I had the following today on a customer machine in Barcelona, Spain: kernel: [1821218.318611] BUG: at fs/inotify.c:172 set_dentry_child_flags() kernel: [1821218.318616] kernel: [1821218.318617] Call Trace: kernel: [1821218.318640] [set_dentry_child_flags+151/368] set_dentry_child_flags+0x97/0x170 kernel: [1821218.318646] [remove_watch_no_event+103/128] remove_watch_no_event+0x67/0x80 kernel: [1821218.318650] [inotify_remove_watch_locked+31/80] inotify_remove_watch_locked+0x1f/0x50 kernel: [1821218.318654] [inotify_rm_wd+150/208] inotify_rm_wd+0x96/0xd0 kernel: [1821218.318658] [sys_inotify_rm_watch+79/128] sys_inotify_rm_watch+0x4f/0x80 kernel: [1821218.318665] [system_call+126/131] system_call+0x7e/0x83
System is 2.6.20-15-server #2 SMP Sun Apr 15 06:22:36 UTC 2007 x86_64 GNU/Linux Root filesystem is a default ext3, but there is also a software RAID5 on /dev/md0 (2.3 Terabyte formatted with SGI XFS) attached. Don't know if this matters. Regards, Peter -- Peter Funk, Oldenburger Str.86, D-27777 Ganderkesee, Germany; office: ArtCom GmbH, Lise-Meitner-Str. 5, D-28359 Bremen, Germany, tel: +49-421-20419-0 ** Attachment added: "Output of lspic -vvnn on that machine" http://launchpadlibrarian.net/10310151/lauchpad_bug_104837_lspci-vvnn.log -- kernel warns BUG: at fs/inotify.c:172 set_dentry_child_flags() https://bugs.launchpad.net/bugs/104837 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs