Bug 1033944 - [abrt] BUG: unable to handle kernel NULL pointer dereference at 00000300 [NEEDINFO]
Summary: [abrt] BUG: unable to handle kernel NULL pointer dereference at 00000300
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 19
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:e5af2a44630e61c47dae60362ea...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-24 15:36 UTC by Rob Riggs
Modified: 2014-03-10 14:39 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-03-10 14:39:00 UTC
Type: ---
jforbes: needinfo?


Attachments (Terms of Use)
File: dmesg (166.10 KB, text/plain)
2013-11-24 15:36 UTC, Rob Riggs
no flags Details

Description Rob Riggs 2013-11-24 15:36:18 UTC
Additional info:
reporter:       libreport-2.1.9
BUG: unable to handle kernel NULL pointer dereference at 00000300
IP: [<c046983a>] get_work_pool+0x3a/0x60
*pdpt = 000000002ff52001 *pde = 0000000000000000 
Oops: 0000 [#1] SMP 
Modules linked in: tcp_lp fuse nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security rfcomm iptable_raw bnep iTCO_wdt iTCO_vendor_support snd_hda_codec_realtek snd_hda_intel coretemp arc4 snd_hda_codec btusb rt2800pci microcode bluetooth snd_hwdep rt2800lib rt2x00pci snd_seq rt2x00mmio rt2x00lib serio_raw snd_seq_device eeprom_93cx6 lpc_ich i2c_i801 mac80211 snd_pcm mfd_core cfg80211 crc_ccitt r8169 mii snd_page_alloc snd_timer eeepc_laptop snd soundcore sparse_keymap acpi_cpufreq rfkill mperf uinput nfsd auth_rpcgss nfs_acl lockd sunrpc ums_realtek usb_storage i915 ata_generic i2c_algo_bit drm_kms_helper pata_acpi drm i2c_core video
CPU: 0 PID: 5956 Comm: xastir Not tainted 3.11.6-200.fc19.i686.PAE #1
Hardware name: System manufacturer B202/P5LD2EB-DHS, BIOS 1111    07/15/2009
task: f06f7480 ti: f1482000 task.ti: f1482000
EIP: 0060:[<c046983a>] EFLAGS: 00210046 CPU: 0
EIP is at get_work_pool+0x3a/0x60
EAX: ef523e00 EBX: f0461000 ECX: f75dd3c0 EDX: 00000300
ESI: ef523e00 EDI: f0461000 EBP: f1483e78 ESP: f1483e78
 DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
CR0: 8005003b CR2: 00000300 CR3: 2feaa000 CR4: 000007e0
Stack:
 f1483eb4 c046c2a2 f1cc9a7c f75eb408 00200296 ef522800 00200296 f1483eac
 c073a641 f04612a4 ef522800 ef522800 f0461000 ef522800 f0461000 f1483ebc
 c046c39d f1483ec4 c074066d f1483f3c c073d001 c0d353c0 f06f7480 00000000
Call Trace:
 [<c046c2a2>] __flush_work+0x22/0x110
 [<c073a641>] ? set_room+0x61/0xc0
 [<c046c39d>] flush_work+0xd/0x10
 [<c074066d>] tty_flush_to_ldisc+0x1d/0x30
 [<c073d001>] n_tty_read+0x151/0x730
 [<c073ed87>] ? tty_ldisc_try+0x37/0x50
 [<c04804b0>] ? wake_up_state+0x20/0x20
 [<c073ceb0>] ? is_ignored+0x40/0x40
 [<c073828a>] tty_read+0x6a/0xb0
 [<c073ceb0>] ? is_ignored+0x40/0x40
 [<c0738220>] ? tty_fasync+0x40/0x40
 [<c05600e0>] vfs_read+0x80/0x150
 [<c0560869>] SyS_read+0x49/0x90
 [<c09a028d>] sysenter_do_call+0x12/0x28
Code: c1 ea 05 81 fa ff ff ff 07 74 36 a1 e0 16 d5 c0 85 c0 74 08 89 d1 30 c9 3b 08 74 15 b8 e0 16 d5 c0 e8 0b 27 22 00 5d c3 90 30 d2 <8b> 02 5d c3 66 90 0f b6 d2 83 c2 08 8b 44 90 04 5d c3 8d 74 26
EIP: [<c046983a>] get_work_pool+0x3a/0x60 SS:ESP 0068:f1483e78
CR2: 0000000000000300

Comment 1 Rob Riggs 2013-11-24 15:36:31 UTC
Created attachment 828345 [details]
File: dmesg

Comment 2 Justin M. Forbes 2014-01-03 22:03:33 UTC
*********** MASS BUG UPDATE **************

We apologize for the inconvenience.  There is a large number of bugs to go through and several of them have gone stale.  Due to this, we are doing a mass bug update across all of the Fedora 19 kernel bugs.

Fedora 19 has now been rebased to 3.12.6-200.fc19.  Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.

If you have moved on to Fedora 20, and are still experiencing this issue, please change the version to Fedora 20.

If you experience different issues, please open a new bug report for those.

Comment 3 Justin M. Forbes 2014-03-10 14:39:00 UTC
*********** MASS BUG UPDATE **************

This bug has been in a needinfo state for more than 1 month and is being closed with insufficient data due to inactivity. If this is still an issue with Fedora 19, please feel free to reopen the bug and provide the additional information requested.


Note You need to log in before you can comment on or make changes to this bug.