[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#631574: Oops while trying to mount installer CD-ROM



Package: linux-2.6
Version: 2.6.39-2
Severity: important

Hello,

I was testing today's sparc daily d-i build and noticed that the 
kernel oopses during pkgsel stage, while trying to mount the installer 
CD:

[ 2124.205340] Unable to handle kernel NULL pointer dereference
[ 2124.308334] tsk->{mm,active_mm}->context = 0000000000001c74
[ 2124.410818] tsk->{mm,active_mm}->pgd = fffff8007c422000
[ 2124.509451]               \|/ ____ \|/
[ 2124.509455]               "@'/ .. \`@"
[ 2124.509460]               /_| \__/ |_\
[ 2124.509464]                  \__U_/
[ 2124.509475] mount(8477): Oops [#1]
[ 2124.509490] TSTATE: 0000004411001601 TPC: 0000000000529774 TNPC: 0000000000529778 Y: 00000000    Not tainted
[ 2124.509521] TPC: <blkdev_get+0x26c/0x2e0>
[ 2124.509532] g0: fffff8007e008c60 g1: fffff80000004fe0 g2: fffffffffffffff6 g3: bf807fdec0102800
[ 2124.509545] g4: fffff8007c549860 g5: 000000000000ff00 g6: fffff8007bbc8000 g7: 00000000008d77c8
[ 2124.509557] o0: fffff80000004fe0 o1: fffff8007d8040a0 o2: 0000000000000000 o3: fffff8007783d748
[ 2124.509570] o4: 0000000000000000 o5: 0000000000000000 sp: fffff8007bbcb081 ret_pc: 000000000052976c
[ 2124.509585] RPC: <blkdev_get+0x264/0x2e0>
[ 2124.509595] l0: fffff8007d804060 l1: ffffffffffffffe2 l2: fffff8007d804078 l3: 0000000000000000
[ 2124.509608] l4: 000000000047635c l5: 0000000000527fa8 l6: fffff8007d8040a0 l7: 000000000053903c
[ 2124.509621] i0: fffff8007d804060 i1: 0000000000000083 i2: 00000000101c7d78 i3: 0000000000000001
[ 2124.509634] i4: 0000000000000006 i5: 0000000001f7ffff i6: fffff8007bbcb161 i7: 00000000005298e0
[ 2124.509649] I7: <blkdev_get_by_path+0x1c/0x6c>
[ 2124.509656] Call Trace:
[ 2124.509668]  [00000000005298e0] blkdev_get_by_path+0x1c/0x6c
[ 2124.509688]  [00000000005020a8] mount_bdev+0x20/0x194
[ 2124.509701]  [0000000000501b44] mount_fs+0x64/0x170
[ 2124.509713]  [0000000000518338] vfs_kern_mount+0x48/0x90
[ 2124.509724]  [00000000005183c0] do_kern_mount+0x24/0xbc
[ 2124.509734]  [0000000000518b78] do_mount+0x720/0x784
[ 2124.509748]  [0000000000539204] compat_sys_mount+0x1c8/0x204
[ 2124.509768]  [0000000000405fd4] linux_sparc_syscall32+0x34/0x40
[ 2124.509778] Disabling lock debugging due to kernel taint
[ 2124.509792] Caller[00000000005298e0]: blkdev_get_by_path+0x1c/0x6c
[ 2124.509805] Caller[00000000005020a8]: mount_bdev+0x20/0x194
[ 2124.509818] Caller[0000000000501b44]: mount_fs+0x64/0x170
[ 2124.509829] Caller[0000000000518338]: vfs_kern_mount+0x48/0x90
[ 2124.509840] Caller[00000000005183c0]: do_kern_mount+0x24/0xbc
[ 2124.509851] Caller[0000000000518b78]: do_mount+0x720/0x784
[ 2124.509862] Caller[0000000000539204]: compat_sys_mount+0x1c8/0x204
[ 2124.509875] Caller[0000000000405fd4]: linux_sparc_syscall32+0x34/0x40
[ 2124.509892] Caller[00000000000138e4]: 0x138e4
[ 2124.509899] Instruction DUMP: 90042040  7ffd32f2  92102000 <c404e260> 80a00011  82603fff  8530a008  80888001  0248000b 

It appears that it has been already fixed upstream:

http://www.spinics.net/lists/stable-commits/msg12520.html

Best regards,
-- 
Jurij Smakov                                           jurij@wooyd.org
Key: http://www.wooyd.org/pgpkey/                      KeyID: C99E03CC



Reply to: