<div dir="ltr"><div>I replicated this on 2.6.26-rc9 and release 2.6.26 -&nbsp;showing up on console screen. Once it starts it just spews on the screen and server becomes unusable.</div>
<div>&nbsp;</div>
<div>Geoff</div>
<div>&nbsp;</div>
<div>EIP:0060:[&lt;c0607856&gt;] EFLAGS: 00000297 CPU: 0<br>EIP is at _spin_lock+0x10/0x15<br>EAX: f5962c00 EBX: 00000000 ECX: 00000000 EDX: 0000acab<br>ESI: f44413d0 EDI: f44413d0 EBP: d2e8e000 ESP: d2e88ee2c <br>DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068<br>
CR0: 80050033 CR2: 00357cb0 CR3: 287ee000 CR4: 000006f0<br>DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000<br>DR6: ffff0ff0 DR7: 00000400</div>
<p>[&lt;f8bfee69&gt;] ocfs_inode_lock_full+0x33/0x96d [ocfs2]<br>[&lt;c0485e75&gt;] mntput_no_expire+0x13/0xd6<br>[&lt;f8c1e3f0&gt;] ocfs2_statfs+0xbb/0x248d [ocfs2]<br>[&lt;c0472db8&gt;] vfs_statfs+0x43/0x5b<br>[&lt;c0472de0&gt;] vfs_statfs64+0x10/0x21<br>
[&lt;c0472e95&gt;] sys_statfs64+0x44/0x7b<br>[&lt;c044c41a&gt;] audit_syscall_entry+0x102/0x12c<br>[&lt;c044c6e5&gt;] audit_syscall_exit+0x2a1/0x2bd<br>[&lt;c0409008&gt;] do_syscall_trace+0x121/0x165<br>[&lt;c0403882&gt;] syscall_call+0x7/0xb</p>

<p><br>EAX: f5962c84 EBX: 00000000 ECX: 00000000 EDX: 0000adab<br>ESI: f5962c00 EDI: f44435d0 EBP: f546af04 ESP: f546adf4 <br>DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068<br>CR0: 80050033 CR2: 0822d548 CR3: 35530000 CR4: 000006f0<br>
DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000<br>DR6: ffff0ff0 DR7: 00000400</p>
<p>[&lt;f8bfee69&gt;] ocfs_inode_lock_full+0x33/0x96d [ocfs2]<br>[&lt;f8c06549&gt;] ocfs2_permission+0x0/0xce [ocfs2]<br>[&lt;f8c0655b&gt;] ocfs2_permission+0x12/0xce [ocfs2]<br>[&lt;f8c06549&gt;] ocfs2_permission+0x0/0xce [ocfs2]<br>
[&lt;c047990d&gt;] permission+0xa3/0xef<br>[&lt;c047b0f9&gt;] __link_path_walk+0x11b/0xb02<br>[&lt;f885179b&gt;] do_get_write_access+0x32d/0x366 [jbd]<br>[&lt;c047bb17&gt;] path_walk+0x37/0x70<br>[&lt;c047bdc6&gt;] do_path_lookup+0x122/0x184<br>
[&lt;c047c623&gt;] __user_walk_fd+0x29/0x3a<br>[&lt;c047677f&gt;] vfs_stat_fd+0x15/0x3c<br>[&lt;c0461119&gt;] handle_mm_fault+0x709/0x78f<br>[&lt;c047685b&gt;] sys_stat64+0xf<br>[&lt;c044c41a&gt;] audit_syscall_entry+0x102/0x12c<br>
[&lt;c044c6e5&gt;] audit_syscall_exit+0x2a1/0x2bd<br>[&lt;c0409008&gt;] do_syscall_trace+0x121/0x165<br>[&lt;c0403882&gt;] syscall_call+0x7/0xb<br></p></div>