Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 209643 Details for
Bug 272084
unable to handle kernel NULL pointer dereference at 00000000
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Kernel module panic log while mounting NFS share
nfs-module-panic.log (text/plain), 3.97 KB, created by
Vince C.
on 2009-11-08 18:10:00 UTC
(
hide
)
Description:
Kernel module panic log while mounting NFS share
Filename:
MIME Type:
Creator:
Vince C.
Created:
2009-11-08 18:10:00 UTC
Size:
3.97 KB
patch
obsolete
>Nov 8 18:42:32 luke BUG: unable to handle kernel NULL pointer dereference at (null) >Nov 8 18:42:32 luke IP: [<ffffffffa0072d08>] rpcauth_lookupcred+0x60/0x9d [sunrpc] >Nov 8 18:42:32 luke PGD 3ad2d067 PUD 279a6067 PMD 0 >Nov 8 18:42:32 luke Oops: 0002 [#1] SMP >Nov 8 18:42:32 luke last sysfs file: /sys/devices/pci0000:00/0000:00:1b.0/sound/card0/uevent >Nov 8 18:42:32 luke CPU 1 >Nov 8 18:42:32 luke Modules linked in: sha1_generic arc4 ecb ppp_mppe ppp_async coretemp kqemu snd_hda_codec_realtek atl1e nvidia(P) snd_hda_intel snd_hda_codec i2c_i801 snd_hwdep i2c >_core asus_atk0110 tg3 libphy fuse nfs auth_rpcgss nfs_acl lockd sunrpc scsi_wait_scan sbp2 ohci1394 ieee1394 ohci_hcd uhci_hcd usb_storage ehci_hcd >Nov 8 18:42:32 luke Pid: 6703, comm: mount.nfs Tainted: P 2.6.31-gentoo-r3 #3 P5QL PRO >Nov 8 18:42:32 luke RIP: 0010:[<ffffffffa0072d08>] [<ffffffffa0072d08>] rpcauth_lookupcred+0x60/0x9d [sunrpc] >Nov 8 18:42:32 luke RSP: 0018:ffff88002791f8d8 EFLAGS: 00010246 >Nov 8 18:42:32 luke RAX: 0000000000000000 RBX: ffff880027bd28b8 RCX: 0000000000000000 >Nov 8 18:42:32 luke RDX: 0000000000000000 RSI: ffff88002791f8e8 RDI: ffff88002791f900 >Nov 8 18:42:32 luke RBP: ffffffffa00919c0 R08: 000000000000000e R09: ffff880011df7d88 >Nov 8 18:42:32 luke R10: ffff8800238ca3c0 R11: ffff88002a42153e R12: 0000000000000000 >Nov 8 18:42:32 luke R13: ffff880009db2000 R14: ffff88003dcf0080 R15: ffffffffa0091e78 >Nov 8 18:42:32 luke FS: 00007f94509226f0(0000) GS:ffff880005cb4000(0000) knlGS:0000000000000000 >Nov 8 18:42:32 luke CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b >Nov 8 18:42:32 luke CR2: 0000000000000000 CR3: 000000000b9ec000 CR4: 00000000000006e0 >Nov 8 18:42:32 luke DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >Nov 8 18:42:32 luke DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Nov 8 18:42:32 luke Process mount.nfs (pid: 6703, threadinfo ffff88002791e000, task ffff880027bd23c0) >Nov 8 18:42:32 luke Stack: >Nov 8 18:42:32 luke ffff88002791f8f8 ffffffff8106b29b 3ccb11c0ffff8800 0000000000000000 >Nov 8 18:42:32 luke <0> 0000000000000000 0000000000000006 ffff88003dcf01c0 ffffffffa00919c0 >Nov 8 18:42:32 luke <0> 0000000000000080 ffffffffa0072de1 ffffffffa0091e78 0000000000000000 >Nov 8 18:42:32 luke Call Trace: >Nov 8 18:42:32 luke [<ffffffff8106b29b>] ? mempool_alloc+0x48/0xfe >Nov 8 18:42:32 luke [<ffffffffa0072de1>] ? rpcauth_bindcred+0x9c/0xb4 [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa0071434>] ? rpc_new_task+0x122/0x18f [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa006c43d>] ? rpc_run_task+0xe/0x5b [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa0078739>] ? rpcb_getport_async+0x3e9/0x473 [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa0071c90>] ? __rpc_execute+0x7d/0x241 [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa006c482>] ? rpc_run_task+0x53/0x5b [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa006c571>] ? rpc_call_sync+0x3d/0x5a [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa006c5cc>] ? rpc_ping+0x3e/0x54 [sunrpc] >Nov 8 18:42:32 luke [<ffffffffa006cec7>] ? rpc_create+0x409/0x46e [sunrpc] >Nov 8 18:42:32 luke [<ffffffff81200e90>] ? match_token+0x60/0x1c8 >Nov 8 18:42:32 luke [<ffffffffa00d71ea>] ? nfs_mount+0xea/0x1a4 [nfs] >Nov 8 18:42:32 luke [<ffffffffa00cf792>] ? nfs_get_sb+0x4b4/0x864 [nfs] >Nov 8 18:42:32 luke [<ffffffff81091db6>] ? vfs_kern_mount+0x4f/0x95 >Nov 8 18:42:32 luke [<ffffffff81091e4f>] ? do_kern_mount+0x43/0xe1 >Nov 8 18:42:32 luke [<ffffffff810a6192>] ? do_mount+0x721/0x78d >Nov 8 18:42:32 luke [<ffffffff810a6283>] ? sys_mount+0x85/0xce >Nov 8 18:42:32 luke [<ffffffff8100ae2b>] ? system_call_fastpath+0x16/0x1b >Nov 8 18:42:32 luke Code: 10 31 c0 e8 46 1f 31 e1 31 c0 48 8d 74 24 10 b9 06 00 00 00 48 89 f7 f3 ab 8b 43 1c 89 44 24 10 8b 43 20 89 44 24 14 48 8b 43 50 <f0> ff 00 48 89 44 24 18 44 89 e2 48 8b 45 10 48 89 ef ff 50 28 >Nov 8 18:42:32 luke RIP [<ffffffffa0072d08>] rpcauth_lookupcred+0x60/0x9d [sunrpc] >Nov 8 18:42:32 luke RSP <ffff88002791f8d8> >Nov 8 18:42:32 luke CR2: 0000000000000000 >Nov 8 18:42:32 luke ---[ end trace 797780e942c479bd ]---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 272084
: 209643