Bug 711291

Summary: [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000022: TAINTED Die
Product: [Fedora] Fedora Reporter: Ronald Canete <ronaldcanete>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED CANTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: aquini, gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:a21955ce69d2c0edb06942500feb617ceae0a100
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-07 17:32:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Ronald Canete 2011-06-07 06:19:11 UTC
abrt version: 2.0.1
architecture:   i686
cmdline:        ro root=/dev/mapper/VolGroup-lv_root rd_LVM_LV=VolGroup/lv_root rd_LVM_LV=VolGroup/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet
component:      kernel
kernel:         2.6.38.7-30.fc15.i686.PAE
kernel_tainted: 128
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: unable to handle kernel NULL pointer dereference at 00000022
reported_to:    kerneloops: URL=http://submit.kerneloops.org/submitoops.php
time:           Tue Jun  7 08:18:28 2011

backtrace:
:BUG: unable to handle kernel NULL pointer dereference at 00000022
:IP: [<00000022>] 0x22
:*pdpt = 0000000019138001 *pde = 000000011e4d7067 
:Oops: 0010 [#1] SMP 
:last sysfs file: /sys/devices/pci0000:00/0000:00:1d.7/usb2/speed
:Modules linked in: nls_utf8 udf ses enclosure usb_storage uas fuse ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat xt_CHECKSUM iptable_mangle bridge stp llc vboxnetadp vboxnetflt vboxdrv sunrpc cpufreq_ondemand acpi_cpufreq mperf ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables btusb bluetooth uvcvideo videodev virtio_net kvm_intel kvm snd_hda_codec_idt snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm dell_wmi b44 sparse_keymap arc4 r852 ssb sm_common iwl3945 dell_laptop iwlcore nand dcdbas nand_ids microcode nand_ecc mtd iTCO_wdt mii mac80211 cfg80211 joydev iTCO_vendor_support snd_timer i2c_i801 snd rfkill soundcore snd_page_alloc wmi ipv6 sdhci_pci firewire_ohci sdhci mmc_core firewire_core crc_itu_t i915 drm_kms_helper drm i2c_algo_bit i2c_core video [last unloaded: scsi_wait_scan]
:Pid: 6713, comm: umount Not tainted 2.6.38.7-30.fc15.i686.PAE #1 Dell Inc. Inspiron 1520                   /0KY767
:EIP: 0060:[<00000022>] EFLAGS: 00010206 CPU: 1
:EIP is at 0x22
:EAX: f1913180 EBX: 00000022 ECX: 00000010 EDX: eeb331d0
:ESI: eeb331d0 EDI: 00000000 EBP: eba63d5c ESP: eba63d54
: DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
:Process umount (pid: 6713, ti=eba62000 task=ebc08c90 task.ti=eba62000)
:Stack:
: c05be0aa f1913180 eba63d88 c05c25c9 ecc58000 00000000 00000001 01a63d90
: 00000001 02000000 f1913180 00000010 04000000 eba63dcc c05c2e99 00000010
: 00000000 00000000 f451cd00 00000000 00000000 00000002 f451cd00 f71fce40
:Call Trace:
: [<c05be0aa>] ? elv_set_request+0x17/0x25
: [<c05c25c9>] get_request+0x186/0x21c
: [<c05c2e99>] get_request_wait+0x2b/0x132
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c05c2fda>] blk_get_request+0x3a/0x63
: [<c06953c8>] scsi_execute+0x26/0x110
: [<c06954e6>] ? scsi_execute_req+0x34/0xad
: [<c0695537>] scsi_execute_req+0x85/0xad
: [<c0691c33>] ioctl_internal_command.constprop.1+0x6f/0x15f
: [<c0691d73>] scsi_set_medium_removal+0x50/0x87
: [<c04bbc9f>] ? truncate_inode_pages_range+0x18c/0x209
: [<c06a2bf7>] sr_lock_door+0x1b/0x1d
: [<c06c1795>] cdrom_release+0x180/0x1e2
: [<c04697f4>] ? smp_call_function_many+0xdd/0x1b4
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c050cd1c>] ? brelse+0x11/0x13
: [<c042f67b>] ? should_resched+0xd/0x27
: [<c07e7d69>] ? _cond_resched+0xd/0x21
: [<c06a1cee>] sr_block_release+0x28/0x3f
: [<c0511248>] __blkdev_put+0xa7/0x135
: [<c05113b8>] blkdev_put+0xe2/0xe7
: [<c04ef407>] kill_block_super+0x5c/0x60
: [<c04ef5de>] deactivate_locked_super+0x1f/0x40
: [<c04eff6f>] deactivate_super+0x2e/0x31
: [<c0501b1c>] mntput_no_expire+0xb5/0xb9
: [<c05023ba>] sys_umount+0x270/0x297
: [<c04f5422>] ? path_put+0x1a/0x1d
: [<c040969f>] sysenter_do_call+0x12/0x28
:Code:  Bad EIP value.

event_log:
:2011-06-07-09:19:03> Submitting oops report to http://submit.kerneloops.org/submitoops.php
:2011-06-07-09:19:05  Kernel oops report was uploaded

Comment 1 Dave Jones 2011-06-07 17:32:27 UTC
this is likely a problem with virtualbox.

Comment 2 Dave Jones 2011-06-07 17:32:43 UTC
*** Bug 711307 has been marked as a duplicate of this bug. ***

Comment 3 Dave Jones 2011-06-07 17:50:55 UTC
hmm, that said, there are also some similar traces in bugzilla from vmware, and also from qemu.  This might be indicative of a bug with virtual block devices.

bug 708718 is the untainted qemu bug (this is the one that we'll focus on, given the lack of tainted modules if you want to follow along).

bug 709946 is an example of one of the vmware traces.