Public bug reported:

Binary package hint: linux-image-2.6.22-14-generic

I am reporting this bug for: linux-image-2.6.22-14-generic
I can reproduce it also with linux-image-2.6.20-16 (upgraded to gutsy lately 
but kept old kernels)
However, linux-image-2.6.20-15 DOES WORK flawlessly!

I am using my ubuntu machine to mount NFS4 mounts with krb5 on a Debian
Sarge server. As I said it worked fine with the older feisty kernel.
With the newer kernels the machine crashes, while starting. In order to
find out when it exactly I did:

1. renamed the nfs.module under the working kernel so it wasn't loaded 
automatically
2. started kernel 2.6.22-14 in single user mode
3. Loaded the renamed module via insmod (everything still ok) 
4. started portmapper, krb5-kds and nfs-common (still everything ok)
5. Mounted nfs-share with krb5 -> Kernel oops:

Feb  2 18:28:58 biene kernel: [  720.128000] BUG: unable to handle kernel NULL 
pointer dereference at virtual address 00000038
Feb  2 18:28:58 biene kernel: [  720.128000]  printing eip:
Feb  2 18:28:58 biene kernel: [  720.128000] e0d4a040
Feb  2 18:28:58 biene kernel: [  720.128000] *pde = 00000000
Feb  2 18:28:58 biene kernel: [  720.128000] Oops: 0000 [#1]
Feb  2 18:28:58 biene kernel: [  720.128000] SMP
Feb  2 18:28:58 biene kernel: [  720.128000] Modules linked in: des cbc 
blkcipher nfs binfmt_misc rfcomm l2cap bluetooth ppdev radeon drm 
cpufreq_conservative cpufreq_stats cpufreq_ondemand freq_table 
cpufreq_userspace cpufreq_powersave ac button sbs container video dock battery 
ipv6 rpcsec_gss_krb5 auth_rpcgss lockd sunrpc lp snd_cmipci gameport 
snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc snd_opl3_lib snd_hwdep 
snd_mpu401_uart snd_seq_dummy irtty_sir joydev snd_seq_oss snd_seq_midi sir_dev 
snd_rawmidi irda xpad snd_seq_midi_event crc_ccitt usbhid hid snd_seq snd_timer 
snd_seq_device pcspkr serio_raw snd soundcore via686a psmouse i2c_isa 
i2c_viapro i2c_core parport_pc parport via_agp shpchp pci_hotplug agpgart 
af_packet evdev ext3 jbd mbcache ide_cd cdrom ide_disk floppy pdc202xx_old 
e1000 uhci_hcd usbcore via82cxxx ide_core ata_generic libata scsi_mod thermal 
processor fan fuse apparmor commoncap
Feb  2 18:28:58 biene kernel: [  720.128000] CPU:    0
Feb  2 18:28:58 biene kernel: [  720.128000] EIP:    0060:[<e0d4a040>]    Not 
tainted VLI
Feb  2 18:28:58 biene kernel: [  720.128000] EFLAGS: 00010206   
(2.6.22-14-generic #1)
Feb  2 18:28:58 biene kernel: [  720.128000] EIP is at nfs_fhget+0xd0/0x3e0 
[nfs]
Feb  2 18:28:58 biene kernel: [  720.128000] eax: 00000000   ebx: 00000000   
ecx: def1d674   edx: 00004180
Feb  2 18:28:58 biene kernel: [  720.128000] esi: def1d600   edi: d962bbd4   
ebp: d6fb1128   esp: d962bb88
Feb  2 18:28:58 biene kernel: [  720.128000] ds: 007b   es: 007b   fs: 00d8  
gs: 0033  ss: 0068
Feb  2 18:28:58 biene kernel: [  720.128000] Process mount.nfs4 (pid: 6246, 
ti=d962a000 task=df85c530 task.ti=d962a000)
Feb  2 18:28:58 biene kernel: [  720.128000] Stack: e0d49f10 d962bbac 0000000a 
c0139679 c14099dc d6fb1000 00019a48 c043c950
Feb  2 18:28:58 biene kernel: [  720.128000]        c012dc04 d962bc66 d962bbd4 
d962bbd4 def1d600 d962bc64 d962bd1e e0d488d7
Feb  2 18:28:58 biene kernel: [  720.128000]        df85c6f0 c1403000 d9524c00 
00000002 00000000 00000000 00000000 00000000
Feb  2 18:28:58 biene kernel: [  720.128000] Call Trace: Feb  2 18:28:58 biene 
kernel: [  720.128000]  [<e0d49f10>] nfs_init_locked+0x0/0x60 [nfs]
Feb  2 18:28:58 biene kernel: [  720.128000]  [__rcu_process_callbacks+105/464] 
__rcu_process_callbacks+0x69/0x1d0
Feb  2 18:28:58 biene kernel: [  720.128000]  [tasklet_action+84/192] 
tasklet_action+0x54/0xc0
Feb  2 18:28:58 biene kernel: [  720.128000]  [<e0d488d7>] 
nfs4_get_root+0x177/0x260 [nfs]
Feb  2 18:28:58 biene kernel: [  720.128000]  [<e0d4be71>] 
nfs4_get_sb+0x291/0x370 [nfs]
Feb  2 18:28:58 biene kernel: [  720.128000]  [vfs_kern_mount+182/304] 
vfs_kern_mount+0xb6/0x130
Feb  2 18:28:58 biene kernel: [  720.128000]  [do_kern_mount+63/240] 
do_kern_mount+0x3f/0xf0
Feb  2 18:28:58 biene kernel: [  720.128000]  [do_mount+1643/1856] 
do_mount+0x66b/0x740
Feb  2 18:28:58 biene kernel: [  720.128000]  [tcp_v4_send_check+68/240] 
tcp_v4_send_check+0x44/0xf0
Feb  2 18:28:58 biene kernel: [  720.128000]  [tcp_transmit_skb+1017/2048] 
tcp_transmit_skb+0x3f9/0x800
Feb  2 18:28:58 biene kernel: [  720.128000]  [sock_aio_read+287/304] 
sock_aio_read+0x11f/0x130
Feb  2 18:28:58 biene kernel: [  720.128000]  [__handle_mm_fault+1671/2816] 
__handle_mm_fault+0x687/0xb00
Feb  2 18:28:58 biene kernel: [  720.128000]  [__mod_timer+159/176] 
__mod_timer+0x9f/0xb0
Feb  2 18:28:58 biene kernel: [  720.128000]  [do_page_fault+905/1680] 
do_page_fault+0x389/0x690
Feb  2 18:28:58 biene kernel: [  720.128000]  [error_code+114/128] 
error_code+0x72/0x80
Feb  2 18:28:58 biene kernel: [  720.128000]  [copy_mount_options+171/336] 
copy_mount_options+0xab/0x150
Feb  2 18:28:58 biene kernel: [  720.128000]  [sys_mount+119/192] 
sys_mount+0x77/0xc0
Feb  2 18:28:58 biene kernel: [  720.128000]  [sysenter_past_esp+107/169] 
sysenter_past_esp+0x6b/0xa9
Feb  2 18:28:58 biene kernel: [  720.128000]  =======================
Feb  2 18:28:58 biene kernel: [  720.128000] Code: d8 fe ff ff 89 44 24 14 89 
54 24 18 81 8d 3c 01 00 00 82 00 00 00 89 5d 20 8b 57 20 66 89 55 6a 8b 86 64 
01 00 00 0f b7 d2 8b 00 <8b> 40 38 8b 40 0c 89 85 90 00 00 00 89 d0 25 00 f0 00 
00 3d 00
Feb  2 18:28:58 biene kernel: [  720.128000] EIP: [<e0d4a040>] 
nfs_fhget+0xd0/0x3e0 [nfs] SS:ESP 0068:d962bb88

here i was lucky and the machine did not freeze the first time, however
the mount was not created. When trying the mount again, a second oops
came and then the machine froze.

Although I do not believe it is hardware related I will attach syslog
output while starting and lspci-output. If you need more please let me
know.

** Affects: linux-source-2.6.22 (Ubuntu)
     Importance: Undecided
         Status: New

-- 
kernel oops when accessing NFS4 with krb5
https://bugs.launchpad.net/bugs/188410
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to