Bugzilla – Attachment 64766 Details for
Bug 145204
dmapi seems to break xfs
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
NULL pointer dereference in xfs_buf_rele
oops (text/plain), 3.13 KB, created by
Andreas Gruenbacher
on 2006-01-24 15:23:39 UTC
(
hide
)
Description:
NULL pointer dereference in xfs_buf_rele
Filename:
MIME Type:
Creator:
Andreas Gruenbacher
Created:
2006-01-24 15:23:39 UTC
Size:
3.13 KB
patch
obsolete
>dmapi: module not supported by Novell, setting U taint flag. >SGI XFS with ACLs, security attributes, realtime, large block numbers, dmapi support, no debug enabled >XFS mounting filesystem hda2 >Unable to handle kernel NULL pointer dereference at virtual address 0000000c > printing eip: >c01ae89e >*pde = 00000000 >Oops: 0000 [#1] >Modules linked in: xfs exportfs dmapi dm_snapshot dm_mod multipath raid6 raid5 xor raid1 raid0 parport_pc parport e1000 piix fan thermal processor pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core usb_storage uhci_hcd usbhid ehci_hcd usbcore loop ide_disk nfs nfs_acl lockd sunrpc cramfs vfat fat nls_iso8859_1 nls_cp437 af_packet nvram edd sg st sd_mod sr_mod scsi_mod ide_cd cdrom ide_core >CPU: 0 >EIP: 0060:[<c01ae89e>] Tainted: G U VLI >EFLAGS: 00010202 (2.6.16-rc1-git3-3-default) >EIP is at _raw_spin_lock+0x5/0xcd >eax: 00000008 ebx: 00000008 ecx: 00000001 edx: 00000008 >esi: 00000008 edi: dffbcbd0 ebp: 00000000 esp: eecf1ae4 >ds: 007b es: 007b ss: 0068 >Process mount (pid: 3555, threadinfo=eecf0000 task=eec85570) >Stack: <0>eed723d8 00000008 dffbcbd0 c01aa521 eed7237c 00000008 f95110a1 eed7237c > 00000200 f9511cab c02d6a84 c02d6aac 00000000 00c00fa1 00000000 00000000 > 00000000 00000001 00000000 00000004 eecd8000 00000000 eed7237c df803b00 >Call Trace: > [<c01aa521>] _atomic_dec_and_lock+0xd/0x2c > [<f95110a1>] xfs_buf_rele+0x14/0x6b [xfs] > [<f9511cab>] xfs_buf_iorequest+0x38b/0x395 [xfs] > [<c014bbd7>] cache_alloc_debugcheck_after+0x2d/0xea > [<f950de33>] xfsbdstrat+0x23/0x27 [xfs] > [<f94f5156>] xlog_bread+0x8f/0xc6 [xfs] > [<f94f84b6>] xlog_find_tail+0x3f/0xa5f [xfs] > [<c014bc62>] cache_alloc_debugcheck_after+0xb8/0xea > [<c014cc43>] kmem_cache_alloc+0x70/0x79 > [<c014c92b>] cache_alloc_refill+0x2f9/0x4f0 > [<c014c7fa>] cache_alloc_refill+0x1c8/0x4f0 > [<f95107cc>] _xfs_buf_initialize+0x13e/0x159 [xfs] > [<f94f8eeb>] xlog_recover+0x15/0x20a [xfs] > [<f9510dee>] xfs_buf_get_empty+0x2a/0x33 [xfs] > [<f94f4df1>] xfs_log_mount+0x54c/0x58f [xfs] > [<f94faba8>] xfs_mountfs+0xacf/0xef3 [xfs] > [<c01aa521>] _atomic_dec_and_lock+0xd/0x2c > [<f95110a1>] xfs_buf_rele+0x14/0x6b [xfs] > [<f9512325>] kmem_alloc+0x4a/0xa2 [xfs] > [<f9501708>] xfs_mount+0x771/0x839 [xfs] > [<f9500f97>] xfs_mount+0x0/0x839 [xfs] > [<f950fdaf>] vfs_mount+0x17/0x1a [xfs] > [<f950fc5a>] linvfs_fill_super+0x76/0x1b4 [xfs] > [<c01ad731>] snprintf+0x1c/0x1f > [<c017e413>] disk_name+0x56/0x60 > [<c0154f08>] get_sb_bdev+0xd5/0x111 > [<c014cbca>] __kmalloc+0xa8/0xb1 > [<c0165f29>] alloc_vfsmnt+0x97/0xbe > [<c0165f29>] alloc_vfsmnt+0x97/0xbe > [<f950f1ed>] linvfs_get_sb+0xe/0x11 [xfs] > [<f950fbe4>] linvfs_fill_super+0x0/0x1b4 [xfs] > [<c0154d04>] do_kern_mount+0x86/0x12e > [<c01670ab>] do_mount+0x66c/0x6c6 > [<c0125cbc>] __rcu_process_callbacks+0x7e/0x131 > [<c011c2a7>] tasklet_action+0x37/0x57 > [<c01395c0>] get_page_from_freelist+0x6f/0x2c4 > [<c016617d>] copy_mount_options+0x26/0x109 > [<c0167169>] sys_mount+0x64/0x97 > [<c0102a99>] syscall_call+0x7/0xb >Code: 08 00 74 0c ba f4 5f 2a c0 89 d8 e8 bc fe ff ff c7 43 0c ff ff ff ff c7 43 08 ff ff ff ff c7 03 01 00 00 00 5b c3 57 56 53 89 c3 <81> 78 04 ad 4e ad de 74 0a ba de 5f 2a c0 e8 8e fe ff ff 8b 53
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
Attachments on
bug 145204
: 64766 |
65575