Bug 747221 - [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000004: TAINTED -------D
Summary: [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000...
Keywords:
Status: CLOSED DUPLICATE of bug 750389
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 15
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:4a8306ffe74b4cb74c0683f7771...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-10-19 06:24 UTC by geminic86
Modified: 2011-11-29 12:50 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2011-11-29 12:50:14 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description geminic86 2011-10-19 06:24:41 UTC
abrt version: 2.0.3
architecture:   i686
cmdline:        ro root=/dev/mapper/vg_biggirl-lv_root rd_LVM_LV=vg_biggirl/lv_root rd_LVM_LV=vg_biggirl/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet
comment:        Running squid
component:      kernel
kernel:         2.6.40.6-0.fc15.i686
kernel_tainted: 128
kernel_tainted_long: Kernel has oopsed before.
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: unable to handle kernel NULL pointer dereference at 00000004
time:           Sat Oct 15 16:31:28 2011

backtrace:
:BUG: unable to handle kernel NULL pointer dereference at 00000004
:IP: [<c069cfa7>] sd_revalidate_disk+0x25/0x17da
:*pde = 00000000 
:Oops: 0000 [#1] SMP 
:Modules linked in: vfat fat usb_storage uas tcp_lp fuse 8021q tpm_infineon garp stp llc sunrpc bnep bluetooth rfkill ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ip6table_filter ip6_tables snd_ens1371 gameport snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm pcnet32 snd_timer ppdev parport_pc parport snd soundcore mii snd_page_alloc i2c_piix4 vmw_balloon microcode i2c_core ipv6 mptspi mptscsih mptbase scsi_transport_spi [last unloaded: mperf]
:Pid: 1593, comm: udisks-daemon Not tainted 2.6.40.6-0.fc15.i686 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
:EIP: 0060:[<c069cfa7>] EFLAGS: 00010246 CPU: 0
:EIP is at sd_revalidate_disk+0x25/0x17da
:EAX: 00000000 EBX: ee3cf400 ECX: 00000005 EDX: c069cf82
:ESI: ee3cf400 EDI: ffffff85 EBP: f2de9d40 ESP: f2de9cbc
: DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
:Process udisks-daemon (pid: 1593, ti=f2de8000 task=f2dc1940 task.ti=f2de8000)
:Stack:
: c042f9cc f2de9cc8 c07e9e14 f2de9ce8 f2de9cd4 c04297ff 00000000 f682be80
: f2de9ce8 ee3cf400 f682be80 ee3cf460 f682be00 f2de9d10 c05da19a ee3cf43c
: f2de9d04 c07e9e14 f2de9d18 c04ed0eb f682be80 00000000 f2de9d28 c04fc8b3
:Call Trace:
: [<c042f9cc>] ? __might_sleep+0x29/0xe4
: [<c07e9e14>] ? _raw_spin_lock+0xd/0xf
: [<c04297ff>] ? should_resched+0xd/0x27
: [<c05da19a>] ? kobject_put+0x46/0x4c
: [<c07e9e14>] ? _raw_spin_lock+0xd/0xf
: [<c04ed0eb>] ? get_super+0x1d/0x87
: [<c04fc8b3>] ? iput+0x28/0xfd
: [<c05ce4aa>] ? disk_part_iter_next+0x18/0xad
: [<c0530e33>] rescan_partitions+0x91/0x472
: [<c0467b7f>] ? module_refcount+0x6b/0x7c
: [<c067d139>] ? put_device+0x14/0x16
: [<c068d72d>] ? scsi_device_put+0x34/0x38
: [<c069b1ee>] ? scsi_disk_put+0x32/0x36
: [<c069bc76>] ? sd_open+0x18e/0x198
: [<c050f223>] __blkdev_get+0x179/0x333
: [<c050f57c>] blkdev_get+0x19f/0x270
: [<c07e9e14>] ? _raw_spin_lock+0xd/0xf
: [<c050f6b1>] blkdev_open+0x64/0x68
: [<c04e9fdc>] __dentry_open+0x15e/0x25c
: [<c04eae9d>] nameidata_to_filp+0x52/0x5e
: [<c050f64d>] ? blkdev_get+0x270/0x270
: [<c04f4e49>] do_last+0x416/0x52b
: [<c04f5931>] path_openat+0xa5/0x28d
: [<c05da19a>] ? kobject_put+0x46/0x4c
: [<c042f9cc>] ? __might_sleep+0x29/0xe4
: [<c04f5b44>] do_filp_open+0x2b/0x6c
: [<c05e1713>] ? strncpy_from_user+0x34/0x4e
: [<c04fe03a>] ? alloc_fd+0x53/0xbf
: [<c04eaf08>] do_sys_open+0x5f/0xe5
: [<c047ebcf>] ? audit_syscall_entry+0x128/0x14a
: [<c04eafb4>] sys_open+0x26/0x2c
: [<c07ea13c>] syscall_call+0x7/0xb
: [<c07e0000>] ? acpi_processor_add+0x2cf/0x4ea
:Code: 54 5b 5e 5f 5d c3 55 89 e5 57 56 53 83 ec 78 3e 8d 74 26 00 89 45 a0 65 a1 14 00 00 00 89 45 f0 31 c0 8b 45 a0 8b 80 e4 01 00 00 <8b> 58 04 89 45 c0 a1 7c 5d bf c0 89 5d b4 c1 e8 15 83 e0 07 83

Comment 1 Josh Boyer 2011-10-19 13:12:20 UTC
Can you recreate this reliably?  Have you seen it on a machine outside of VMWare?

Comment 2 Chuck Ebbert 2011-11-29 12:50:14 UTC

*** This bug has been marked as a duplicate of bug 750389 ***


Note You need to log in before you can comment on or make changes to this bug.