Comment 9 for bug 104837

Revision history for this message
Peter Funk (pf-artcom-gmbh) wrote :

I had the following today on a customer machine in Barcelona, Spain:

kernel: [1821218.318611] BUG: at fs/inotify.c:172 set_dentry_child_flags()
kernel: [1821218.318616]
kernel: [1821218.318617] Call Trace:
kernel: [1821218.318640] [set_dentry_child_flags+151/368] set_dentry_child_flags+0x97/0x170
kernel: [1821218.318646] [remove_watch_no_event+103/128] remove_watch_no_event+0x67/0x80
kernel: [1821218.318650] [inotify_remove_watch_locked+31/80] inotify_remove_watch_locked+0x1f/0x50
kernel: [1821218.318654] [inotify_rm_wd+150/208] inotify_rm_wd+0x96/0xd0
kernel: [1821218.318658] [sys_inotify_rm_watch+79/128] sys_inotify_rm_watch+0x4f/0x80
kernel: [1821218.318665] [system_call+126/131] system_call+0x7e/0x83

System is 2.6.20-15-server #2 SMP Sun Apr 15 06:22:36 UTC 2007 x86_64 GNU/Linux

Root filesystem is a default ext3, but there is also a software RAID5 on /dev/md0
(2.3 Terabyte formatted with SGI XFS) attached. Don't know if this matters.

Regards, Peter
--
Peter Funk, Oldenburger Str.86, D-27777 Ganderkesee, Germany; office:
ArtCom GmbH, Lise-Meitner-Str. 5, D-28359 Bremen, Germany, tel: +49-421-20419-0