Bug 712825

Summary: [abrt] kernel: BUG: unable to handle kernel paging request at 00200200: TAINTED Die
Product: [Fedora] Fedora Reporter: Ronald Canete <ronaldcanete>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: aquini, gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:5dfa20a14ef78a404e97a4611290cadbf5a18afb
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-27 07:39:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ronald Canete 2011-06-13 09:49:58 UTC
abrt version: 2.0.1
architecture:   i686
cmdline:        ro root=/dev/mapper/VolGroup-lv_root rd_LVM_LV=VolGroup/lv_root rd_LVM_LV=VolGroup/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet selinux=0
component:      kernel
kernel:         2.6.38.7-30.fc15.i686.PAE
kernel_tainted: 128
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: unable to handle kernel paging request at 00200200
reported_to:    kerneloops: URL=http://submit.kerneloops.org/submitoops.php
time:           Mon Jun 13 12:48:10 2011

backtrace:
:BUG: unable to handle kernel paging request at 00200200
:IP: [<00200200>] 0x200200
:*pdpt = 000000001c59b001 *pde = 000000011912c067 
:Oops: 0010 [#1] SMP 
:last sysfs file: /sys/devices/pci0000:00/0000:00:1d.7/usb2/idVendor
:Modules linked in: nls_utf8 udf ses enclosure usb_storage uas tcp_lp fuse ebtable_nat ebtables bridge stp llc vboxnetadp vboxnetflt vboxdrv sunrpc cpufreq_ondemand acpi_cpufreq mperf xt_multiport xt_CHECKSUM ip6t_REJECT iptable_mangle nf_conntrack_ipv6 ipt_MASQUERADE nf_defrag_ipv6 iptable_nat nf_nat ip6table_filter ip6_tables snd_hda_codec_idt arc4 iwl3945 uvcvideo snd_hda_intel iwlcore btusb videodev bluetooth mac80211 snd_hda_codec snd_hwdep snd_seq snd_seq_device dell_laptop snd_pcm cfg80211 dell_wmi sparse_keymap snd_timer b44 r852 sm_common ssb snd nand nand_ids nand_ecc microcode iTCO_wdt mtd dcdbas joydev rfkill soundcore i2c_i801 iTCO_vendor_support mii snd_page_alloc wmi virtio_net kvm_intel kvm ipv6 sdhci_pci sdhci mmc_core firewire_ohci firewire_core crc_itu_t i915 drm_kms_helper drm i2c_algo_bit i2c_core video [last unloaded: scsi_wait_scan]
:Pid: 29370, comm: umount Not tainted 2.6.38.7-30.fc15.i686.PAE #1 Dell Inc. Inspiron 1520                   /0KY767
:EIP: 0060:[<00200200>] EFLAGS: 00010006 CPU: 0
:EIP is at 0x200200
:EAX: f1988c60 EBX: f1988c60 ECX: 00200200 EDX: 00000000
:ESI: 00000010 EDI: 04000000 EBP: ef09fd5c ESP: ef09fd54
: DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
:Process umount (pid: 29370, ti=ef09e000 task=ef0a0000 task.ti=ef09e000)
:Stack:
: c05be0ef f1988c60 ef09fd88 c05c246a ed189de0 00000000 00000001 0109fd98
: ef09fdc4 00000000 f1988c60 00000010 04000000 ef09fdcc c05c2e99 00000010
: 00000000 00000000 f4323880 00000000 00000000 00000002 f4323880 f71fce40
:Call Trace:
: [<c05be0ef>] ? elv_may_queue+0x1d/0x20
: [<c05c246a>] get_request+0x27/0x21c
: [<c05c2e99>] get_request_wait+0x2b/0x132
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c05c2fda>] blk_get_request+0x3a/0x63
: [<c06953c8>] scsi_execute+0x26/0x110
: [<c06954e6>] ? scsi_execute_req+0x34/0xad
: [<c0695537>] scsi_execute_req+0x85/0xad
: [<c0691c33>] ioctl_internal_command.constprop.1+0x6f/0x15f
: [<c0691d73>] scsi_set_medium_removal+0x50/0x87
: [<c04bbc9f>] ? truncate_inode_pages_range+0x18c/0x209
: [<c06a2bf7>] sr_lock_door+0x1b/0x1d
: [<c06c1795>] cdrom_release+0x180/0x1e2
: [<c04697f4>] ? smp_call_function_many+0xdd/0x1b4
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c050cd1c>] ? brelse+0x11/0x13
: [<c042f67b>] ? should_resched+0xd/0x27
: [<c07e7d69>] ? _cond_resched+0xd/0x21
: [<c06a1cee>] sr_block_release+0x28/0x3f
: [<c0511248>] __blkdev_put+0xa7/0x135
: [<c05113b8>] blkdev_put+0xe2/0xe7
: [<c04ef407>] kill_block_super+0x5c/0x60
: [<c04ef5de>] deactivate_locked_super+0x1f/0x40
: [<c04eff6f>] deactivate_super+0x2e/0x31
: [<c0501b1c>] mntput_no_expire+0xb5/0xb9
: [<c05023ba>] sys_umount+0x270/0x297
: [<c04f5422>] ? path_put+0x1a/0x1d
: [<c040969f>] sysenter_do_call+0x12/0x28
:Code:  Bad EIP value.
:EIP: [<00200200>] 0x200200 SS:ESP 0068:ef09fd54
:CR2: 0000000000200200

event_log:
:2011-06-13-12:49:46> Submitting oops report to http://submit.kerneloops.org/submitoops.php
:2011-06-13-12:49:49  Kernel oops report was uploaded

Comment 1 Chuck Ebbert 2011-06-25 05:18:39 UTC
*** Bug 714488 has been marked as a duplicate of this bug. ***

Comment 2 Chuck Ebbert 2011-06-27 07:39:13 UTC

*** This bug has been marked as a duplicate of bug 708718 ***