Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 585546 Details for
Bug 823129
[abrt] kernel: general protection fault: 0000 [#1] SMP
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.04 KB, created by
nanopath
on 2012-05-19 10:47:34 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
nanopath
Created:
2012-05-19 10:47:34 UTC
Size:
4.04 KB
patch
obsolete
>general protection fault: 0000 [#1] SMP >CPU 0 >Modules linked in: nls_utf8 hfsplus tcp_lp vfat fat usb_storage fuse be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi cxgb3 mdio ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi fcoe lockd libfcoe libfc scsi_transport_fc scsi_tgt 8021q garp stp llc ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter nf_conntrack_ipv4 nf_defrag_ipv4 ip6_tables xt_state nf_conntrack binfmt_misc snd_intel8x0 snd_intel8x0m snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm sunrpc p54pci p54common mac80211 snd_timer snd ppdev parport_pc cfg80211 irda uinput amd64_edac_mod edac_core sis900 soundcore shpchp snd_page_alloc rfkill parport i2c_sis96x edac_mce_amd serio_raw k8temp mii crc_ccitt joydev pata_acpi ata_generic firewire_ohci firewire_core crc_itu_t yenta_socket pata_sis video radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloaded: scsi_wait_scan] >Pid: 1660, comm: dolphin Tainted: G W 3.3.4-3.fc16.x86_64 #1 / >RIP: 0010:[<ffffffff812ce070>] [<ffffffff812ce070>] memcpy+0x10/0x120 >RSP: 0018:ffff880014d79860 EFLAGS: 00010202 >RAX: ffff880014d798e4 RBX: ffff880014d798e4 RCX: 0000000000000004 >RDX: 0000000000000004 RSI: 0005080000000800 RDI: ffff880014d798e4 >RBP: ffff880014d798b8 R08: 0000000000000002 R09: ffff880000000000 >R10: 000000000000000a R11: ffff880007fb4013 R12: 0000000000000004 >R13: 0000000000000004 R14: 0000000000000004 R15: ffff880018d1a300 >FS: 00007f01cb7f1840(0000) GS:ffff88003fc00000(0000) knlGS:00000000f77ba6c0 >CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >CR2: 0000003b9e9171c0 CR3: 0000000012cb8000 CR4: 00000000000006f0 >DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Process dolphin (pid: 1660, threadinfo ffff880014d78000, task ffff880014fd2e60) >Stack: > ffffffffa05e65ef ffff880000000000 0000160000000000 0000000000000002 > 0000000000000000 ffff880014d798f8 ffff880018d1a300 0000000000000002 > 000000000000006e ffff880014d79980 ffff880002a30000 ffff880014d79918 >Call Trace: > [<ffffffffa05e65ef>] ? hfsplus_bnode_read+0x9f/0x120 [hfsplus] > [<ffffffffa05e8ce9>] hfsplus_brec_find+0x79/0x150 [hfsplus] > [<ffffffffa05e95ae>] ? hfsplus_asc2uni+0x9e/0x240 [hfsplus] > [<ffffffffa05e8de7>] hfsplus_brec_read+0x27/0x70 [hfsplus] > [<ffffffffa05e59da>] hfsplus_lookup+0x1aa/0x2d0 [hfsplus] > [<ffffffff8112de3b>] ? lru_cache_add_lru+0x3b/0x60 > [<ffffffff81146538>] ? handle_pte_fault+0x458/0xad0 > [<ffffffff811fe15c>] ? ext4_getblk+0x8c/0x1e0 > [<ffffffff81205d08>] ? dx_release+0x28/0x50 > [<ffffffff81146f68>] ? handle_mm_fault+0x1f8/0x350 > [<ffffffff8126bcb4>] ? avc_has_perm_flags+0x74/0x90 > [<ffffffff8126bf90>] ? inode_has_perm+0x30/0x40 > [<ffffffff8126cec1>] ? selinux_inode_permission+0xd1/0x120 > [<ffffffff8116e212>] ? kmem_cache_alloc+0x72/0x150 > [<ffffffff811984c4>] ? __d_alloc+0x34/0x180 > [<ffffffff811985c0>] ? __d_alloc+0x130/0x180 > [<ffffffff8118c0a5>] d_alloc_and_lookup+0x45/0x90 > [<ffffffff81198c55>] ? d_lookup+0x35/0x60 > [<ffffffff8118dcb1>] do_lookup+0x2b1/0x3a0 > [<ffffffff8118f4bc>] path_lookupat+0x11c/0x740 > [<ffffffff8116e212>] ? kmem_cache_alloc+0x72/0x150 > [<ffffffff8118c5bb>] ? getname_flags+0x3b/0x280 > [<ffffffff8118fb11>] do_path_lookup+0x31/0xc0 > [<ffffffff81190ea9>] user_path_at_empty+0x59/0xa0 > [<ffffffff8126c216>] ? selinux_inode_getattr+0x36/0x40 > [<ffffffff81185de8>] ? cp_new_stat+0xf8/0x110 > [<ffffffff81190f01>] user_path_at+0x11/0x20 > [<ffffffff8118600a>] vfs_fstatat+0x3a/0x70 > [<ffffffff8118605e>] vfs_lstat+0x1e/0x20 > [<ffffffff811861fa>] sys_newlstat+0x1a/0x40 > [<ffffffff810d33fc>] ? __audit_syscall_entry+0xcc/0x310 > [<ffffffff810d3a16>] ? __audit_syscall_exit+0x3d6/0x410 > [<ffffffff815fbee9>] system_call_fastpath+0x16/0x1b >Code: 88 43 4e 48 83 c4 08 5b 5d c3 90 e8 8b fb ff ff eb e6 90 90 90 90 90 90 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 <f3> a4 c3 20 48 83 ea 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b >RIP [<ffffffff812ce070>] memcpy+0x10/0x120 > RSP <ffff880014d79860>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 823129
: 585546