Package: linux-2.6 Version: 2.6.39-2 Severity: important Hello,
I was testing today's sparc daily d-i build and noticed that the kernel oopses during pkgsel stage, while trying to mount the installer CD: [ 2124.205340] Unable to handle kernel NULL pointer dereference [ 2124.308334] tsk->{mm,active_mm}->context = 0000000000001c74 [ 2124.410818] tsk->{mm,active_mm}->pgd = fffff8007c422000 [ 2124.509451] \|/ ____ \|/ [ 2124.509455] "@'/ .. \`@" [ 2124.509460] /_| \__/ |_\ [ 2124.509464] \__U_/ [ 2124.509475] mount(8477): Oops [#1] [ 2124.509490] TSTATE: 0000004411001601 TPC: 0000000000529774 TNPC: 0000000000529778 Y: 00000000 Not tainted [ 2124.509521] TPC: <blkdev_get+0x26c/0x2e0> [ 2124.509532] g0: fffff8007e008c60 g1: fffff80000004fe0 g2: fffffffffffffff6 g3: bf807fdec0102800 [ 2124.509545] g4: fffff8007c549860 g5: 000000000000ff00 g6: fffff8007bbc8000 g7: 00000000008d77c8 [ 2124.509557] o0: fffff80000004fe0 o1: fffff8007d8040a0 o2: 0000000000000000 o3: fffff8007783d748 [ 2124.509570] o4: 0000000000000000 o5: 0000000000000000 sp: fffff8007bbcb081 ret_pc: 000000000052976c [ 2124.509585] RPC: <blkdev_get+0x264/0x2e0> [ 2124.509595] l0: fffff8007d804060 l1: ffffffffffffffe2 l2: fffff8007d804078 l3: 0000000000000000 [ 2124.509608] l4: 000000000047635c l5: 0000000000527fa8 l6: fffff8007d8040a0 l7: 000000000053903c [ 2124.509621] i0: fffff8007d804060 i1: 0000000000000083 i2: 00000000101c7d78 i3: 0000000000000001 [ 2124.509634] i4: 0000000000000006 i5: 0000000001f7ffff i6: fffff8007bbcb161 i7: 00000000005298e0 [ 2124.509649] I7: <blkdev_get_by_path+0x1c/0x6c> [ 2124.509656] Call Trace: [ 2124.509668] [00000000005298e0] blkdev_get_by_path+0x1c/0x6c [ 2124.509688] [00000000005020a8] mount_bdev+0x20/0x194 [ 2124.509701] [0000000000501b44] mount_fs+0x64/0x170 [ 2124.509713] [0000000000518338] vfs_kern_mount+0x48/0x90 [ 2124.509724] [00000000005183c0] do_kern_mount+0x24/0xbc [ 2124.509734] [0000000000518b78] do_mount+0x720/0x784 [ 2124.509748] [0000000000539204] compat_sys_mount+0x1c8/0x204 [ 2124.509768] [0000000000405fd4] linux_sparc_syscall32+0x34/0x40 [ 2124.509778] Disabling lock debugging due to kernel taint [ 2124.509792] Caller[00000000005298e0]: blkdev_get_by_path+0x1c/0x6c [ 2124.509805] Caller[00000000005020a8]: mount_bdev+0x20/0x194 [ 2124.509818] Caller[0000000000501b44]: mount_fs+0x64/0x170 [ 2124.509829] Caller[0000000000518338]: vfs_kern_mount+0x48/0x90 [ 2124.509840] Caller[00000000005183c0]: do_kern_mount+0x24/0xbc [ 2124.509851] Caller[0000000000518b78]: do_mount+0x720/0x784 [ 2124.509862] Caller[0000000000539204]: compat_sys_mount+0x1c8/0x204 [ 2124.509875] Caller[0000000000405fd4]: linux_sparc_syscall32+0x34/0x40 [ 2124.509892] Caller[00000000000138e4]: 0x138e4 [ 2124.509899] Instruction DUMP: 90042040 7ffd32f2 92102000 <c404e260> 80a00011 82603fff 8530a008 80888001 0248000b It appears that it has been already fixed upstream: http://www.spinics.net/lists/stable-commits/msg12520.html Best regards, -- Jurij Smakov ju...@wooyd.org Key: http://www.wooyd.org/pgpkey/ KeyID: C99E03CC -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110624232345.ga4...@droopy.oc.cox.net