65414 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] BUG: unable to handle kernel paging request at ffae43d2 65415 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] IP: [<c02ad8e1>] memmove+0x21/0x50 65416 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] *pde = 0000f067 *pte = 00000000 65417 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Oops: 0002 [#5] SMP 65418 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] last sysfs file: /sys/devices/virtual/vc/vcsa6/dev 65419 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Modules linked in: 9p 9pnet binfmt_misc psmouse serio_raw pcspkr i2c_piix4 pcnet32 mii fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit intel_agp agpgart 65420 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] 65421 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Pid: 3034, comm: foo Tainted: G D (2.6.30-rc4-9p #1) VirtualBox 65422 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EIP: 0060:[<c02ad8e1>] EFLAGS: 00010616 CPU: 0 65423 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EIP is at memmove+0x21/0x50 65424 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EAX: ffae3000 EBX: 000013d3 ECX: 000013d3 EDX: ef9f401f 65425 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] ESI: ef9f53f1 EDI: ffae43d2 EBP: efa2bbd8 ESP: efa2bbcc 65426 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0069 65427 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Process foo (pid: 3034, ti=efa2a000 task=f73318e0 task.ti=efa2a000) 65428 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Stack: 65429 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] efa00048 ef914800 00000000 efa2bc14 f8caa465 f8caf658 00000bda 000013d3 65430 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] efa2bc24 efa2bc04 00000000 00001fe8 00000000 ffae3000 ef9f401f 00001000 65431 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] 00000000 00000000 efa2bc50 f8d81f1e 00001000 00000000 000013d3 00000006 65432 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] Call Trace: 65433 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<f8caa465>] ? p9_client_read+0xd5/0x200 [9pnet] 65434 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<f8d81f1e>] ? v9fs_file_readn+0x5e/0x100 [9p] 65435 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<f8d81be9>] ? v9fs_vfs_readpage+0x49/0xc0 [9p] 65436 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c019340f>] ? __do_page_cache_readahead+0x20f/0x230 65437 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c019347d>] ? do_page_cache_readahead+0x4d/0x70 65438 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c018c867>] ? filemap_fault+0x337/0x440 65439 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c018ffe0>] ? __alloc_pages_internal+0xc0/0x490 65440 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c019ff1b>] ? __do_fault+0x3b/0x420 65441 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c011fcb6>] ? pte_alloc_one+0x36/0x40 65442 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01a1169>] ? handle_mm_fault+0x109/0x720 65443 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c047a293>] ? do_page_fault+0x123/0x2c0 65444 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c047a170>] ? do_page_fault+0x0/0x2c0 65445 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c047834a>] ? error_code+0x7a/0x80 65446 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c02ae4b3>] ? clear_user+0x43/0x60 65447 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01efeb4>] ? padzero+0x24/0x40 65448 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01f1675>] ? load_elf_binary+0x735/0x1570 65449 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c0120b71>] ? kunmap_atomic+0x61/0x70 65450 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c019e882>] ? follow_page+0x202/0x230 65451 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01a1871>] ? __get_user_pages+0xf1/0x3a0 65452 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c019d80e>] ? kunmap_high+0x6e/0xa0 65453 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c02ae1c8>] ? copy_from_user+0x38/0x130 65454 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01bf5ef>] ? search_binary_handler+0xbf/0x270 65455 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c01c0c92>] ? do_execve+0x242/0x320 65456 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c02ae115>] ? strncpy_from_user+0x35/0x60 65457 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c0101898>] ? sys_execve+0x28/0x60 65458 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] [<c010316c>] ? syscall_call+0x7/0xb 65459 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] Code: 00 00 00 00 8d bf 00 00 00 00 55 89 e5 83 ec 0c 39 d0 89 1c 24 89 cb 89 74 24 04 89 7c 24 08 72 21 8d 79 ff 8d 34 3a 8d 3c 38 fd <f3> a4 fc 8b 1c 24 8b 74 24 04 8b 7c 24 08 89 ec 5d c3 90 8d 74 65460 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] EIP: [<c02ad8e1>] memmove+0x21/0x50 SS:ESP 0069:efa2bbcc 65461 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] CR2: 00000000ffae43d2 65462 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] ---[ end trace 6d72d8ca2263339e ]--- If it helps, here's some more information: This occurs when trying to execute any simple program involving buffer operations (memcpy, memmove, strcpy) $./ufs & $mount -t 9p 127.0.0.1 /mnt/xcpu/ -o port=564,access=any,uname=root,debug=0xffff $uname -a Linux ubuntu 2.6.30-rc4-9p #1 SMP Mon Jun 29 10:55:22 MDT 2009 i686 GNU/Linux @cd /mnt/xcpu/home/adk9/ $cat foo.c #include <stdlib.h> #include <string.h> #define BUFLEN 128 int main(int argc, char *argv[]) { static char buf1[BUFLEN]; strncpy(buf1, "Hello", 5); return 0; } $./foo