhelper                     4.9.13     helper programs for debian/rules
ii  module-assistant              0.9.10     tool to make module package creati

Versions of packages shfs-source recommends:
ii  shfs-utils                    0.35-3     (secure) SHell File System mount p

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to