[Bugme-new] [Bug 4385] New: oops at parse_rock_ridge_inode_internal

bugme-daemon at osdl.org bugme-daemon at osdl.org
Tue Mar 22 07:01:52 PST 2005


http://bugme.osdl.org/show_bug.cgi?id=4385

           Summary: oops at parse_rock_ridge_inode_internal
    Kernel Version: 2.6.11, 2.6.12-rc1
            Status: NEW
          Severity: low
             Owner: fs_other at kernel-bugs.osdl.org
         Submitter: bwindle-kbt at fint.org


Distribution: Debian testing
Hardware Environment: x86, K6-2 550
Software Environment: 
Gnu C                  2.95.4
Gnu make               3.80
binutils               2.15
util-linux             2.12
mount                  2.12
module-init-tools      implemented
e2fsprogs              1.35
reiserfsprogs          line
reiser4progs           line
Linux C Library        2.3.2
Dynamic linker (ldd)   2.3.2
Procps                 3.2.1
Net-tools              1.60
Console-tools          0.2.3
Sh-utils               5.2.1

Problem Description:
This was reported to Bugtraq by Michal Zalewski, but I didn't see it hit LKML or
Bugzilla.

 Unable to handle kernel paging request at virtual address 029b4700
  printing eip:
 c01cfd32
 *pde = 00000000
 Oops: 0000 [#1]
 PREEMPT
 CPU:    0
 EIP:    0060:[<c01cfd32>]    Not tainted VLI
 EFLAGS: 00010212   (2.6.11)
 EIP is at parse_rock_ridge_inode_internal+0x542/0x5ac
 eax: c38a1820   ebx: 000000ed   ecx: 0000003b   edx: c59af000
 esi: 029b4700   edi: c5d8edd8   ebp: c5a7bd98   esp: c5a7bd6c
 ds: 007b   es: 007b   ss: 0068
 Process mount (pid: 25708, threadinfo=c5a7a000 task=c5b1f930)
 Stack: c7878d4c c59ae000 c59ae000 0000002a c5d8edd8 000000ed 029b4700 000001ba
        00000000 c59ae088 00000000 c5a7bdb4 c01cff1c c59ae000 c7878d4c 00000000
        c7878d4c c7878d30 c5a7bdf4 c01ceba0 c59ae000 c7878d4c c7878d4c c49b3b54
 Call Trace:
  [<c01032d1>] show_stack+0x81/0x8c
  [<c01033f2>] show_registers+0xfa/0x168
  [<c010363d>] die+0x159/0x24c
  [<c010cf5a>] do_page_fault+0x466/0x5f6
  [<c0102e0b>] error_code+0x2b/0x30
  [<c01cff1c>] parse_rock_ridge_inode+0x14/0x48
  [<c01ceba0>] isofs_read_inode+0x290/0x368
  [<c01ced03>] isofs_iget+0x4f/0x64
  [<c01ce1dd>] isofs_fill_super+0x385/0x4f8
  [<c01647ef>] get_sb_bdev+0xe3/0x12c
  [<c01ced31>] isofs_get_sb+0x19/0x28
  [<c01649bc>] do_kern_mount+0x4c/0xcc
  [<c01649bc>] do_kern_mount+0x4c/0xcc
  [<c01815b3>] do_new_mount+0x5f/0x7c
  [<c018209c>] do_mount+0x12c/0x144
  [<c018251d>] sys_mount+0x79/0xbc
  [<c0102ba7>] syscall_call+0x7/0xb
 Code: 8b 5d f0 53 ff b0 c8 00 00 00 e8 ae f3 f8 ff 83 c4 0c 85 c0 74 53 8b 50
18 8b 4d e8 8b 7d e4 01 55 ec 8b 75 ec 8b 5d e8 c1 e9 02 <f3> a5 f6 c3 02 74 02
66 a5 f6 c3 01 74 01 a4 50 e8 19 ef f8 ff

Steps to reproduce:
Original Bugtraq poster included a program to reproduce.

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.



More information about the Bugme-new mailing list