I noticed my trace is slightly different, but I'm using amd64 on Oneiric: Feb 7 10:07:06 ken-world kernel: [ 50.098566] CIFS VFS: default security mechanism requested. The default security mechanism will be upgraded from ntlm to ntlmv2 in kernel release 3.1 Feb 7 10:07:06 ken-world kernel: [ 50.099310] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008 Feb 7 10:07:06 ken-world kernel: [ 50.099360] IP: [<ffffffff812bb86b>] crypto_larval_kill+0x2b/0x90 Feb 7 10:07:06 ken-world kernel: [ 50.099393] PGD 137f8a067 PUD 133f07067 PMD 0 Feb 7 10:07:06 ken-world kernel: [ 50.099424] Oops: 0002 [#1] SMP Feb 7 10:07:06 ken-world kernel: [ 50.099446] CPU 1 Feb 7 10:07:06 ken-world kernel: [ 50.099458] Modules linked in: nls_utf8 cifs bnep rfcomm bluetooth parport_pc ppdev binfmt_misc dm_crypt uvcvideo videodev v4l2_comp at_ioctl32 snd_hda_codec_idt joydev snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device lib80211_c rypt_tkip snd soundcore wl(P) dell_laptop psmouse serio_raw snd_page_alloc dcdbas lib80211 lp parport ahci libahci firewire_ohci i915 firewire_core crc_itu_t r8169 drm_k ms_helper drm sdhci_pci sdhci i2c_algo_bit video Feb 7 10:07:06 ken-world kernel: [ 50.099764] Feb 7 10:07:06 ken-world kernel: [ 50.099775] Pid: 1358, comm: mount.cifs Tainted: P 3.0.0-15-generic #26-Ubuntu Dell Inc. Vostro 1520/0T816J Feb 7 10:07:06 ken-world kernel: [ 50.099823] RIP: 0010:[<ffffffff812bb86b>] [<ffffffff812bb86b>] crypto_larval_kill+0x2b/0x90 Feb 7 10:07:06 ken-world kernel: [ 50.099860] RSP: 0018:ffff880137345b68 EFLAGS: 00010296 Feb 7 10:07:06 ken-world kernel: [ 50.099887] RAX: dead000000200200 RBX: ffff880135b0b200 RCX: 0200000000004040 Feb 7 10:07:06 ken-world kernel: [ 50.099916] RDX: 0000000000000000 RSI: ffffea00043bea30 RDI: ffffffff81c58200 Feb 7 10:07:06 ken-world kernel: [ 50.099946] RBP: ffff880137345b78 R08: ffffea00043bea30 R09: ffffffff812bb6d0 Feb 7 10:07:06 ken-world kernel: [ 50.099975] R10: 0000000000012a40 R11: 0000000000012a40 R12: ffff880135b0ac50 Feb 7 10:07:06 ken-world kernel: [ 50.100003] R13: ffffffffa05f8ad8 R14: 0000000000000000 R15: ffff880135db8000 Feb 7 10:07:06 ken-world kernel: [ 50.100034] FS: 00007fc298073720(0000) GS:ffff88013fd00000(0000) knlGS:0000000000000000 Feb 7 10:07:06 ken-world kernel: [ 50.100075] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b Feb 7 10:07:06 ken-world kernel: [ 50.100099] CR2: 0000000000000008 CR3: 00000001358c3000 CR4: 00000000000406e0 Feb 7 10:07:06 ken-world kernel: [ 50.100129] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Feb 7 10:07:06 ken-world kernel: [ 50.100158] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Feb 7 10:07:06 ken-world kernel: [ 50.100188] Process mount.cifs (pid: 1358, threadinfo ffff880137344000, task ffff880135db8000) Feb 7 10:07:06 ken-world kernel: [ 50.100232] Stack: Feb 7 10:07:06 ken-world kernel: [ 50.100246] ffff880135b0b200 ffff880135b0ac50 ffff880137345b98 ffffffff812bbd3b Feb 7 10:07:06 ken-world kernel: [ 50.100293] ffffffff81832a20 0000000000000000 ffff880137345be8 ffffffff812bba0d Feb 7 10:07:06 ken-world kernel: [ 50.100337] ffff880137345c08 ffffffffa05dd907 ffff880137345c08 ffff880133c7cc00 Feb 7 10:07:06 ken-world kernel: [ 50.100377] Call Trace: Feb 7 10:07:06 ken-world kernel: [ 50.100391] [<ffffffff812bbd3b>] crypto_alg_mod_lookup+0x6b/0x90 Feb 7 10:07:06 ken-world kernel: [ 50.100418] [<ffffffff812bba0d>] crypto_alloc_tfm+0x6d/0xe0 Feb 7 10:07:06 ken-world kernel: [ 50.100456] [<ffffffffa05dd907>] ? cifs_convert_address+0x47/0x120 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100492] [<ffffffff812c2759>] crypto_alloc_shash+0x19/0x20 Feb 7 10:07:06 ken-world kernel: [ 50.100526] [<ffffffffa05e3091>] cifs_crypto_shash_allocate+0x21/0x1a0 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100567] [<ffffffffa05caad6>] cifs_get_tcp_session+0x126/0x690 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100599] [<ffffffffa05d0035>] cifs_mount+0x95/0x550 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100905] [<ffffffffa05be981>] ? cifs_do_mount+0x91/0x280 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100905] [<ffffffffa05be9a5>] cifs_do_mount+0xb5/0x280 [cifs] Feb 7 10:07:06 ken-world kernel: [ 50.100905] [<ffffffff811499c3>] ? alloc_pages_current+0xa3/0x110 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff8116b653>] mount_fs+0x43/0x1b0 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff81185f3a>] vfs_kern_mount+0x6a/0xc0 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff81187354>] do_kern_mount+0x54/0x110 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff81188df4>] do_mount+0x1a4/0x260 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff81189290>] sys_mount+0x90/0xe0 Feb 7 10:07:06 ken-world kernel: [ 50.108012] [<ffffffff815fa1c2>] system_call_fastpath+0x16/0x1b Feb 7 10:07:06 ken-world kernel: [ 50.108012] Code: 55 48 89 e5 53 48 83 ec 08 66 66 66 66 90 48 89 fb 48 c7 c7 00 82 c5 81 e8 53 58 33 00 48 8b 13 48 8b 43 08 48 c7 c7 00 82 c5 81 Feb 7 10:07:06 ken-world kernel: [ 50.108012] RIP [<ffffffff812bb86b>] crypto_larval_kill+0x2b/0x90 Feb 7 10:07:06 ken-world kernel: [ 50.108012] RSP <ffff880137345b68> Feb 7 10:07:06 ken-world kernel: [ 50.108012] CR2: 0000000000000008 Feb 7 10:07:06 ken-world kernel: [ 50.138770] ---[ end trace 8d9eb7fb7aec2284 ]---
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/818004 Title: unable to handle kernel NULL pointer dereference in crypto_larval_kill+0x1a/0x60 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/818004/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
