[Bug 13836] New: unionfs non-functional in 2.6.12-7.11

bugzilla-daemon at bugzilla.ubuntu.com bugzilla-daemon at bugzilla.ubuntu.com
Fri Aug 19 21:01:47 UTC 2005


Please do not reply to this email.  You can add comments at
http://bugzilla.ubuntu.com/show_bug.cgi?id=13836
Ubuntu | linux

           Summary: unionfs non-functional in 2.6.12-7.11
           Product: Ubuntu
           Version: unspecified
          Platform: Other
        OS/Version: other
            Status: UNCONFIRMED
          Severity: critical
          Priority: P2
         Component: linux
        AssignedTo: ben.collins at ubuntu.com
        ReportedBy: mdz at ubuntu.com
         QAContact: kernel-bugs at lists.ubuntu.com


With 2.6.12-7.11, when trying to boot an LTSP client I get, shortly after init
starts:

Unable to handle kernel NULL pointer dereference at virtual address 00000028
 printing eip:
c0157c71
*pde = 00000000
Oops: 0000 [#1]
Modules linked in: af_packet nfs lockd sunrpc thermal processor fan ide_cd cdrom
ide_disk ide_generic e1000 piix ide_core ehci_hcd uhci_hcd usbcore unionfs unix
CPU: 0
EIP: 0060:[<c0157c71>] Not tainted VLI
EFLAGS: 00010246 (2.6.12-7-386)
EIP is at d_delete+0xa/0xcb
eax: ce9c9d9c ebx: 00000000 ecx: 00000246 edx: ce9d85f0
esi: ce9c9d9c edi: 00000000 ebp: ce9d86b4 esp: c1331e84
ds: 007b es: 007b ss: 0068
Process mount (pid: 2022, threadinfo=c1330000 task=cf3ba520)
Stack: ...
Call Trace:
unionfs_link+0x21e7/0xc49b
unionfs_permission+0x32a/0x334
permission+0xa8/0xaf
vfs_link+0x110/0x181
sys_link+0x85/0xcb
sys_close+0x45/0x50
sysenter_past_esp+0x54/0x75

and things grind to a halt.  The same client still works fine with 2.6.12-6.10.
 This is a critical regression, especially considering that we just sent out a
major call for testing to the LTSP community, and now this functionality is
broken in Ubuntu, making it impossible for them to test.

-- 
Configure bugmail: http://bugzilla.ubuntu.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug, or are watching the QA contact.




More information about the kernel-bugs mailing list