Bug#631574: Oops while trying to mount installer CD-ROM
Package: linux-2.6
Version: 2.6.39-2
Severity: important
Hello,
I was testing today's sparc daily d-i build and noticed that the
kernel oopses during pkgsel stage, while trying to mount the installer
CD:
[ 2124.205340] Unable to handle kernel NULL pointer dereference
[ 2124.308334] tsk->{mm,active_mm}->context = 0000000000001c74
[ 2124.410818] tsk->{mm,active_mm}->pgd = fffff8007c422000
[ 2124.509451] \|/ ____ \|/
[ 2124.509455] "@'/ .. \`@"
[ 2124.509460] /_| \__/ |_\
[ 2124.509464] \__U_/
[ 2124.509475] mount(8477): Oops [#1]
[ 2124.509490] TSTATE: 0000004411001601 TPC: 0000000000529774 TNPC: 0000000000529778 Y: 00000000 Not tainted
[ 2124.509521] TPC: <blkdev_get+0x26c/0x2e0>
[ 2124.509532] g0: fffff8007e008c60 g1: fffff80000004fe0 g2: fffffffffffffff6 g3: bf807fdec0102800
[ 2124.509545] g4: fffff8007c549860 g5: 000000000000ff00 g6: fffff8007bbc8000 g7: 00000000008d77c8
[ 2124.509557] o0: fffff80000004fe0 o1: fffff8007d8040a0 o2: 0000000000000000 o3: fffff8007783d748
[ 2124.509570] o4: 0000000000000000 o5: 0000000000000000 sp: fffff8007bbcb081 ret_pc: 000000000052976c
[ 2124.509585] RPC: <blkdev_get+0x264/0x2e0>
[ 2124.509595] l0: fffff8007d804060 l1: ffffffffffffffe2 l2: fffff8007d804078 l3: 0000000000000000
[ 2124.509608] l4: 000000000047635c l5: 0000000000527fa8 l6: fffff8007d8040a0 l7: 000000000053903c
[ 2124.509621] i0: fffff8007d804060 i1: 0000000000000083 i2: 00000000101c7d78 i3: 0000000000000001
[ 2124.509634] i4: 0000000000000006 i5: 0000000001f7ffff i6: fffff8007bbcb161 i7: 00000000005298e0
[ 2124.509649] I7: <blkdev_get_by_path+0x1c/0x6c>
[ 2124.509656] Call Trace:
[ 2124.509668] [00000000005298e0] blkdev_get_by_path+0x1c/0x6c
[ 2124.509688] [00000000005020a8] mount_bdev+0x20/0x194
[ 2124.509701] [0000000000501b44] mount_fs+0x64/0x170
[ 2124.509713] [0000000000518338] vfs_kern_mount+0x48/0x90
[ 2124.509724] [00000000005183c0] do_kern_mount+0x24/0xbc
[ 2124.509734] [0000000000518b78] do_mount+0x720/0x784
[ 2124.509748] [0000000000539204] compat_sys_mount+0x1c8/0x204
[ 2124.509768] [0000000000405fd4] linux_sparc_syscall32+0x34/0x40
[ 2124.509778] Disabling lock debugging due to kernel taint
[ 2124.509792] Caller[00000000005298e0]: blkdev_get_by_path+0x1c/0x6c
[ 2124.509805] Caller[00000000005020a8]: mount_bdev+0x20/0x194
[ 2124.509818] Caller[0000000000501b44]: mount_fs+0x64/0x170
[ 2124.509829] Caller[0000000000518338]: vfs_kern_mount+0x48/0x90
[ 2124.509840] Caller[00000000005183c0]: do_kern_mount+0x24/0xbc
[ 2124.509851] Caller[0000000000518b78]: do_mount+0x720/0x784
[ 2124.509862] Caller[0000000000539204]: compat_sys_mount+0x1c8/0x204
[ 2124.509875] Caller[0000000000405fd4]: linux_sparc_syscall32+0x34/0x40
[ 2124.509892] Caller[00000000000138e4]: 0x138e4
[ 2124.509899] Instruction DUMP: 90042040 7ffd32f2 92102000 <c404e260> 80a00011 82603fff 8530a008 80888001 0248000b
It appears that it has been already fixed upstream:
http://www.spinics.net/lists/stable-commits/msg12520.html
Best regards,
--
Jurij Smakov jurij@wooyd.org
Key: http://www.wooyd.org/pgpkey/ KeyID: C99E03CC
Reply to: