[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#270779: marked as done (kernel-source-2.6.8: Can't mount /home nfs?)



Your message dated Thu, 9 Sep 2004 12:40:53 +0100
with message-id <20040909114053.GS642@parcelfarce.linux.theplanet.co.uk>
and subject line Bug#270779: kernel-source-2.6.8: Can't mount /home nfs?
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Sep 2004 09:08:38 +0000
>From shaulk@013.net Thu Sep 09 02:08:38 2004
Return-path: <shaulk@013.net>
Received: from mtain2.barak.net.il [212.150.49.73] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1C5Kuz-0002VH-00; Thu, 09 Sep 2004 02:08:37 -0700
Received: from rakefet ([82.166.9.178])
 by mtain2.barak.net.il (Sun Java System Messaging Server 6.1 HotFix 0.01
 (built Jun 24 2004)) with ESMTP id <0I3R00E7WO6XUWY0@mtain2.barak.net.il> for
 submit@bugs.debian.org; Thu, 09 Sep 2004 12:11:22 +0300 (IDT)
Received: from shaul by rakefet with local (Exim 4.34)
	id 1C5KuS-0000Es-IH; Thu, 09 Sep 2004 12:08:04 +0300
Date: Thu, 09 Sep 2004 12:08:04 +0300
From: Shaul Karl <shaulk@013.net>
Subject: kernel-source-2.6.8: Can't mount /home nfs?
Sender: Shaul Karl <shaulk@013.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Message-id: <[🔎] E1C5KuS-0000Es-IH@rakefet>
MIME-version: 1.0
X-Mailer: reportbug 2.63
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-5
Severity: normal

1) I got these sources by patching pristine Linux source with
   kernel-patch-debian-2.6.8-5. I do hope I got the same source that is
   provided by kernel-source-2.6.8-5.
2) 2.6.8-2 is working. nfs is pretty much unusable, but not to the extent
   that is demonstared below by 2.6.8-5.
3) In contrast to 2.6.8-2, when I booted 2.6.8-5 for the first time and
   then ssh -X from another machine, I got:

   Unable to handle kernel NULL pointer dereference at virtual address 00000014
    printing eip:
   *pde = 00000000
   Oops: 0002 [#1]
   Modules linked in: ppp_deflate zlib_deflate bsd_comp ppp_async crc_ccitt ne2k_pci ppp_generic slhc af_packet nfs lockd sunrpc ne 8390 crc32 3c59x ipt_multiport ipt_LOG ipt_limit ipt_state ipt_mac iptable_filter ipt_MASQUERADE ipt_REDIRECT ip_nat_ftp iptable_nat ip_tables ip_conntrack_ftp ip_conntrack dm_mod rtc ide_cd cdrom ext3 jbd ide_generic ide_disk generic ide_core unix ext2 mbcache
   CPU:    0
   EIP:    0060:[<c89b2765>]    Not tainted
   EFLAGS: 00010246   (2.6.8-5.pentium1.1) 
   EIP is at nfs3_request_init+0x15/0x20 [nfs]
   eax: 00000000   ebx: c5d76620   ecx: c6119100   edx: c76fa804
   esi: c10bbe80   edi: c5d76620   ebp: c63b2000   esp: c63b3c28
   ds: 007b   es: 007b   ss: 0068
   Process xauth (pid: 709, threadinfo=c63b2000 task=c65dd240)
   Stack: c5d76620 c89aba3c c5d76620 c6119100 c7dcc800 c76fa804 00000000 00000001 
          00000004 c10bbe80 0000009b c76fa804 00000000 c89ae1d8 c6119100 c76fa804 
          c10bbe80 00000000 0000009b c63b3d0c c63b3d0c c10bbe98 c10bbe80 c63b3db8 
   Call Trace:
    [<c89aba3c>] nfs_create_request+0x9c/0xd0 [nfs]
    [<c89ae1d8>] readpage_async_filler+0x58/0x100 [nfs]
    [<c0130290>] read_cache_pages+0xb0/0x130
    [<c8954c95>] rpc_release_task+0xe5/0x160 [sunrpc]
    [<c8954715>] __rpc_execute+0x315/0x3b0 [sunrpc]
    [<c0114070>] autoremove_wake_function+0x0/0x40
    [<c0113444>] __wake_up+0x14/0x20
    [<c0114070>] autoremove_wake_function+0x0/0x40
    [<c89ae2cb>] nfs_readpages+0x4b/0xa0 [nfs]
    [<c89ae180>] readpage_async_filler+0x0/0x100 [nfs]
    [<c013041f>] read_pages+0x10f/0x120
    [<c012d9f3>] buffered_rmqueue+0xe3/0x190
    [<c012db4f>] __alloc_pages+0xaf/0x320
    [<c012dce3>] __alloc_pages+0x243/0x320
    [<c013066e>] do_page_cache_readahead+0xbe/0x130
    [<c01307cf>] page_cache_readahead+0xef/0x1d0
    [<c012a6a0>] do_generic_mapping_read+0x90/0x3d0
    [<c012ac68>] __generic_file_aio_read+0x1a8/0x1e0
    [<c012a9e0>] file_read_actor+0x0/0xe0
    [<c012b1cc>] filemap_nopage+0x1dc/0x330
    [<c012ace1>] generic_file_aio_read+0x41/0x60
    [<c89a7586>] nfs_file_read+0x86/0xc0 [nfs]
    [<c0142926>] do_sync_read+0x76/0xb0
    [<c0138a84>] do_mmap_pgoff+0x524/0x660
    [<c01429ec>] vfs_read+0x8c/0xd0
    [<c0142bed>] sys_read+0x3d/0x70
    [<c01055c7>] syscall_call+0x7/0xb
   Code: ff 40 14 89 43 18 5b c3 8d 76 00 8b 4c 24 04 8b 51 0c 3b 54 


4) Not sure why the eip value is not printed above. Could be due to a
   serial communucation problem. I don't know how important that is.
   Shortly afterwards I tried to ssh again, this time without `-X':

     <1>Unable to handle kernel NULL pointer dereference at virtual address 00000014
     printing eip:
    c89b2765
    *pde = 00000000
    Oops: 0002 [#2]
    Modules linked in: ppp_deflate zlib_deflate bsd_comp ppp_async crc_ccitt ne2k_pci ppp_generic slhc af_packet nfs lockd sunrpc ne 8390 crc32 3c59x ipt_multiport ipt_LOG ipt_limit ipt_state ipt_mac iptable_filter ipt_MASQUERADE ipt_REDIRECT ip_nat_ftp iptable_nat ip_tables ip_conntrack_ftp ip_conntrack dm_mod rtc ide_cd cdrom ext3 jbd ide_generic ide_disk generic ide_core unix ext2 mbcache
    CPU:    0
    EIP:    0060:[<c89b2765>]    Not tainted
    EFLAGS: 00010246   (2.6.8-5.pentium1.1) 
    EIP is at nfs3_request_init+0x15/0x20 [nfs]
    eax: 00000000   ebx: c5d765c0   ecx: c667b6a0   edx: c76faa44
    esi: c10bbec0   edi: c5d765c0   ebp: c649e000   esp: c649fc28
    ds: 007b   es: 007b   ss: 0068
    Process bash (pid: 708, threadinfo=c649e000 task=c6a5ac50)
    Stack: c5d765c0 c89aba3c c5d765c0 c667b6a0 c7dcc800 c76faa44 00000000 00000001 
           00000004 c10bbec0 000001fa c76faa44 00000000 c89ae1d8 c667b6a0 c76faa44 
           c10bbec0 00000000 000001fa c649fd0c c649fd0c c10bbed8 c10bbec0 c649fdb8 
    Call Trace:
     [<c89aba3c>] nfs_create_request+0x9c/0xd0 [nfs]
     [<c89ae1d8>] readpage_async_filler+0x58/0x100 [nfs]
     [<c0130290>] read_cache_pages+0xb0/0x130
     [<c8954c95>] rpc_release_task+0xe5/0x160 [sunrpc]
     [<c8954715>] __rpc_execute+0x315/0x3b0 [sunrpc]
     [<c0114070>] autoremove_wake_function+0x0/0x40
     [<c89aa9d0>] nfs_alloc_inode+0x10/0x50 [nfs]
     [<c0114070>] autoremove_wake_function+0x0/0x40
     [<c89ae2cb>] nfs_readpages+0x4b/0xa0 [nfs]
     [<c89ae180>] readpage_async_filler+0x0/0x100 [nfs]
     [<c013041f>] read_pages+0x10f/0x120
     [<c012d9f3>] buffered_rmqueue+0xe3/0x190
     [<c012db4f>] __alloc_pages+0xaf/0x320
     [<c012dce3>] __alloc_pages+0x243/0x320
     [<c013066e>] do_page_cache_readahead+0xbe/0x130
     [<c01307cf>] page_cache_readahead+0xef/0x1d0
     [<c012a6a0>] do_generic_mapping_read+0x90/0x3d0
     [<c012ac68>] __generic_file_aio_read+0x1a8/0x1e0
     [<c012a9e0>] file_read_actor+0x0/0xe0
     [<c012ace1>] generic_file_aio_read+0x41/0x60
     [<c89a7586>] nfs_file_read+0x86/0xc0 [nfs]
     [<c0142926>] do_sync_read+0x76/0xb0
     [<c014ac0b>] sys_fstat64+0x2b/0x30
     [<c01429ec>] vfs_read+0x8c/0xd0
     [<c0142bed>] sys_read+0x3d/0x70
     [<c01055c7>] syscall_call+0x7/0xb
    Code: ff 40 14 89 43 18 5b c3 8d 76 00 8b 4c 24 04 8b 51 0c 3b 54 


5) Only /home is mounted nfs. No user has logged in before those ssh
   attempts. The attempts to ssh were carried away by a regular user,
   not root.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (50, 'unstable')
Architecture: i386 (i586)
Kernel: Linux 2.6.8-2.pentium1.1
Locale: LANG=C, LC_CTYPE=C

---------------------------------------
Received: (at 270779-close) by bugs.debian.org; 9 Sep 2004 11:40:55 +0000
>From willy@www.linux.org.uk Thu Sep 09 04:40:55 2004
Return-path: <willy@www.linux.org.uk>
Received: from parcelfarce.linux.theplanet.co.uk (www.linux.org.uk) [195.92.249.252] (93)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1C5NIN-0002oB-00; Thu, 09 Sep 2004 04:40:55 -0700
Received: from willy by www.linux.org.uk with local (Exim 4.33)
	id 1C5NIL-0001dK-AS; Thu, 09 Sep 2004 12:40:53 +0100
Date: Thu, 9 Sep 2004 12:40:53 +0100
From: Matthew Wilcox <willy@debian.org>
To: Shaul Karl <shaulk@013.net>, 270779-close@bugs.debian.org
Subject: Re: Bug#270779: kernel-source-2.6.8: Can't mount /home nfs?
Message-ID: <20040909114053.GS642@parcelfarce.linux.theplanet.co.uk>
References: <[🔎] E1C5KuS-0000Es-IH@rakefet>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[🔎] E1C5KuS-0000Es-IH@rakefet>
User-Agent: Mutt/1.4.1i
Sender: <willy@www.linux.org.uk>
Delivered-To: 270779-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=HAS_BUG_NUMBER autolearn=no 
	version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

On Thu, Sep 09, 2004 at 12:08:04PM +0300, Shaul Karl wrote:
> Package: kernel-source-2.6.8
> Version: 2.6.8-5
> Severity: normal
> 
> 1) I got these sources by patching pristine Linux source with
>    kernel-patch-debian-2.6.8-5. I do hope I got the same source that is
>    provided by kernel-source-2.6.8-5.

I doubt it.  Looks to me like you're missing the two-line fix that went
into 2.6.8.1.  What makes you think it's reasonable to use something
entirely different from the package we provide, then report a bug into
our bug tracking system?

-- 
"Next the statesmen will invent cheap lies, putting the blame upon 
the nation that is attacked, and every man will be glad of those
conscience-soothing falsities, and will diligently study them, and refuse
to examine any refutations of them; and thus he will by and by convince 
himself that the war is just, and will thank God for the better sleep 
he enjoys after this process of grotesque self-deception." -- Mark Twain



Reply to: