Your message dated Tue, 10 May 2016 11:19:37 +0100 with message-id <1462875577.2626.6.camel@decadent.org.uk> and subject line Re: Bug#823884: mount crashes via fstab entry has caused the Debian Bug report #823884, regarding mount crashes via fstab entry to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 823884: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823884 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: mount crashes via fstab entry
- From: Gene S <gene_s@powerc.net>
- Date: Mon, 09 May 2016 17:22:37 -0700
- Message-id: <20160510002237.1631.93066.reportbug@gene64>
Package: mount Version: 2.25.2-6 Severity: important Dear Maintainer, -- System Information: Debian Release: 8.4 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.7-ckt9-5 (SMP w/4 CPU cores) Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) Versions of packages mount depends on: ii libc6 2.19-18+deb8u4 ii libmount1 2.25.2-6 ii libselinux1 2.3-2 ii libsmartcols1 2.25.2-6 mount recommends no packages. Versions of packages mount suggests: pn nfs-common <none> -- no debconf information "mount /dvd" crashes, with the following line in /etc/fstab /dev/sr0 /dvd udf,iso9660 user,noauto 0 0 where /dev/sr0 is a cd/dvd drive. A command of the form "mount /dev/sr0 /mnt" works O.K. Debug output to /var/log/kernlog follows, see below... After the mount error exit, an attempt to "mount /dev/sr0 /mnt" fails with "/dev/sr0 already mounted" message. A "umount /dev/sr0" fails with "/dev/sr0 not mounted" message. The sr0 device is now unreachable/unusable until after a system reboot. kernlog (relevant lines) >>> May 9 11:40:51 gene64 vmunix: [326817.943679] BUG: unable to handle kernel paging request at 00000000ffffffff May 9 11:40:51 gene64 vmunix: [326817.943785] IP: [<ffffffffa08619b0>] udf_get_last_session+0x0/0x40 [udf] May 9 11:40:51 gene64 vmunix: [326817.943860] PGD c01ef067 PUD 0 May 9 11:40:51 gene64 vmunix: [326817.943958] Oops: 0002 [#1] SMP May 9 11:40:51 gene64 vmunix: [326817.944055] Modules linked in: udf nvidia_uvm(PO) cp210x usbserial joydev nvidia(PO) ohci_pci ohci_hcd May 9 11:40:51 gene64 vmunix: [326817.944373] CPU: 2 PID: 16969 Comm: mount Tainted: P O 3.16.7-ckt9-5 #5 May 9 11:40:51 gene64 vmunix: [326817.944423] Hardware name: BIOSTAR Group TA970/TA970, BIOS 4.6.4 01/14/2013 May 9 11:40:51 gene64 vmunix: [326817.944465] task: ffff8802250e1890 ti: ffff8800c0120000 task.ti: ffff8800c0120000 May 9 11:40:51 gene64 vmunix: [326817.944515] RIP: 0010:[<ffffffffa08619b0>] [<ffffffffa08619b0>] udf_get_last_session+0x0/0x40 [udf] May 9 11:40:51 gene64 vmunix: [326817.944596] RSP: 0018:ffff8800c0123d70 EFLAGS: 00010246 May 9 11:40:51 gene64 vmunix: [326817.944637] RAX: 00000000ffffffff RBX: ffff8801e97a0580 RCX: 0000000000000428 May 9 11:40:51 gene64 vmunix: [326817.944686] RDX: 000000000000ffff RSI: 0000000000000000 RDI: ffff880209cc2000 May 9 11:40:51 gene64 vmunix: [326817.944735] RBP: ffff880209cc2000 R08: 00000000ffffffff R09: ffff8801e97a0580 May 9 11:40:51 gene64 vmunix: [326817.944784] R10: 0000000000005540 R11: 00000000000001ea R12: 0000000000000000 May 9 11:40:51 gene64 vmunix: [326817.944833] R13: 0000000000000001 R14: ffffffffa0867e50 R15: ffff880226049a40 May 9 11:40:51 gene64 vmunix: [326817.944882] FS: 00007f65bf9a6840(0000) GS:ffff88022ed00000(0000) knlGS:00000000f7707740 May 9 11:40:51 gene64 vmunix: [326817.944931] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b May 9 11:40:51 gene64 vmunix: [326817.944972] CR2: 00000000ffffffff CR3: 0000000016fab000 CR4: 00000000000407a0 May 9 11:40:51 gene64 vmunix: [326817.945021] Stack: May 9 11:40:51 gene64 vmunix: [326817.945059] ffffffffa0868238 ffff880226049b08 ffffffffa0867e50 ffff880226049a40 May 9 11:40:51 gene64 vmunix: [326817.945226] ffffffff811c95e9 ffff88020000ffff ffff8800c0123df0 ffff8800c0123d00 May 9 11:40:51 gene64 vmunix: [326817.945396] 00000000ffffffff ffffffff00000000 ffffffff0000ffff 00000428ffffffff May 9 11:40:51 gene64 vmunix: [326817.945563] Call Trace: May 9 11:40:51 gene64 vmunix: [326817.945605] [<ffffffffa0868238>] ? udf_fill_super+0x3e8/0x630 [udf] May 9 11:40:51 gene64 vmunix: [326817.945648] [<ffffffffa0867e50>] ? udf_load_vrs+0x3c0/0x3c0 [udf] May 9 11:40:51 gene64 vmunix: [326817.945692] [<ffffffff811c95e9>] ? snprintf+0x39/0x40 May 9 11:40:51 gene64 vmunix: [326817.945735] [<ffffffffa0867e50>] ? udf_load_vrs+0x3c0/0x3c0 [udf] May 9 11:40:51 gene64 vmunix: [326817.945778] [<ffffffff810eb2c9>] ? mount_bdev+0x1a9/0x1e0 May 9 11:40:51 gene64 vmunix: [326817.945820] [<ffffffff810ebafc>] ? mount_fs+0xc/0xc0 May 9 11:40:51 gene64 vmunix: [326817.945863] [<ffffffff8110557d>] ? vfs_kern_mount+0x5d/0x110 May 9 11:40:51 gene64 vmunix: [326817.945905] [<ffffffff81107e6f>] ? do_mount+0x1df/0xab0 May 9 11:40:51 gene64 vmunix: [326817.945947] [<ffffffff810bcac3>] ? memdup_user+0x33/0x60 May 9 11:40:51 gene64 vmunix: [326817.945989] [<ffffffff81108a5b>] ? SyS_mount+0x9b/0x110 May 9 11:40:51 gene64 vmunix: [326817.946031] [<ffffffff814d65b2>] ? system_call_fastpath+0x16/0x1b May 9 11:40:51 gene64 vmunix: [326817.946073] Code: 00 00 00 00 00 00 00 50 2e 8b e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 34 8b e0 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 May 9 11:40:51 gene64 vmunix: [326817.948043] RIP [<ffffffffa08619b0>] udf_get_last_session+0x0/0x40 [udf] May 9 11:40:51 gene64 vmunix: [326817.948116] RSP <ffff8800c0123d70> May 9 11:40:51 gene64 vmunix: [326817.948156] CR2: 00000000ffffffff May 9 11:40:51 gene64 vmunix: [326817.948202] ---[ end trace 14afa12cae2b6ff2 ]--- <<<END OF KERNLOG
--- End Message ---
--- Begin Message ---
- To: 823884-done@bugs.debian.org
- Subject: Re: Bug#823884: mount crashes via fstab entry
- From: Ben Hutchings <ben@decadent.org.uk>
- Date: Tue, 10 May 2016 11:19:37 +0100
- Message-id: <1462875577.2626.6.camel@decadent.org.uk>
- In-reply-to: <[🔎] 20160510053433.GA24479@fatal.se>
- References: <20160510002237.1631.93066.reportbug@gene64> <[🔎] 20160510053433.GA24479@fatal.se>
On Tue, 2016-05-10 at 07:34 +0200, Andreas Henriksson wrote: > Control: reassign -1 src:linux > > Hello Gene S. > > Thanks for your bug report. It seems your kernel is crashing > and then all bets are off what happens in userspace. > > Reassigning this bug report.... [...] > > Kernel: Linux 3.16.7-ckt9-5 (SMP w/4 CPU cores) [...] Closing, this isn't a Debian kernel version. Ben. -- Ben Hutchings If you seem to know what you are doing, you'll be given more to do.Attachment: signature.asc
Description: This is a digitally signed message part
--- End Message ---