get patch from www.namesys.com, bug was added and fixed by viro, we just put the
patch up while waiting for 2.4.6 to come out.

Hans

Mathieu Chouquet-Stringer wrote:
> 
>         Hello!
> 
> I just mkreiserfsed a new partition (a 50g hardware raid0 array, I know
> this is just a testing machine), mounted it, and then unmounted it, and
> OOPS! My kernel version is plain 2.4.5...
> If you need more information, let me know.
> 
> Jun  4 17:25:03 nynetops03 kernel: reiserfs: checking transaction log (device 08:11) 
>...
> Jun  4 17:25:07 nynetops03 kernel: Using r5 hash to sort names
> Jun  4 17:25:07 nynetops03 kernel: ReiserFS version 3.6.25
> Jun  4 17:26:11 nynetops03 kernel: journal_begin called without kernel lock held
> Jun  4 17:26:11 nynetops03 kernel: kernel BUG at journal.c:423!
> Jun  4 17:26:11 nynetops03 kernel: invalid operand: 0000
> Jun  4 17:26:11 nynetops03 kernel: CPU:    1
> Jun  4 17:26:11 nynetops03 kernel: EIP:    0010:[reiserfs_check_lock_depth+56/64]
> Jun  4 17:26:11 nynetops03 kernel: EIP:    0010:[<c018bb98>]
> Jun  4 17:26:11 nynetops03 kernel: EFLAGS: 00010282
> Jun  4 17:26:11 nynetops03 kernel: eax: 0000001d   ebx: d8e15f24   ecx: 00000001   
>edx: 00000001
> Jun  4 17:26:11 nynetops03 kernel: esi: df9c5400   edi: 00000000   ebp: 3b1bfcf3   
>esp: d8e15eac
> Jun  4 17:26:11 nynetops03 kernel: ds: 0018   es: 0018   ss: 0018
> Jun  4 17:26:11 nynetops03 kernel: Process umount (pid: 4577, stackpage=d8e15000)
> Jun  4 17:26:11 nynetops03 kernel: Stack: c02678b3 c0267a44 000001a7 c018e2cf 
>c0268a61 00000000 d7e75250 000000e8
> Jun  4 17:26:11 nynetops03 kernel:        df731000 40173000 d8e15f60 00000000 
>00000018 d8e15f24 df9c5400 c02a8620
> Jun  4 17:26:11 nynetops03 kernel:        c02a8698 c018e516 d8e15f24 df9c5400 
>0000000a 00000000 c017ffdc d8e15f24
> Jun  4 17:26:11 nynetops03 kernel: Call Trace: [do_journal_begin_r+31/560] 
>[journal_begin+22/32] [reiserfs_put_super+28/224] [iput+63/368] [fsync_super+180/192] 
>[kill_super+162/288] [path_release+41/48]
> Jun  4 17:26:11 nynetops03 kernel: Call Trace: [<c018e2cf>] [<c018e516>] 
>[<c017ffdc>] [<c014bf3f>] [<c0137494>] [<c013bd72>] [<c0140e79>]
> Jun  4 17:26:11 nynetops03 kernel:        [sys_umount+301/352] [sys_munmap+51/80] 
>[sys_oldumount+12/16] [system_call+51/56]
> Jun  4 17:26:11 nynetops03 kernel:        [<c013c22d>] [<c0126ec3>] [<c013c26c>] 
>[<c0106e0b>]
> Jun  4 17:26:11 nynetops03 kernel:
> Jun  4 17:26:11 nynetops03 kernel: Code: 0f 0b 83 c4 0c c3 89 f6 31 c0 c3 8d b6 00 
>00 00 00 8d bc 27
> 
> And the decoded output:
> ksymoops 2.4.0 on i686 2.4.5.  Options used
>      -V (default)
>      -k /proc/ksyms (default)
>      -l /proc/modules (default)
>      -o /lib/modules/2.4.5/ (default)
>      -m /boot/System.map-2.4.5 (default)
> 
> Warning: You did not tell me where to find symbol information.  I will
> assume that the log matches the kernel and modules that are running
> right now and I'll use the default options above for symbol resolution.
> If the current kernel and/or modules do not match the log, you can get
> more accurate output by telling me the kernel version and where to find
> map, modules, ksyms etc.  ksymoops -h explains the options.
> 
> Warning (compare_maps): ksyms_base symbol __VERSIONED_SYMBOL(shmem_file_setup) not 
>found in System.map.  Ignoring ksyms_base entry
> Warning (compare_maps): ksyms_base symbol 
>machine_real_restart_R__ver_machine_real_restart not found in System.map.  Ignoring 
>ksyms_base entry
> Jun  4 17:26:11 nynetops03 kernel: kernel BUG at journal.c:423!
> Jun  4 17:26:11 nynetops03 kernel: invalid operand: 0000
> Jun  4 17:26:11 nynetops03 kernel: CPU:    1
> Jun  4 17:26:11 nynetops03 kernel: EIP:    0010:[reiserfs_check_lock_depth+56/64]
> Jun  4 17:26:11 nynetops03 kernel: EIP:    0010:[<c018bb98>]
> Using defaults from ksymoops -t elf32-i386 -a i386
> Jun  4 17:26:11 nynetops03 kernel: EFLAGS: 00010282
> Jun  4 17:26:11 nynetops03 kernel: eax: 0000001d   ebx: d8e15f24   ecx: 00000001   
>edx: 00000001
> Jun  4 17:26:11 nynetops03 kernel: esi: df9c5400   edi: 00000000   ebp: 3b1bfcf3   
>esp: d8e15eac
> Jun  4 17:26:11 nynetops03 kernel: ds: 0018   es: 0018   ss: 0018
> Jun  4 17:26:11 nynetops03 kernel: Process umount (pid: 4577, stackpage=d8e15000)
> Jun  4 17:26:11 nynetops03 kernel: Stack: c02678b3 c0267a44 000001a7 c018e2cf 
>c0268a61 00000000 d7e75250 000000e8
> Jun  4 17:26:11 nynetops03 kernel:        df731000 40173000 d8e15f60 00000000 
>00000018 d8e15f24 df9c5400 c02a8620
> Jun  4 17:26:11 nynetops03 kernel:        c02a8698 c018e516 d8e15f24 df9c5400 
>0000000a 00000000 c017ffdc d8e15f24
> Jun  4 17:26:11 nynetops03 kernel: Call Trace: [do_journal_begin_r+31/560] 
>[journal_begin+22/32] [reiserfs_put_super+28/224] [iput+63/368] [fsync_super+180/192] 
>[kill_super+162/288] [path_release+41/48]
> Jun  4 17:26:11 nynetops03 kernel: Call Trace: [<c018e2cf>] [<c018e516>] 
>[<c017ffdc>] [<c014bf3f>] [<c0137494>] [<c013bd72>] [<c0140e79>]
> Jun  4 17:26:11 nynetops03 kernel:        [<c013c22d>] [<c0126ec3>] [<c013c26c>] 
>[<c0106e0b>]
> Jun  4 17:26:11 nynetops03 kernel: Code: 0f 0b 83 c4 0c c3 89 f6 31 c0 c3 8d b6 00 
>00 00 00 8d bc 27
> 
> >>EIP; c018bb98 <reiserfs_check_lock_depth+38/40>   <=====
> Trace; c018e2cf <do_journal_begin_r+1f/230>
> Trace; c018e516 <journal_begin+16/20>
> Trace; c017ffdc <reiserfs_put_super+1c/e0>
> Trace; c014bf3f <iput+3f/170>
> Trace; c0137494 <fsync_super+b4/c0>
> Trace; c013bd72 <kill_super+a2/120>
> Trace; c0140e79 <path_release+29/30>
> Trace; c013c22d <sys_umount+12d/160>
> Trace; c0126ec3 <sys_munmap+33/50>
> Trace; c013c26c <sys_oldumount+c/10>
> Trace; c0106e0b <system_call+33/38>
> Code;  c018bb98 <reiserfs_check_lock_depth+38/40>
> 00000000 <_EIP>:
> Code;  c018bb98 <reiserfs_check_lock_depth+38/40>   <=====
>    0:   0f 0b                     ud2a      <=====
> Code;  c018bb9a <reiserfs_check_lock_depth+3a/40>
>    2:   83 c4 0c                  add    $0xc,%esp
> Code;  c018bb9d <reiserfs_check_lock_depth+3d/40>
>    5:   c3                        ret
> Code;  c018bb9e <reiserfs_check_lock_depth+3e/40>
>    6:   89 f6                     mov    %esi,%esi
> Code;  c018bba0 <push_journal_writer+0/10>
>    8:   31 c0                     xor    %eax,%eax
> Code;  c018bba2 <push_journal_writer+2/10>
>    a:   c3                        ret
> Code;  c018bba3 <push_journal_writer+3/10>
>    b:   8d b6 00 00 00 00         lea    0x0(%esi),%esi
> Code;  c018bba9 <push_journal_writer+9/10>
>   11:   8d bc 27 00 00 00 00      lea    0x0(%edi,1),%edi
> 
> 3 warnings issued.  Results may not be reliable.
> 
> --
> Mathieu CHOUQUET-STRINGER              E-Mail : [EMAIL PROTECTED]
>      Learning French is trivial: the word for horse is cheval, and
>                everything else follows in the same way.
>                         -- Alan J. Perlis
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to [EMAIL PROTECTED]
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to