On Thu, 2 Feb 2012 09:38:47 -0600 Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx> wrote: > On Thu, Feb 2, 2012 at 9:20 AM, Chris Clayton <chris2553@xxxxxxxxxxxxxx> wrote: > > Hi. > > I'm not subscribed, so please cc me on any replies. > > > > I'm getting an oops when trying to mount a FAT32 partition hosted on > > another machine on my home network. The kernel is built from a pull of > > from kernel.org this morning. "git describe" gives > > v3.3-rc2-37-gbd3ce7d. > > > > The oops message is: > > > > CIFS VFS: default security mechanism requested. The default security > > mechanism will be upgraded from ntlm to ntlmv2in kernel release 3.3 > > BUG: unable to handle kernel NULL pointer dereference at (null) > > IP: [<c116b146>] strnlen+0x6/0x20 > > *pdpt = 0000000033f0c001 *pde = 0000000000000000 > > Oops: 0000 [#1] PREEMPT SMP > > Modules linked in: md4 cifs ipt_LOG xt_state iptable_filter > > ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 > > nf_conntrack psmouse r8169 [last unloaded: microcode] > > > > Pid: 811, comm: mount.cifs Not tainted 3.3.0-rc2+ #94 Hewlett-Packard > > HP G61 Notebook PC/3069 > > EIP: 0060:[<c116b146>] EFLAGS: 00010207 CPU: 0 > > EIP is at strnlen+0x6/0x20 > > EAX: 00000000 EBX: f31149ac ECX: 00000000 EDX: 000000ff > > ESI: f32a1df4 EDI: f31149b0 EBP: f1a63830 ESP: f32a1d88 > > DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > > Process mount.cifs (pid: 811, ti=f32a0000 task=f1a78380 task.ti=f32a0000) > > Stack: > > f943a9aa f3114900 9a734c2c 00000000 f1a63800 f943b64a f32a1df0 00000001 > > c1047be2 00000000 00000001 00000000 00000001 c1087bf1 f1bfc380 c14d9a80 > > 00000000 00000007 00000001 f3da7a40 f45dc1c0 00000041 00000000 00000000 > > Call Trace: > > [<f943a9aa>] ? ascii_ssetup_strings.isra.7+0x3a/0xd0 [cifs] > > [<f943b64a>] ? CIFS_SessSetup+0xc0a/0x115c [cifs] > > [<c1047be2>] ? __wake_up+0x42/0x60 > > [<c1087bf1>] ? mempool_free+0x41/0xa0 > > [<f941937a>] ? CIFSSMBNegotiate+0x1ca/0x750 [cifs] > > [<f9426b3d>] ? cifs_setup_session+0x4d/0x1b0 [cifs] > > [<f9426ac1>] ? cifs_negotiate_protocol+0x71/0xa0 [cifs] > > [<f9426fb6>] ? cifs_get_smb_ses+0x316/0x4d0 [cifs] > > [<f94271f7>] ? cifs_mount+0x87/0x5a0 [cifs] > > [<f94175f6>] ? cifs_do_mount+0x66/0x460 [cifs] > > [<c1097150>] ? kstrndup+0x40/0x60 > > [<f9417617>] ? cifs_do_mount+0x87/0x460 [cifs] > > [<c10b8c0d>] ? mount_fs+0x1d/0xd0 > > [<c10ce616>] ? alloc_vfsmnt+0x96/0x130 > > [<c10ce8d1>] ? vfs_kern_mount+0x51/0xd0 > > [<c10cecef>] ? do_kern_mount+0x3f/0xe0 > > [<c10d03d4>] ? do_mount+0x474/0x730 > > [<c1020d90>] ? vmalloc_sync_all+0x10/0x10 > > [<c10d07a2>] ? sys_mount+0x72/0xb0 > > [<c13b57d0>] ? sysenter_do_call+0x12/0x26 > > Code: 26 00 00 00 00 85 c9 57 89 c7 74 07 89 d0 f2 ae 75 01 4f 89 f8 > > 5f c3 8d b4 26 00 00 00 00 8d bc 27 00 00 00 0089 c1 89 c8 eb 06 <80> > > 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 c3 90 90 90 90 90 90 > > EIP: [<c116b146>] strnlen+0x6/0x20 SS:ESP 0068:f32a1d88 > > CR2: 0000000000000000 > > ---[ end trace 9f3a2989281718b5 ]--- > > > > The full dmesg is attached, in case it helps. > > > > Let me know if I can help in any way to fix this. > > > > Chris > > > > -- > > The more I see, the more I know. The more I know, the less I > > understand. Changing Man - Paul Weller > > Does this attached patch fix the oops? Thanks -- probably fallout from 04febabc. Looks like I missed a spot. Patch looks correct to me: Acked-by: Jeff Layton <jlayton@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html