NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
rraszews
Jan 04, 2015Aspirant
ReadyNAS 314 nfs issue
Hi, I've been pretty happy with my ReadyNAS since I got it a year ago, but in the past two weeks, everything suddenly started going up the spout. I got my RN314 preinstalled with four seagate 3T...
rraszews
Jan 07, 2015Aspirant
To complicate the matter, I just got another kernel oops while deleting snapshots:
I notice the call trace for this one is a bit different; usually the top of the stack is __d_lookup, this time it's getname_flags.
after this, the frontview wouldn't reload until I rebooted.
general protection fault: 0000 [#1] SMP
CPU 2
Modules linked in: ir_rc6_decoder ir_rc5_decoder ir_nec_decoder ite_cir rc_core rn_gpio vpd(P)
Pid: 12863, comm: snapperd Tainted: P 3.0.101.RNx86_64.3 #1 NETGEAR ReadyNAS 314 /ReadyNAS 314
(...)
Call Trace:
[<ffffffff880e3fd8>] ? getname_flags+0x38/0x220
[<ffffffff880f0594>] d_lookup+0x34/0x60
[<ffffffff880e4434>] __lookup_hash+0x94/0x1a0
[<ffffffff880e7005>] ? user_path_parent+0x55/0x90
[<ffffffff880e4554>] lookup_hash+0x14/0x20
[<ffffffff880e71ff>] do_unlinkat+0xaf/0x230
[<ffffffff880dae14>] ? fput+0x164/0x210
[<ffffffff880d6ee5>] ? filp_close+0x65/0xa0
[<ffffffff880e8986>] sys_unlinkat+0x16/0x40
[<ffffffff8888c1fb>] system_call_fastpath+0x16/0x1b
I notice the call trace for this one is a bit different; usually the top of the stack is __d_lookup, this time it's getname_flags.
after this, the frontview wouldn't reload until I rebooted.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!