Bug 10684 - BUG: unable to handle kernel paging request at 00000000128e7000
Summary: BUG: unable to handle kernel paging request at 00000000128e7000
Status: CLOSED DUPLICATE of bug 10594
Alias: None
Product: File System
Classification: Unclassified
Component: v9fs (show other bugs)
Hardware: All Linux
: P1 blocking
Assignee: Eric Van Hensbergen
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-05-12 07:11 UTC by gvs
Modified: 2010-01-28 14:58 UTC (History)
0 users

See Also:
Kernel Version: 2.6.25.3
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description gvs 2008-05-12 07:11:28 UTC
Latest working kernel version: 2.6.24
Earliest failing kernel version: 2.6.25
Distribution: debian
Hardware Environment: amd64, smp preempt
Software Environment:
Problem Description:
BUG: unable to handle kernel paging request at 00000000128e7000
IP: [<00000000128e7000>]
PGD 13e5c6067 PUD 13f29d067 PMD 0 
Oops: 0010 [1] PREEMPT SMP 
CPU 1 
Modules linked in: 9p 9pnet nf_conntrack_ipv6 ip6table_filter ip6_tables ipv6 nf_conntrack_ipv4 xt_state nf_conn
track xt_tcpudp iptable_filter ip_tables x_tables nls_cp437 vfat fat nls_iso8859_1 ntfs fuse dm_crypt crypto_blk
cipher tun bridge llc kvm_amd kvm w83627ehf hwmon_vid dm_mirror dm_mod k8temp hwmon pcspkr
Pid: 1852, comm: mount Not tainted 2.6.25.3 #2
RIP: 0010:[<00000000128e7000>]  [<00000000128e7000>]
RSP: 0018:ffff810131259c00  EFLAGS: 00010286
RAX: ffffffff8060f200 RBX: ffffffffffffffa3 RCX: 00000000ffffffff
RDX: 0000000000000000 RSI: ffffffff8814772a RDI: ffffffff8060f200
RBP: ffff8101311d2900 R08: 0000000000000000 R09: ffff81013fc24ee0
R10: ffff81013fc24ed0 R11: 0000000000000000 R12: ffff8101311d2900
R13: ffff810131259c80 R14: ffff810131259c48 R15: 0000000000000000
FS:  00007ff9a38b3780(0000) GS:ffff81013fc77ec0(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000128e7000 CR3: 000000013e439000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 1852, threadinfo ffff810131258000, task ffff81013f10d040)
Stack:  ffffffff88143540 ffffffffffffffa3 ffff8101311d2900 ffffffffffffffa3
 ffffffff881438a0 ffff810131260000 ffffffff80289cd1 ffff81013febd000
 ffff81013fcbd000 ffff81013db11406 ffff81013db11409 ffff81013fc24f00
Call Trace:
 [<ffffffff88143540>] ? :9pnet:p9_client_destroy+0x20/0xc0
 [<ffffffff881438a0>] ? :9pnet:p9_client_create+0x1f0/0x390
 [<ffffffff80289cd1>] ? cache_alloc_refill+0x191/0x570
 [<ffffffff8031df10>] ? match_token+0x80/0x200
 [<ffffffff8815255d>] ? :9p:v9fs_session_init+0x13d/0x3d0
 [<ffffffff80289cd1>] ? cache_alloc_refill+0x191/0x570
 [<ffffffff881501ae>] ? :9p:v9fs_get_sb+0x8e/0x280
 [<ffffffff80290aa6>] ? vfs_kern_mount+0x56/0xc0
 [<ffffffff80290b73>] ? do_kern_mount+0x53/0x110
 [<ffffffff802a824b>] ? do_new_mount+0x9b/0xe0
 [<ffffffff802a8466>] ? do_mount+0x1d6/0x210
 [<ffffffff8026cf40>] ? __get_free_pages+0x80/0x90
 [<ffffffff802a853b>] ? sys_mount+0x9b/0x100
 [<ffffffff8020b4fb>] ? system_call_after_swapgs+0x7b/0x80


Code:  Bad RIP value.
RIP  [<00000000128e7000>]
 RSP <ffff810131259c00>
CR2: 00000000128e7000
---[ end trace f9c8cca6abde0d8c ]---

Steps to reproduce:
mount -t 9p  204.178.31.8 /mnt/9 -o trans=tcp
Comment 1 Eric Van Hensbergen 2008-05-12 07:24:08 UTC
You need to make sure you load 9pnet_fd as well.

There is a fix in my current development tree that will be submitted to Linus this week.

Thank you for submitting the bug.


*** This bug has been marked as a duplicate of bug 10594 ***

Note You need to log in before you can comment on or make changes to this bug.