Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 589958 Details for
Bug 829425
unable to handle kernel NULL pointer dereference at 00000040 - kernel panic when using signotec sigma usb signature tablet
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Another backtrace of a crash
backtrace (text/plain), 2.88 KB, created by
pi_raph
on 2012-06-06 16:59:46 UTC
(
hide
)
Description:
Another backtrace of a crash
Filename:
MIME Type:
Creator:
pi_raph
Created:
2012-06-06 16:59:46 UTC
Size:
2.88 KB
patch
obsolete
>BUG: unable to handle kernel NULL pointer dereference at 00000041 >IP: [<c0523ed6>] __kmalloc+0x76/0x150 >*pde = b8254067 >Oops: 0000 [#4] SMP >Modules linked in: fuse rfcomm bnep ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 ip6table_filter nf_defrag_ipv4 xt_state ip6_tables nf_conntrack uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core videodev media hid_multitouch dell_wmi_aio sparse_keymap ath3k btusb arc4 bluetooth snd_hda_codec_realtek dcdbas microcode serio_raw snd_hda_intel ath9k snd_hda_codec ath9k_common ath9k_hw ath snd_hwdep snd_pcm i2c_i801 mac80211 snd_page_alloc snd_timer iTCO_wdt cfg80211 iTCO_vendor_support r8169 mii rfkill snd soundcore uinput nouveau i915 mxm_wmi i2c_algo_bit wmi video drm_kms_helper ttm drm i2c_core [last unloaded: scsi_wait_scan] >Pid: 2049, comm: abrt-dump-oops Tainted: G D 3.3.7-1.fc17.i686 #1 Dell Inc. Vostro 360 /0WM825 >EIP: 0060:[<c0523ed6>] EFLAGS: 00010246 CPU: 3 >EIP is at __kmalloc+0x76/0x150 >EAX: 00000000 EBX: 00000000 ECX: 00000041 EDX: 000067cc >ESI: c0c4b9e8 EDI: f3c02380 EBP: f0e37bc4 ESP: f0e37b9c > DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 >Process abrt-dump-oops (pid: 2049, ti=f0e36000 task=f0243240 task.ti=f0e36000) >Stack: > 00000130 00080000 f6865940 c05c3ae6 00000038 00008050 00000041 00000000 > f044c248 00000000 f0e37c14 c05c3ae6 f0e37c58 c0615990 f0e37c48 0007f9d0 > f6b641c0 00000041 f5cf7280 ffffffff 00000000 00000002 f0e37c14 00000000 >Call Trace: > [<c05c3ae6>] ? ext4_ext_find_extent+0x2b6/0x330 > [<c05c3ae6>] ext4_ext_find_extent+0x2b6/0x330 > [<c0615990>] ? type_attribute_bounds_av.isra.13+0x40/0x260 > [<c05c535a>] ext4_ext_map_blocks+0x16a/0x1d00 > [<c06158b7>] ? context_struct_compute_av+0x327/0x3c0 > [<c060147d>] ? avc_alloc_node+0x1d/0x110 > [<c0601ab6>] ? avc_has_perm_noaudit+0x266/0x300 > [<c0509883>] ? handle_pte_fault+0x3b3/0x8d0 > [<c059ca40>] ext4_map_blocks+0x50/0x2f0 > [<c06026c9>] ? inode_has_perm.isra.30+0x39/0x50 > [<c060754b>] ? selinux_inode_permission+0xcb/0x120 > [<c059cd22>] ext4_getblk+0x42/0x1b0 > [<c05a48ec>] ext4_find_entry+0x20c/0x5e0 > [<c060754b>] ? selinux_inode_permission+0xcb/0x120 > [<c0523bd9>] ? kmem_cache_alloc+0x29/0x120 > [<c0548eb2>] ? __d_alloc+0x22/0x110 > [<c05a4d05>] ext4_lookup+0x45/0x130 > [<c0548f67>] ? __d_alloc+0xd7/0x110 > [<c053df87>] d_alloc_and_lookup+0x37/0x70 > [<c053e43c>] __lookup_hash.part.27+0x9c/0xc0 > [<c05ff50a>] ? security_inode_permission+0x1a/0x20 > [<c053eda3>] lookup_hash+0x33/0x40 > [<c054147b>] kern_path_create+0x5b/0xe0 > [<c065a888>] ? strncpy_from_user+0x38/0x70 > [<c053e163>] ? getname_flags+0xb3/0x160 > [<c0541539>] user_path_create+0x39/0x60 > [<c054285d>] sys_mkdirat+0x2d/0xc0 > [<c0542916>] sys_mkdir+0x26/0x30 > [<c09281f4>] syscall_call+0x7/0xb >Code: 64 03 05 28 67 c4 c0 8b 50 04 8b 08 85 c9 89 4d f0 0f 84 88 00 00 00 8b 37 f7 c6 07 00 00 00 0f 85 ae 00 00 00 8b 47 14 8b 4d f0 <8b> 1c 01 8d 4a 01 8b 45 f0 64 0f c7 0e 0f 94 c0 84 c0 74 bf f7
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 829425
:
589957
| 589958 |
589959
|
590680