Comment # 3 on bug 1173891 from
FWIW decoded stacktrace is below. The kernel seems to be
a1775d0843b12327f00c719acc05a8224f9ef596.

> BUG: kernel NULL pointer dereference, address: 0000000d
> #PF: supervisor read access in kernel mode
> #PF: error_code(0x0000) - not-present page
> *pde = 00000000
> Oops: 0000 [#1] SMP
> CPU: 1 PID: 13684 Comm: rpm Not tainted 5.7.5-1-default #1 openSUSE Tumbleweed (unreleased)
> Hardware name: Dell Inc. Latitude 2100                   /0W785N, BIOS A01 06/02/2009
> EIP: __vfs_write (include/linux/fs.h:3420)
> Code: 00 00 8b 73 24 89 55 b0 89 4d b4 89 f0 89 75 ac c1 e8 09 83 e0 02 81 e6 00 40 00 00 0f 85 fd 00 00 00 8b b3 a4 00 00 00 8b 36 <f6> 46 0d 20 0f 85 eb 00 00 00 f7 45 ac 00 10 00 00 75 15 8b b3 a4
> All code
> ========
>    0: 00 00                   add    %al,(%rax)
>    2: 8b 73 24                mov    0x24(%rbx),%esi
>    5: 89 55 b0                mov    %edx,-0x50(%rbp)
>    8: 89 4d b4                mov    %ecx,-0x4c(%rbp)
>    b: 89 f0                   mov    %esi,%eax
>    d: 89 75 ac                mov    %esi,-0x54(%rbp)
>   10: c1 e8 09                shr    $0x9,%eax
>   13: 83 e0 02                and    $0x2,%eax
>   16: 81 e6 00 40 00 00       and    $0x4000,%esi
>   1c: 0f 85 fd 00 00 00       jne    0x11f
>   22: 8b b3 a4 00 00 00       mov    0xa4(%rbx),%esi
>   28: 8b 36                   mov    (%rsi),%esi
>   2a:*        f6 46 0d 20             testb  $0x20,0xd(%rsi)          <-- trapping instruction
>   2e: 0f 85 eb 00 00 00       jne    0x11f
>   34: f7 45 ac 00 10 00 00    testl  $0x1000,-0x54(%rbp)
>   3b: 75 15                   jne    0x52
>   3d: 8b                      .byte 0x8b
>   3e: b3 a4                   mov    $0xa4,%bl
>
> Code starting with the faulting instruction
> ===========================================
>    0: f6 46 0d 20             testb  $0x20,0xd(%rsi)
>    4: 0f 85 eb 00 00 00       jne    0xf5
>    a: f7 45 ac 00 10 00 00    testl  $0x1000,-0x54(%rbp)
>   11: 75 15                   jne    0x28
>   13: 8b                      .byte 0x8b
>   14: b3 a4                   mov    $0xa4,%bl
> EAX: 00000000 EBX: ddb3a180 ECX: 00005e44 EDX: bfd3af6c
> ESI: 00000000 EDI: c28fdf7c EBP: c28fdf4c ESP: c28fdef4
> DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
> CR0: 80050033 CR2: 0000000d CR3: 32744000 CR4: 000006d0
> Call Trace:
> vfs_write (fs/read_write.c:560)
> ksys_write (fs/read_write.c:613)
> __ia32_sys_write (fs/read_write.c:621)
> do_int80_syscall_32 (arch/x86/entry/common.c:337)
> entry_INT80_32 (arch/x86/entry/entry_32.S:1085)


You are receiving this mail because: