Bug 711291 - [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000022: TAINTED Die
Summary: [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000...
Keywords:
Status: CLOSED CANTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 15
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:a21955ce69d2c0edb06942500fe...
: 711307 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-07 06:19 UTC by Ronald Canete
Modified: 2011-06-07 17:50 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-07 17:32:27 UTC
Type: ---


Attachments (Terms of Use)

Description Ronald Canete 2011-06-07 06:19:11 UTC
abrt version: 2.0.1
architecture:   i686
cmdline:        ro root=/dev/mapper/VolGroup-lv_root rd_LVM_LV=VolGroup/lv_root rd_LVM_LV=VolGroup/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet
component:      kernel
kernel:         2.6.38.7-30.fc15.i686.PAE
kernel_tainted: 128
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: unable to handle kernel NULL pointer dereference at 00000022
reported_to:    kerneloops: URL=http://submit.kerneloops.org/submitoops.php
time:           Tue Jun  7 08:18:28 2011

backtrace:
:BUG: unable to handle kernel NULL pointer dereference at 00000022
:IP: [<00000022>] 0x22
:*pdpt = 0000000019138001 *pde = 000000011e4d7067 
:Oops: 0010 [#1] SMP 
:last sysfs file: /sys/devices/pci0000:00/0000:00:1d.7/usb2/speed
:Modules linked in: nls_utf8 udf ses enclosure usb_storage uas fuse ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat xt_CHECKSUM iptable_mangle bridge stp llc vboxnetadp vboxnetflt vboxdrv sunrpc cpufreq_ondemand acpi_cpufreq mperf ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables btusb bluetooth uvcvideo videodev virtio_net kvm_intel kvm snd_hda_codec_idt snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm dell_wmi b44 sparse_keymap arc4 r852 ssb sm_common iwl3945 dell_laptop iwlcore nand dcdbas nand_ids microcode nand_ecc mtd iTCO_wdt mii mac80211 cfg80211 joydev iTCO_vendor_support snd_timer i2c_i801 snd rfkill soundcore snd_page_alloc wmi ipv6 sdhci_pci firewire_ohci sdhci mmc_core firewire_core crc_itu_t i915 drm_kms_helper drm i2c_algo_bit i2c_core video [last unloaded: scsi_wait_scan]
:Pid: 6713, comm: umount Not tainted 2.6.38.7-30.fc15.i686.PAE #1 Dell Inc. Inspiron 1520                   /0KY767
:EIP: 0060:[<00000022>] EFLAGS: 00010206 CPU: 1
:EIP is at 0x22
:EAX: f1913180 EBX: 00000022 ECX: 00000010 EDX: eeb331d0
:ESI: eeb331d0 EDI: 00000000 EBP: eba63d5c ESP: eba63d54
: DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
:Process umount (pid: 6713, ti=eba62000 task=ebc08c90 task.ti=eba62000)
:Stack:
: c05be0aa f1913180 eba63d88 c05c25c9 ecc58000 00000000 00000001 01a63d90
: 00000001 02000000 f1913180 00000010 04000000 eba63dcc c05c2e99 00000010
: 00000000 00000000 f451cd00 00000000 00000000 00000002 f451cd00 f71fce40
:Call Trace:
: [<c05be0aa>] ? elv_set_request+0x17/0x25
: [<c05c25c9>] get_request+0x186/0x21c
: [<c05c2e99>] get_request_wait+0x2b/0x132
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c05c2fda>] blk_get_request+0x3a/0x63
: [<c06953c8>] scsi_execute+0x26/0x110
: [<c06954e6>] ? scsi_execute_req+0x34/0xad
: [<c0695537>] scsi_execute_req+0x85/0xad
: [<c0691c33>] ioctl_internal_command.constprop.1+0x6f/0x15f
: [<c0691d73>] scsi_set_medium_removal+0x50/0x87
: [<c04bbc9f>] ? truncate_inode_pages_range+0x18c/0x209
: [<c06a2bf7>] sr_lock_door+0x1b/0x1d
: [<c06c1795>] cdrom_release+0x180/0x1e2
: [<c04697f4>] ? smp_call_function_many+0xdd/0x1b4
: [<c0435b4e>] ? __might_sleep+0x29/0xe4
: [<c050cd1c>] ? brelse+0x11/0x13
: [<c042f67b>] ? should_resched+0xd/0x27
: [<c07e7d69>] ? _cond_resched+0xd/0x21
: [<c06a1cee>] sr_block_release+0x28/0x3f
: [<c0511248>] __blkdev_put+0xa7/0x135
: [<c05113b8>] blkdev_put+0xe2/0xe7
: [<c04ef407>] kill_block_super+0x5c/0x60
: [<c04ef5de>] deactivate_locked_super+0x1f/0x40
: [<c04eff6f>] deactivate_super+0x2e/0x31
: [<c0501b1c>] mntput_no_expire+0xb5/0xb9
: [<c05023ba>] sys_umount+0x270/0x297
: [<c04f5422>] ? path_put+0x1a/0x1d
: [<c040969f>] sysenter_do_call+0x12/0x28
:Code:  Bad EIP value.

event_log:
:2011-06-07-09:19:03> Submitting oops report to http://submit.kerneloops.org/submitoops.php
:2011-06-07-09:19:05  Kernel oops report was uploaded

Comment 1 Dave Jones 2011-06-07 17:32:27 UTC
this is likely a problem with virtualbox.

Comment 2 Dave Jones 2011-06-07 17:32:43 UTC
*** Bug 711307 has been marked as a duplicate of this bug. ***

Comment 3 Dave Jones 2011-06-07 17:50:55 UTC
hmm, that said, there are also some similar traces in bugzilla from vmware, and also from qemu.  This might be indicative of a bug with virtual block devices.

bug 708718 is the untainted qemu bug (this is the one that we'll focus on, given the lack of tainted modules if you want to follow along).

bug 709946 is an example of one of the vmware traces.


Note You need to log in before you can comment on or make changes to this bug.