My dmesg output, if it helps

[701194.599816] Oops: 0000 [#1] SMP                                             
                                                                             
[701194.599820] Modules linked in: udf crc_itu_t isofs loop nls_iso8859_1 vfat 
fat usb_storage libusual vmnet vmblock vmci vmmon nls_cp437 nls_utf8 cifs i915 
drm binfmt_misc rfcomm bridge stp bnep sco l2cap bluetooth ppdev 
cpufreq_powersave cpufreq_conservative cpufreq_stats cpufreq_userspace 
cpufreq_ondemand freq_table video output pci_slot sbs sbshc container wmi 
battery ipv6 af_packet iptable_filter ip_tables x_tables dm_crypt 
crypto_blkcipher dm_mod ac lp dcdbas serio_raw psmouse pcspkr snd_usb_audio 
snd_usb_lib evdev snd_hwdep iTCO_wdt iTCO_vendor_support parport_pc parport 
snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss 
snd_seq_midi snd_rawmidi button snd_seq_midi_event snd_seq snd_timer 
snd_seq_device snd intel_agp agpgart soundcore snd_page_alloc shpchp 
pci_hotplug ext3 jbd mbcache sr_mod cdrom sd_mod crc_t10dif sg ata_generic 
usbhid hid ata_piix pata_acpi libata scsi_mod dock tg3 libphy ehci_hcd uhci_hcd 
usbcore thermal processor fan fbcon tileblit font bitblit softcursor fuse [last 
unloaded: vmci]                                                   
[701194.599924]                                                                 
                                                                             
[701194.599927] Pid: 760, comm: mount.cifs Tainted: P          (2.6.27-7-server 
#1)                                                                          
[701194.599930] EIP: 0060:[<c0219a6f>] EFLAGS: 00210246 CPU: 0                  
                                                                             
[701194.599934] EIP is at call_sbin_request_key+0x29f/0x2b0                     
                                                                             
[701194.599936] EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: c3f025b0         
                                                                             
[701194.599939] ESI: d40b7b80 EDI: d092cf00 EBP: d40b7c0c ESP: d40b7b58         
                                                                             
[701194.599942]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068                   
                                                                             
[701194.599945] Process mount.cifs (pid: 760, ti=d40b6000 task=c3f025b0 
task.ti=d40b6000)                                                               
     
[701194.599947] Stack: d40b7b80 c04401e9 00000000 c0445ae4 f7c73818 c3f025b0 
d092c600 d0920030                                                               
[701194.599956]        c048b780 c05d6a88 d0920030 c038b198 d40b7ba4 c0215ec8 
d06cd420 00000000                                                               
[701194.599964]        d092cc80 00000000 00000000 d40b7bc8 c0215f59 00000000 
00000000 d06cd420                                                               
[701194.599972] Call Trace:                                                     
                                                                             
[701194.599975]  [<c038b198>] ? mutex_unlock+0x8/0x20                           
                                                                             
[701194.599981]  [<c0215ec8>] ? __key_instantiate_and_link+0xa8/0xc0            
                                                                             
[701194.599986]  [<c0215f59>] ? key_instantiate_and_link+0x79/0x80              
                                                                             
[701194.599991]  [<c0219f91>] ? request_key_auth_new+0x1e1/0x220                
                                                                             
[701194.599996]  [<c02197d0>] ? call_sbin_request_key+0x0/0x2b0
[701194.600001]  [<c02195b1>] ? construct_key+0x81/0xe0
[701194.600007]  [<c02196cc>] ? request_key_and_link+0xbc/0xf0
[701194.600014]  [<c0219bbd>] ? request_key+0x4d/0x80
[701194.600019]  [<f9253ea4>] ? cifs_get_spnego_key+0x174/0x270 [cifs]
[701194.600033]  [<c038c36d>] ? _spin_lock+0xd/0x10
[701194.600038]  [<f924a56c>] ? GetNextMid+0xac/0xc0 [cifs]
[701194.600050]  [<f9252b38>] ? CIFS_SessSetup+0x378/0x720 [cifs]
[701194.600061]  [<c018e9b3>] ? mempool_free_slab+0x13/0x20
[701194.600067]  [<c018ebef>] ? mempool_free+0x7f/0x90
[701194.600072]  [<f924a8b7>] ? cifs_buf_release+0x17/0x20 [cifs]
[701194.600083]  [<f9239315>] ? CIFSSMBNegotiate+0x165/0x800 [cifs]
[701194.600093]  [<f923c363>] ? cifs_setup_session+0x1a3/0x350 [cifs]
[701194.600105]  [<c014ee18>] ? kthread_create+0xa8/0xb0
[701194.600112]  [<f92403ed>] ? cifs_mount+0x97d/0xed0 [cifs]
[701194.600124]  [<c01b5f99>] ? get_slab+0x9/0x70
[701194.600130]  [<c025cd59>] ? strlen+0x9/0x20
[701194.600135]  [<f9231df3>] ? cifs_read_super+0x93/0x1e0 [cifs]
[701194.600145]  [<c01bc200>] ? set_anon_super+0x0/0xd0
[701194.600150]  [<f9231fa9>] ? cifs_get_sb+0x69/0xc0 [cifs]
[701194.600160]  [<c01bcf9e>] ? vfs_kern_mount+0x5e/0x130
[701194.600166]  [<c01bd0ce>] ? do_kern_mount+0x3e/0xe0
[701194.600171]  [<c01d54ef>] ? do_new_mount+0x6f/0x90
[701194.600176]  [<c01d5a42>] ? do_mount+0x1e2/0x200
[701194.600180]  [<c01d317d>] ? exact_copy_from_user+0x4d/0xa0
[701194.600185]  [<c01d3794>] ? copy_mount_options+0x74/0xd0
[701194.600189]  [<c01d5af1>] ? sys_mount+0x91/0xc0
[701194.600194]  [<c0109f03>] ? sysenter_do_call+0x12/0x2f
[701194.600200]  =======================
[701194.600202] Code: ff 8d 76 00 8b 85 64 ff ff ff 31 db e8 cb eb ff ff 85 c0 
79 e0 eb d9 90 8d 74 26 00 8b 95 60 ff ff ff 8b 82 04 03 00 00 8b 40 24 <8b> 40 
04 e9 07 ff ff ff 89 f6 8d bc 27 00 00 00 00 55 89 e5 e8
[701194.600248] EIP: [<c0219a6f>] call_sbin_request_key+0x29f/0x2b0 SS:ESP 
0068:d40b7b58
[701194.600276] ---[ end trace cdad585f4adc8a6b ]---

-- 
keyutils is broken (keyctl segfaults trivially)
https://bugs.launchpad.net/bugs/298208
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to