[Bugme-new] [Bug 4385] New: oops at parse_rock_ridge_inode_internal
bugme-daemon at osdl.org
bugme-daemon at osdl.org
Tue Mar 22 07:01:52 PST 2005
http://bugme.osdl.org/show_bug.cgi?id=4385
Summary: oops at parse_rock_ridge_inode_internal
Kernel Version: 2.6.11, 2.6.12-rc1
Status: NEW
Severity: low
Owner: fs_other at kernel-bugs.osdl.org
Submitter: bwindle-kbt at fint.org
Distribution: Debian testing
Hardware Environment: x86, K6-2 550
Software Environment:
Gnu C 2.95.4
Gnu make 3.80
binutils 2.15
util-linux 2.12
mount 2.12
module-init-tools implemented
e2fsprogs 1.35
reiserfsprogs line
reiser4progs line
Linux C Library 2.3.2
Dynamic linker (ldd) 2.3.2
Procps 3.2.1
Net-tools 1.60
Console-tools 0.2.3
Sh-utils 5.2.1
Problem Description:
This was reported to Bugtraq by Michal Zalewski, but I didn't see it hit LKML or
Bugzilla.
Unable to handle kernel paging request at virtual address 029b4700
printing eip:
c01cfd32
*pde = 00000000
Oops: 0000 [#1]
PREEMPT
CPU: 0
EIP: 0060:[<c01cfd32>] Not tainted VLI
EFLAGS: 00010212 (2.6.11)
EIP is at parse_rock_ridge_inode_internal+0x542/0x5ac
eax: c38a1820 ebx: 000000ed ecx: 0000003b edx: c59af000
esi: 029b4700 edi: c5d8edd8 ebp: c5a7bd98 esp: c5a7bd6c
ds: 007b es: 007b ss: 0068
Process mount (pid: 25708, threadinfo=c5a7a000 task=c5b1f930)
Stack: c7878d4c c59ae000 c59ae000 0000002a c5d8edd8 000000ed 029b4700 000001ba
00000000 c59ae088 00000000 c5a7bdb4 c01cff1c c59ae000 c7878d4c 00000000
c7878d4c c7878d30 c5a7bdf4 c01ceba0 c59ae000 c7878d4c c7878d4c c49b3b54
Call Trace:
[<c01032d1>] show_stack+0x81/0x8c
[<c01033f2>] show_registers+0xfa/0x168
[<c010363d>] die+0x159/0x24c
[<c010cf5a>] do_page_fault+0x466/0x5f6
[<c0102e0b>] error_code+0x2b/0x30
[<c01cff1c>] parse_rock_ridge_inode+0x14/0x48
[<c01ceba0>] isofs_read_inode+0x290/0x368
[<c01ced03>] isofs_iget+0x4f/0x64
[<c01ce1dd>] isofs_fill_super+0x385/0x4f8
[<c01647ef>] get_sb_bdev+0xe3/0x12c
[<c01ced31>] isofs_get_sb+0x19/0x28
[<c01649bc>] do_kern_mount+0x4c/0xcc
[<c01649bc>] do_kern_mount+0x4c/0xcc
[<c01815b3>] do_new_mount+0x5f/0x7c
[<c018209c>] do_mount+0x12c/0x144
[<c018251d>] sys_mount+0x79/0xbc
[<c0102ba7>] syscall_call+0x7/0xb
Code: 8b 5d f0 53 ff b0 c8 00 00 00 e8 ae f3 f8 ff 83 c4 0c 85 c0 74 53 8b 50
18 8b 4d e8 8b 7d e4 01 55 ec 8b 75 ec 8b 5d e8 c1 e9 02 <f3> a5 f6 c3 02 74 02
66 a5 f6 c3 01 74 01 a4 50 e8 19 ef f8 ff
Steps to reproduce:
Original Bugtraq poster included a program to reproduce.
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
More information about the Bugme-new
mailing list