I had the following today on a customer machine in Barcelona, Spain:

kernel: [1821218.318611] BUG: at fs/inotify.c:172 set_dentry_child_flags()
kernel: [1821218.318616] 
kernel: [1821218.318617] Call Trace:
kernel: [1821218.318640]  [set_dentry_child_flags+151/368] 
set_dentry_child_flags+0x97/0x170
kernel: [1821218.318646]  [remove_watch_no_event+103/128] 
remove_watch_no_event+0x67/0x80
kernel: [1821218.318650]  [inotify_remove_watch_locked+31/80] 
inotify_remove_watch_locked+0x1f/0x50
kernel: [1821218.318654]  [inotify_rm_wd+150/208] inotify_rm_wd+0x96/0xd0
kernel: [1821218.318658]  [sys_inotify_rm_watch+79/128] 
sys_inotify_rm_watch+0x4f/0x80
kernel: [1821218.318665]  [system_call+126/131] system_call+0x7e/0x83

System is 2.6.20-15-server #2 SMP Sun Apr 15 06:22:36 UTC 2007 x86_64
GNU/Linux

Root filesystem is a default ext3, but there is also a software RAID5 on 
/dev/md0 
(2.3 Terabyte formatted with SGI XFS) attached.  Don't know if this matters.


Regards, Peter
-- 
Peter Funk, Oldenburger Str.86, D-27777 Ganderkesee, Germany; office: 
ArtCom GmbH, Lise-Meitner-Str. 5, D-28359 Bremen, Germany, tel: +49-421-20419-0



** Attachment added: "Output of lspic -vvnn on that machine"
   http://launchpadlibrarian.net/10310151/lauchpad_bug_104837_lspci-vvnn.log

-- 
kernel warns BUG: at fs/inotify.c:172 set_dentry_child_flags()
https://bugs.launchpad.net/bugs/104837
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to