Bug 757420 - [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 0000000000000030
Summary: [abrt] kernel: BUG: unable to handle kernel NULL pointer dereference at 00000...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 16
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Eric Sandeen
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:0d6d9ef70c62139c41f1200048b...
: 757616 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-11-26 23:11 UTC by kossack
Modified: 2012-03-01 15:28 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-03-01 15:28:43 UTC
Type: ---


Attachments (Terms of Use)
File: smolt_data (2.81 KB, text/plain)
2011-11-26 23:11 UTC, kossack
no flags Details
File: backtrace (2.62 KB, text/plain)
2011-11-26 23:11 UTC, kossack
no flags Details

Description kossack 2011-11-26 23:11:13 UTC
libreport version: 2.0.7
abrt_version:   2.0.6
cmdline:        BOOT_IMAGE=/vmlinuz-3.1.2-1.fc16.x86_64 root=/dev/mapper/vg_fedora-lv_root ro rd.md=0 rd.dm=0 rd.lvm.lv=vg_fedora/lv_swap KEYTABLE=us quiet SYSFONT=latarcyrheb-sun16 rhgb rd.lvm.lv=vg_fedora/lv_root rd.luks=0 LANG=en_US.UTF-8
kernel:         3.1.1-2.fc16.x86_64
reason:         BUG: unable to handle kernel NULL pointer dereference at 0000000000000030
time:           Sat 26 Nov 2011 08:48:11 AM PST

backtrace:      Text file, 2681 bytes
smolt_data:     Text file, 2877 bytes

Comment 1 kossack 2011-11-26 23:11:17 UTC
Created attachment 536948 [details]
File: smolt_data

Comment 2 kossack 2011-11-26 23:11:18 UTC
Created attachment 536949 [details]
File: backtrace

Comment 3 Josh Boyer 2011-11-28 14:22:14 UTC
BUG: unable to handle kernel NULL pointer dereference at 0000000000000030
IP: [<ffffffff81127749>] __dentry_open+0x1a5/0x2b8
PGD 121d45067 PUD 121cd6067 PMD 0 
Oops: 0000 [#1] SMP 
CPU 2 
Modules linked in: ppdev parport_pc lp parport fuse lockd ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack uinput sunrpc cdc_acm arc4 sparse_keymap snd_hda_codec_idt snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm microcode i2c_i801 serio_raw iTCO_wdt iTCO_vendor_support rtl8192ce rtl8192c_common rtlwifi mac80211 jmb38x_ms cfg80211 jme memstick mii rfkill snd_timer snd soundcore snd_page_alloc sdhci_pci sdhci mmc_core wmi i915 drm_kms_helper drm i2c_algo_bit i2c_core video [last unloaded: scsi_wait_scan]
Pid: 893, comm: systemd-logind Not tainted 3.1.1-2.fc16.x86_64 #1 Standard XS35/B10IE01
RIP: 0010:[<ffffffff81127749>]  [<ffffffff81127749>] __dentry_open+0x1a5/0x2b8
RSP: 0018:ffff880121c71cb8  EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff880131a91700 RCX: 0000000000000000
RDX: ffff880130079f90 RSI: ffff8801300799a0 RDI: ffff880131a91770
RBP: ffff880121c71d08 R08: ffff880130079f90 R09: 0000000000000122
R10: 0000000000000122 R11: 0000000000000122 R12: ffff880134737e00
R13: ffff880130079900 R14: ffffffff81144f00 R15: ffff880136b258c0
FS:  00007f36d6da67c0(0000) GS:ffff88013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000030 CR3: 0000000121d2e000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process systemd-logind (pid: 893, threadinfo ffff880121c70000, task ffff8801344ddcc0)
Stack:
 ffff880121c71cc8 ffffffff814b714e ffff880121c71ce8 ffff88012e333d80
 ffff88012e333d80 ffff880121c71e48 0000000000000000 ffff880136b258c0
 0000000000000000 ffff880130057300 ffff880121c71d38 ffffffff81128647
Call Trace:
 [<ffffffff814b714e>] ? _raw_spin_lock+0xe/0x10
 [<ffffffff81128647>] nameidata_to_filp+0x60/0x67
 [<ffffffff81134ccc>] do_last+0x461/0x5ad
 [<ffffffff81134f1a>] path_openat+0xcf/0x310
 [<ffffffff81135258>] do_filp_open+0x38/0x86
 [<ffffffff8113e810>] ? alloc_fd+0x72/0x11d
 [<ffffffff811286bc>] do_sys_open+0x6e/0x100
 [<ffffffff810a37c4>] ? audit_syscall_entry+0x145/0x171
 [<ffffffff81128781>] sys_openat+0x11/0x13
 [<ffffffff814bd902>] system_call_fastpath+0x16/0x1b
Code: 85 c0 75 74 8b 43 3c 83 e0 03 ff c8 75 08 f0 41 ff 87 28 02 00 00 48 8b 83 c8 00 00 00 81 63 38 3f fc ff ff 48 8d 7b 70 48 8b 00 
RIP  [<ffffffff81127749>] __dentry_open+0x1a5/0x2b8
 RSP <ffff880121c71cb8>
CR2: 0000000000000030

Comment 4 Josh Boyer 2011-11-28 16:16:39 UTC
*** Bug 757616 has been marked as a duplicate of this bug. ***

Comment 5 Chuck Ebbert 2011-11-29 01:38:33 UTC
Did this happen after a suspend/resume cycle?


Note You need to log in before you can comment on or make changes to this bug.