From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sun, 23 Feb 2003 14:25:55 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sun, 23 Feb 2003 14:25:55 -0500 Received: from port326.ds1-brh.adsl.cybercity.dk ([217.157.160.207]:1904 "EHLO mail.jaquet.dk") by vger.kernel.org with ESMTP id ; Sun, 23 Feb 2003 14:25:51 -0500 Date: Sun, 23 Feb 2003 20:35:27 +0100 From: Rasmus Andersen To: linux-kernel@vger.kernel.org Subject: 2.5.62 and NFS, a BUG Message-ID: <20030223203526.A16183@jaquet.dk> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol="application/pgp-signature"; boundary="qMm9M+Fa2AknHoGS" Content-Disposition: inline User-Agent: Mutt/1.2.5.1i X-PGP-Key: http://www.jaquet.dk/rasmus/pubkey.asc X-PGP-Fingerprint: 925A 8E4B 6D63 1C22 BFB9 29CF 9592 4049 9E9E 26CE Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org --qMm9M+Fa2AknHoGS Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, I just booted 2.5.62 and got the following during boot/init: Unable to handle kernel NULL pointer dereference at virtual address 00000286 printing eip: c0183e11 *pde =3D 00000000 Oops: 0000 CPU: 0 EIP: 0060:[] Not tainted EFLAGS: 00010203 EIP is at d_alloc+0x51/0x370 eax: 00000286 ebx: ca271e4c ecx: 000000a1 edx: caa1780c esi: 00000286 edi: caa1780c ebp: ca2f7c04 esp: ca2f7b7c ds: 007b es: 007b ss: 0068 Process mount (pid: 224, threadinfo=3Dca2f6000 task=3Dca89f320) Stack: 0000029c 000000d0 00000038 00000000 cbf57148 ca2f6000 ca2f6000 00000= 800=20 00000000 00000286 cbfef350 00000286 00000000 ca274d48 ca22e724 ca2f7= c04=20 fffffff4 ca274d48 ca22e724 ca2f7c04 c01790a9 ca22e724 ca2f7c04 00000= 000=20 Call Trace: [] lookup_hash+0x89/0xd0 [] rpc_rmdir+0x93/0xe0 [] rpc_destroy_client+0x29/0x80 [] rpc_release_task+0x2af/0x4b0 [] call_decode+0xde/0x1d0 [] __rpc_execute+0x514/0x5b0 [] rpcauth_bindcred+0x83/0xd0 [] default_wake_function+0x0/0x20 [] rpc_call_sync+0xbd/0x100 [] rpc_run_timer+0x0/0x1f0 [] rpc_register+0xc5/0x140 [] handle_vm86_fault+0x50/0x8e0 [] svc_register+0x26e/0x2e0 [] kmalloc+0x95/0xd0 [] svc_create+0x10d/0x120 [] lockd_up+0x73/0x180 [] nfs_fill_super+0x35f/0x3f0 [] sget+0x242/0x300 [] kmem_cache_alloc+0x71/0xa0 [] nfs_get_sb+0x1ac/0x240 [] do_kern_mount+0x5b/0xd0 [] do_add_mount+0xa0/0x1b0 [] do_mount+0x160/0x1b0 [] copy_mount_options+0xda/0xe0 [] sys_mount+0xb6/0xf0 [] syscall_call+0x7/0xb Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 45 04 c6 04 10 00=20 =20 Should further elaborations, ksymoops runs or such like be required, let me know. I am open for testing patches. Regards, Rasmus --qMm9M+Fa2AknHoGS Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.0 (GNU/Linux) iD8DBQE+WSJ+lZJASZ6eJs4RAik+AKCeWZKwILNDQMem6o2L04P1T7Q+3ACeIpLB aJZFjIF8hCrX+jnakb/NWsI= =tdK7 -----END PGP SIGNATURE----- --qMm9M+Fa2AknHoGS--