I noticed my trace is slightly different, but I'm using amd64 on
Oneiric:

Feb  7 10:07:06 ken-world kernel: [   50.098566] CIFS VFS: default security 
mechanism requested.  The default security mechanism will be upgraded from ntlm 
to ntlmv2 in 
kernel release 3.1
Feb  7 10:07:06 ken-world kernel: [   50.099310] BUG: unable to handle kernel 
NULL pointer dereference at 0000000000000008
Feb  7 10:07:06 ken-world kernel: [   50.099360] IP: [<ffffffff812bb86b>] 
crypto_larval_kill+0x2b/0x90
Feb  7 10:07:06 ken-world kernel: [   50.099393] PGD 137f8a067 PUD 133f07067 
PMD 0 
Feb  7 10:07:06 ken-world kernel: [   50.099424] Oops: 0002 [#1] SMP 
Feb  7 10:07:06 ken-world kernel: [   50.099446] CPU 1 
Feb  7 10:07:06 ken-world kernel: [   50.099458] Modules linked in: nls_utf8 
cifs bnep rfcomm bluetooth parport_pc ppdev binfmt_misc dm_crypt uvcvideo 
videodev v4l2_comp
at_ioctl32 snd_hda_codec_idt joydev snd_hda_intel snd_hda_codec snd_hwdep 
snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer 
snd_seq_device lib80211_c
rypt_tkip snd soundcore wl(P) dell_laptop psmouse serio_raw snd_page_alloc 
dcdbas lib80211 lp parport ahci libahci firewire_ohci i915 firewire_core 
crc_itu_t r8169 drm_k
ms_helper drm sdhci_pci sdhci i2c_algo_bit video
Feb  7 10:07:06 ken-world kernel: [   50.099764] 
Feb  7 10:07:06 ken-world kernel: [   50.099775] Pid: 1358, comm: mount.cifs 
Tainted: P            3.0.0-15-generic #26-Ubuntu Dell Inc. Vostro 1520/0T816J
Feb  7 10:07:06 ken-world kernel: [   50.099823] RIP: 0010:[<ffffffff812bb86b>] 
 [<ffffffff812bb86b>] crypto_larval_kill+0x2b/0x90
Feb  7 10:07:06 ken-world kernel: [   50.099860] RSP: 0018:ffff880137345b68  
EFLAGS: 00010296
Feb  7 10:07:06 ken-world kernel: [   50.099887] RAX: dead000000200200 RBX: 
ffff880135b0b200 RCX: 0200000000004040
Feb  7 10:07:06 ken-world kernel: [   50.099916] RDX: 0000000000000000 RSI: 
ffffea00043bea30 RDI: ffffffff81c58200
Feb  7 10:07:06 ken-world kernel: [   50.099946] RBP: ffff880137345b78 R08: 
ffffea00043bea30 R09: ffffffff812bb6d0
Feb  7 10:07:06 ken-world kernel: [   50.099975] R10: 0000000000012a40 R11: 
0000000000012a40 R12: ffff880135b0ac50
Feb  7 10:07:06 ken-world kernel: [   50.100003] R13: ffffffffa05f8ad8 R14: 
0000000000000000 R15: ffff880135db8000
Feb  7 10:07:06 ken-world kernel: [   50.100034] FS:  00007fc298073720(0000) 
GS:ffff88013fd00000(0000) knlGS:0000000000000000
Feb  7 10:07:06 ken-world kernel: [   50.100075] CS:  0010 DS: 0000 ES: 0000 
CR0: 000000008005003b
Feb  7 10:07:06 ken-world kernel: [   50.100099] CR2: 0000000000000008 CR3: 
00000001358c3000 CR4: 00000000000406e0
Feb  7 10:07:06 ken-world kernel: [   50.100129] DR0: 0000000000000000 DR1: 
0000000000000000 DR2: 0000000000000000
Feb  7 10:07:06 ken-world kernel: [   50.100158] DR3: 0000000000000000 DR6: 
00000000ffff0ff0 DR7: 0000000000000400
Feb  7 10:07:06 ken-world kernel: [   50.100188] Process mount.cifs (pid: 1358, 
threadinfo ffff880137344000, task ffff880135db8000)
Feb  7 10:07:06 ken-world kernel: [   50.100232] Stack:
Feb  7 10:07:06 ken-world kernel: [   50.100246]  ffff880135b0b200 
ffff880135b0ac50 ffff880137345b98 ffffffff812bbd3b
Feb  7 10:07:06 ken-world kernel: [   50.100293]  ffffffff81832a20 
0000000000000000 ffff880137345be8 ffffffff812bba0d
Feb  7 10:07:06 ken-world kernel: [   50.100337]  ffff880137345c08 
ffffffffa05dd907 ffff880137345c08 ffff880133c7cc00
Feb  7 10:07:06 ken-world kernel: [   50.100377] Call Trace:
Feb  7 10:07:06 ken-world kernel: [   50.100391]  [<ffffffff812bbd3b>] 
crypto_alg_mod_lookup+0x6b/0x90
Feb  7 10:07:06 ken-world kernel: [   50.100418]  [<ffffffff812bba0d>] 
crypto_alloc_tfm+0x6d/0xe0
Feb  7 10:07:06 ken-world kernel: [   50.100456]  [<ffffffffa05dd907>] ? 
cifs_convert_address+0x47/0x120 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100492]  [<ffffffff812c2759>] 
crypto_alloc_shash+0x19/0x20
Feb  7 10:07:06 ken-world kernel: [   50.100526]  [<ffffffffa05e3091>] 
cifs_crypto_shash_allocate+0x21/0x1a0 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100567]  [<ffffffffa05caad6>] 
cifs_get_tcp_session+0x126/0x690 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100599]  [<ffffffffa05d0035>] 
cifs_mount+0x95/0x550 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100905]  [<ffffffffa05be981>] ? 
cifs_do_mount+0x91/0x280 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100905]  [<ffffffffa05be9a5>] 
cifs_do_mount+0xb5/0x280 [cifs]
Feb  7 10:07:06 ken-world kernel: [   50.100905]  [<ffffffff811499c3>] ? 
alloc_pages_current+0xa3/0x110
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff8116b653>] 
mount_fs+0x43/0x1b0
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff81185f3a>] 
vfs_kern_mount+0x6a/0xc0
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff81187354>] 
do_kern_mount+0x54/0x110
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff81188df4>] 
do_mount+0x1a4/0x260
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff81189290>] 
sys_mount+0x90/0xe0
Feb  7 10:07:06 ken-world kernel: [   50.108012]  [<ffffffff815fa1c2>] 
system_call_fastpath+0x16/0x1b
Feb  7 10:07:06 ken-world kernel: [   50.108012] Code: 55 48 89 e5 53 48 83 ec 
08 66 66 66 66 90 48 89 fb 48 c7 c7 00 82 c5 81 e8 53 58 33 00 48 8b 13 48 8b 
43 08 48 c7 
c7 00 82 c5 81 
Feb  7 10:07:06 ken-world kernel: [   50.108012] RIP  [<ffffffff812bb86b>] 
crypto_larval_kill+0x2b/0x90
Feb  7 10:07:06 ken-world kernel: [   50.108012]  RSP <ffff880137345b68>
Feb  7 10:07:06 ken-world kernel: [   50.108012] CR2: 0000000000000008
Feb  7 10:07:06 ken-world kernel: [   50.138770] ---[ end trace 
8d9eb7fb7aec2284 ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/818004

Title:
  unable to handle kernel NULL pointer dereference in
  crypto_larval_kill+0x1a/0x60

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/818004/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to