Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 290834 Details for
Bug 427503
kernel BUG at kernel/auditsc.c:1213! invalid opcode: 0000 [1] SMP
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
syslog
BUG (text/plain), 5.36 KB, created by
Vlado Potisk
on 2008-01-04 09:45:06 UTC
(
hide
)
Description:
syslog
Filename:
MIME Type:
Creator:
Vlado Potisk
Created:
2008-01-04 09:45:06 UTC
Size:
5.36 KB
patch
obsolete
>kernel: ------------[ cut here ]------------ >kernel: kernel BUG at kernel/auditsc.c:1213! >kernel: invalid opcode: 0000 [1] SMP >kernel: CPU 0 >kernel: Modules linked in: vfat fat usb_storage ipv6 ipt_LOG xt_tcpudp nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink ipt_REJECT xt_multiport iptable_filter ip_tables x_tables cpufreq_ondemand sha256 aes cbc blkcipher dm_crypt ext2 snd_intel8x0 snd_ac97_codec ac97_bus snd_usb_audio snd_usb_lib snd_rawmidi snd_hwdep snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq parport_pc snd_seq_device parport firewire_ohci snd_pcm_oss k8temp firewire_core snd_mixer_oss hwmon floppy pcspkr crc_itu_t snd_pcm snd_timer snd soundcore sky2 forcedeth snd_page_alloc button i2c_nforce2 i2c_core sg sr_mod cdrom pata_amd dm_snapshot dm_zero dm_mirror dm_mod sata_nv ata_generic libata sd_mod scsi_mod raid456 async_xor async_memcpy async_tx xor raid1 ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd >kernel: Pid: 11262, comm: pam_console_app Not tainted 2.6.23.9-85.fc8 #1 >kernel: RIP: 0010:[<ffffffff81068488>] [<ffffffff81068488>] audit_syscall_entry+0xbd/0x174 >kernel: RSP: 0018:ffff8100399bdef8 EFLAGS: 00010206 >kernel: RAX: 0000000000001000 RBX: 0000000000813210 RCX: 0000000000813238 >kernel: RDX: 0000000000000003 RSI: 000000000000004e RDI: 00000000c000003e >kernel: RBP: ffff8100385d4800 R08: 0000000000001000 R09: 000000383a9529f0 >kernel: R10: 000000383a9529f0 R11: 0000000000000202 R12: ffffffffffffffa8 >kernel: R13: 0000000000000000 R14: ffff81002e75e000 R15: 00000000c000003e >kernel: FS: 00002aaaaaac4600(0000) GS:ffffffff813bd000(0000) knlGS:00000000f7fde8e0 >kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b >kernel: CR2: 00002aaaaaaad000 CR3: 0000000030e9f000 CR4: 00000000000006e0 >kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >kernel: Process pam_console_app (pid: 11262, threadinfo ffff8100399bc000, task ffff81002e75e000) >kernel: Stack: 000000383a9529f0 0000000000001000 0000000000813238 0000000000000003 >kernel: 0000004effffffa8 0000000000813210 0000000000813238 ffffffffffffffa8 >kernel: 0000000000000000 00007fff313d9e90 00007fff313d9700 ffffffff8100bce1 >kernel: Call Trace: >kernel: [<ffffffff8100bce1>] tracesys+0x71/0xda >kernel: >kernel: >kernel: Code: 0f 0b eb fe 83 3d 51 7b 48 00 00 0f 84 97 00 00 00 44 89 bd >kernel: RIP [<ffffffff81068488>] audit_syscall_entry+0xbd/0x174 >kernel: RSP <ffff8100399bdef8> >kernel: general protection fault: 0000 [2] SMP >kernel: CPU 0 >kernel: Modules linked in: vfat fat usb_storage ipv6 ipt_LOG xt_tcpudp nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink ipt_REJECT xt_multiport iptable_filter ip_tables x_tables cpufreq_ondemand sha256 aes cbc blkcipher dm_crypt ext2 snd_intel8x0 snd_ac97_codec ac97_bus snd_usb_audio snd_usb_lib snd_rawmidi snd_hwdep snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq parport_pc snd_seq_device parport firewire_ohci snd_pcm_oss k8temp firewire_core snd_mixer_oss hwmon floppy pcspkr crc_itu_t snd_pcm snd_timer snd soundcore sky2 forcedeth snd_page_alloc button i2c_nforce2 i2c_core sg sr_mod cdrom pata_amd dm_snapshot dm_zero dm_mirror dm_mod sata_nv ata_generic libata sd_mod scsi_mod raid456 async_xor async_memcpy async_tx xor raid1 ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd >kernel: Pid: 11262, comm: pam_console_app Tainted: G D 2.6.23.9-85.fc8 #1 >kernel: RIP: 0010:[<ffffffff810961de>] [<ffffffff810961de>] kmem_cache_free+0x3d/0xa6 >kernel: RSP: 0018:ffff8100399bdce8 EFLAGS: 00010246 >kernel: RAX: 5aede821cb40fede RBX: ffff8100385d4800 RCX: 0000000000000000 >kernel: RDX: 00000137f0000010 RSI: 5aede821cb40fede RDI: 0013000000010000 >kernel: RBP: 0013000000010000 R08: ffff8100399bdcf8 R09: 0000000000000282 >kernel: R10: 0000000000000ac9 R11: ffff810037cc69d8 R12: ffffffff8140f0c0 >kernel: R13: 0000000000000000 R14: 0000000000000000 R15: 00000000c000003e >kernel: FS: 00002aaaaaac4600(0000) GS:ffffffff813bd000(0000) knlGS:00000000f7fde8e0 >kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b >kernel: CR2: 00002aaaaaaad000 CR3: 0000000030e9f000 CR4: 00000000000006e0 >kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >kernel: Process pam_console_app (pid: 11262, threadinfo ffff8100399bc000, task ffff81002e75e000) >kernel: Stack: ffff8100385d4800 ffff8100385d4800 0000000000000000 ffffffff81069591 >kernel: ffff8100399bde48 ffff81002e75e000 0000000000000001 ffffffff81318b6b >kernel: ffff81002e75e000 ffffffff8103ab8f ffffffff8125cfd3 000000000000000b >kernel: Call Trace: >kernel: [<ffffffff81069591>] audit_free+0xeb/0x1c4 >kernel: [<ffffffff8103ab8f>] do_exit+0x257/0x7e5 >kernel: [<ffffffff8125cfd3>] _spin_unlock_irqrestore+0x8/0x9 >kernel: [<ffffffff8100d38d>] kernel_math_error+0x0/0x71 >kernel: [<ffffffff8100d7b3>] do_invalid_op+0x85/0x8f >kernel: [<ffffffff81068488>] audit_syscall_entry+0xbd/0x174 >kernel: [<ffffffff810f5525>] inode_has_perm+0x65/0x72 >kernel: [<ffffffff810f9d01>] selinux_inode_getattr+0x50/0x5e >kernel: [<ffffffff8125d47d>] error_exit+0x0/0x84 >kernel: [<ffffffff81068488>] audit_syscall_entry+0xbd/0x174 >kernel: [<ffffffff8100bce1>] tracesys+0x71/0xda >kernel: >kernel: >kernel: Code: 48 8b 06 48 6b d2 38 48 83 e0 fc 48 8d 34 10 48 8b 06 25 00 >kernel: RIP [<ffffffff810961de>] kmem_cache_free+0x3d/0xa6 >kernel: RSP <ffff8100399bdce8> >kernel: Fixing recursive fault but reboot is needed!
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 427503
: 290834