Debian Bug report logs - #549002
linux-image-2.6.26-2-xen-amd64: Kernel Oops - autofs5 nfs4 mount

version graph

Package: linux-image-2.6.26-2-xen-amd64; Maintainer for linux-image-2.6.26-2-xen-amd64 is (unknown);

Reported by: Christian Salzmann <[email protected]>

Date: Wed, 30 Sep 2009 09:39:03 UTC

Severity: important

Tags: patch, upstream

Found in version linux-2.6/2.6.26-19

Fixed in versions linux-2.6/2.6.31-1~experimental.2, linux-2.6/2.6.26-20

Done: dann frazier <[email protected]>

Bug is archived. No further changes may be made.

Full log


Message #5 received at [email protected] (full text, mbox, reply):

Received: (at submit) by bugs.debian.org; 30 Sep 2009 09:02:41 +0000
From [email protected] Wed Sep 30 09:02:41 2009
X-Spam-Checker-Version: SpamAssassin 3.2.3-bugs.debian.org_2005_01_02
	(2007-08-08) on rietz.debian.org
X-Spam-Level: 
X-Spam-Bayes: score:0.0000 Tokens: new, 277; hammy, 148; neutral, 107; spammy,
	3. spammytokens:0.998-1--pud, 0.998-1--rip, 0.997-1--rax
	hammytokens:0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug,
	0.000-+--H*x:reportbug, 0.000-+--H*UA:reportbug, 0.000-+--H*x:3.48
X-Spam-Status: No, score=-9.6 required=4.0 tests=BAYES_00,FOURLA,
	FVGT_m_MULTI_ODD,HAS_PACKAGE,IMPRONONCABLE_1,IMPRONONCABLE_2,
	MURPHY_WRONG_WORD1,MURPHY_WRONG_WORD2,XMAILER_REPORTBUG autolearn=ham
	version=3.2.3-bugs.debian.org_2005_01_02
Return-path: <[email protected]>
Received: from leibniz.math.fu-berlin.de ([160.45.40.10] helo=mail.math.fu-berlin.de)
	by rietz.debian.org with esmtp (Exim 4.63)
	(envelope-from <[email protected]>)
	id 1Msv57-0004U2-64
	for [email protected]; Wed, 30 Sep 2009 09:02:41 +0000
Received: (qmail 29816 invoked from network); 30 Sep 2009 11:02:38 +0200
Received: from luzin.mi.fu-berlin.de (HELO mi.fu-berlin.de) (160.45.117.148)
  by leibniz.math.fu-berlin.de with SMTP; 30 Sep 2009 11:02:38 +0200
Received: (qmail 24349 invoked by uid 9804); 30 Sep 2009 11:02:38 +0200
Received: from localhost (HELO mi.fu-berlin.de) (127.0.0.1)
  by localhost with SMTP; 30 Sep 2009 11:02:25 +0200
Received: (qmail 24330 invoked by uid 9804); 30 Sep 2009 11:02:25 +0200
Received: from leibniz.math.fu-berlin.de (HELO math.fu-berlin.de) (160.45.40.10)
  by luzin.mi.fu-berlin.de with SMTP; 30 Sep 2009 11:02:25 +0200
Received: (qmail 29792 invoked from network); 30 Sep 2009 11:02:24 +0200
Received: from mintzer.imp.fu-berlin.de (HELO localhost) (160.45.113.19)
  by leibniz.math.fu-berlin.de with SMTP; 30 Sep 2009 09:02:24 -0000
Received: from christian by localhost with local (Exim 4.69)
	(envelope-from <[email protected]>)
	id 1Msv5J-0001ws-RS; Wed, 30 Sep 2009 11:02:53 +0200
X-Envelope-Sender: [email protected]
X-Virus-Scanned: by AMaViS 0.3.12pre7-L41+ClamAV[24333]([email protected])
X-Remote-IP: 160.45.113.19
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Christian Salzmann <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Subject: linux-image-2.6.26-2-xen-amd64: Kernel Oops - autofs5 nfs4 mount
Message-ID: <20090930090253.6431.68951.reportbug@localhost>
X-Mailer: reportbug 3.48
Date: Wed, 30 Sep 2009 11:02:53 +0200
Delivered-To: [email protected]
Package: linux-image-2.6.26-2-xen-amd64
Version: 2.6.26-19
Severity: important


*** /tmp/oops
Sep 30 01:47:02 brandt kernel: [3781133.966073] BUG: unable to handle kernel paging request at ffff8800c7be5000
Sep 30 01:47:02 brandt kernel: [3781133.966082] IP: [<ffffffffa03a936b>] :nfs:nfs4_set_client+0xc3/0x17e
Sep 30 01:47:02 brandt kernel: [3781133.966107] PGD 273e067 PUD 2d42067 PMD 2d80067 PTE 0
Sep 30 01:47:02 brandt kernel: [3781133.966114] Oops: 0000 [1] SMP 
Sep 30 01:47:02 brandt kernel: [3781133.966118] CPU 0 
Sep 30 01:47:02 brandt kernel: [3781133.966121] Modules linked in: des_generic cbc crypto_blkcipher nvidia(P) rfcomm hidp l2cap bluetooth xt_physdev battery ppdev lp autofs4 rpcsec_gss_krb5 nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc 8021q ipv6 bridge xt_multiport nf_conntrack_ipv4 xt_state nf_conntrack xt_tcpudp ipt_LOG iptable_filter ip_tables x_tables loop snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device parport_pc parport snd rng_core i2c_i801 pcspkr psmouse i2c_core serio_raw soundcore iTCO_wdt snd_page_alloc i82975x_edac edac_core button joydev dcdbas evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod ide_cd_mod cdrom usbhid hid ff_memless sd_mod piix ide_pci_generic ide_core ahci ata_generic floppy libata scsi_mod dock ehci_hcd uhci_hcd tg3 thermal processor fan thermal_sys [last unloaded: nvidia]
Sep 30 01:47:02 brandt kernel: [3781133.966235] Pid: 26835, comm: mount.nfs4 Tainted: P          2.6.26-2-xen-amd64 #1
Sep 30 01:47:02 brandt kernel: [3781133.966238] RIP: e030:[<ffffffffa03a936b>]  [<ffffffffa03a936b>] :nfs:nfs4_set_client+0xc3/0x17e
Sep 30 01:47:02 brandt kernel: [3781133.966258] RSP: e02b:ffff880075905ba8  EFLAGS: 00010246
Sep 30 01:47:02 brandt kernel: [3781133.966261] RAX: 0000000000000000 RBX: ffff8800dc50a800 RCX: 0000000000000004
Sep 30 01:47:02 brandt kernel: [3781133.966264] RDX: 0000000000000003 RSI: ffff8800c7be5000 RDI: ffff8800dc50aab0
Sep 30 01:47:02 brandt kernel: [3781133.966267] RBP: 0000000000000000 R08: ffffffffa038b1d0 R09: ffff880072de8400
Sep 30 01:47:02 brandt kernel: [3781133.966271] R10: 0000000000000200 R11: ffffffff80266a43 R12: ffff8800c7be4fe0
Sep 30 01:47:02 brandt kernel: [3781133.966274] R13: 0000000000000001 R14: ffff880074669400 R15: ffff8800762ace80
Sep 30 01:47:02 brandt kernel: [3781133.966280] FS:  00007f12688526e0(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
Sep 30 01:47:02 brandt kernel: [3781133.966283] CS:  e033 DS: 0000 ES: 0000
Sep 30 01:47:02 brandt kernel: [3781133.966286] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Sep 30 01:47:02 brandt kernel: [3781133.966290] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 30 01:47:02 brandt kernel: [3781133.966294] Process mount.nfs4 (pid: 26835, threadinfo ffff880075904000, task ffff8800014a8f80)
Sep 30 01:47:02 brandt kernel: [3781133.966297] Stack:  ffff8800c7be46a0 ffff8800c966a8d8 0000000000000010 ffffffffa03d03a0
Sep 30 01:47:02 brandt kernel: [3781133.966304]  ffff880000000006 ffff8800c966a8d8 ffff880075905ce8 ffff880074669400
Sep 30 01:47:02 brandt kernel: [3781133.966310]  ffff8800c966a800 ffff8800762ace80 ffff8800c966a978 ffffffffa03a9c02
Sep 30 01:47:02 brandt kernel: [3781133.966316] Call Trace:
Sep 30 01:47:02 brandt kernel: [3781133.966341]  [<ffffffffa03a9c02>] :nfs:nfs4_create_server+0xb8/0x3eb
Sep 30 01:47:02 brandt kernel: [3781133.966354]  [<ffffffffa00269ff>] :tg3:tg3_start_xmit+0x35f/0x3d9
Sep 30 01:47:02 brandt kernel: [3781133.966361]  [<ffffffff8020a4ee>] __switch_to+0x3ee/0x624
Sep 30 01:47:02 brandt kernel: [3781133.966370]  [<ffffffff80269409>] get_page_from_freelist+0x405/0x507
Sep 30 01:47:02 brandt kernel: [3781133.966376]  [<ffffffff8030e050>] idr_get_empty_slot+0x15f/0x22b
Sep 30 01:47:02 brandt kernel: [3781133.966383]  [<ffffffff80287298>] cache_alloc_refill+0x59/0x550
Sep 30 01:47:02 brandt kernel: [3781133.966411]  [<ffffffffa03b2c84>] :nfs:nfs4_get_sb+0x3f4/0x594
Sep 30 01:47:02 brandt kernel: [3781133.966430]  [<ffffffff8028c2c3>] vfs_kern_mount+0x93/0x11b
Sep 30 01:47:02 brandt kernel: [3781133.966436]  [<ffffffff8028c39e>] do_kern_mount+0x43/0xdc
Sep 30 01:47:02 brandt kernel: [3781133.966442]  [<ffffffff802a2547>] do_new_mount+0x5b/0x95
Sep 30 01:47:02 brandt kernel: [3781133.966447]  [<ffffffff802a273e>] do_mount+0x1bd/0x1e7
Sep 30 01:47:02 brandt kernel: [3781133.966457]  [<ffffffff8029fdbf>] copy_mount_options+0xc9/0x126
Sep 30 01:47:02 brandt kernel: [3781133.966463]  [<ffffffff802a27f2>] sys_mount+0x8a/0xd0
Sep 30 01:47:02 brandt kernel: [3781133.966468]  [<ffffffff8020b528>] system_call+0x68/0x6d
Sep 30 01:47:02 brandt kernel: [3781133.966473]  [<ffffffff8020b4c0>] system_call+0x0/0x6d
Sep 30 01:47:02 brandt kernel: [3781133.966477] 
Sep 30 01:47:02 brandt kernel: [3781133.966479] 
Sep 30 01:47:02 brandt kernel: [3781133.966480] Code: 48 8b 74 24 68 b9 20 00 00 00 44 89 ea 48 89 c7 e8 93 f8 ff ff 85 c0 89 c5 78 53 fc 48 8d bb 90 02 00 00 b9 0c 00 00 00 4c 89 e6 <f3> a5 48 89 df e8 98 45 02 00 85 c0 89 c5 79 22 f6 05 d3 8a fe 
Sep 30 01:47:02 brandt kernel: [3781133.966513] RIP  [<ffffffffa03a936b>] :nfs:nfs4_set_client+0xc3/0x17e
Sep 30 01:47:02 brandt kernel: [3781133.966526]  RSP <ffff880075905ba8>
Sep 30 01:47:02 brandt kernel: [3781133.966528] CR2: ffff8800c7be5000
Sep 30 01:47:02 brandt kernel: [3781133.966531] ---[ end trace 96fce5bab006ac3c ]---


-- System Information:
Debian Release: 5.0.3
  APT prefers stable
  APT policy: (800, 'stable'), (500, 'proposed-updates'), (90, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-2-xen-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.26-2-xen-amd64 depends on:
ii  initramfs-tools               0.92o      tools for generating an initramfs
ii  linux-modules-2.6.26-2-xen-am 2.6.26-19  Linux 2.6.26 modules on AMD64

linux-image-2.6.26-2-xen-amd64 recommends no packages.

Versions of packages linux-image-2.6.26-2-xen-amd64 suggests:
ii  grub                       0.97-47lenny2 GRand Unified Bootloader (Legacy v
pn  linux-doc-2.6.26           <none>        (no description available)

-- no debconf information




Send a report that this bug log contains spam.


Debian bug tracking system administrator <[email protected]>. Last modified: Sat May 10 02:41:28 2025; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.