Bug 1309170

Summary: [abrt] general protection fault in avc_has_perm_noaudit [CLOSED]
Product: [Fedora] Fedora Reporter: Matt <matt.perrone>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 23CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda, mchehab
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/58fb5b32ebd60940ff5cbbb14359c8dafc6d6f38
Whiteboard: abrt_hash:5ce7b051821ba944683fbf99d91366ef95717d2f;VARIANT_ID=workstation;
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-26 16:41:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: dmesg none

Description Matt 2016-02-17 04:31:31 UTC
Additional info:
reporter:       libreport-2.6.4
general protection fault: 0000 [#1] SMP 
Modules linked in: hidp rfcomm fuse cmac ccm xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ebtable_nat ebtable_filter ebtable_broute bridge stp llc ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_security ip6table_mangle ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_security iptable_mangle iptable_raw bnep uvcvideo btusb btrtl videobuf2_vmalloc btbcm videobuf2_core btintel videobuf2_memops v4l2_common bluetooth videodev media coretemp kvm_intel arc4 snd_hda_codec_idt kvm snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel crct10dif_pclmul snd_hda_codec crc32_pclmul crc32c_intel
 dell_wmi iTCO_wdt iwlmvm sparse_keymap iTCO_vendor_support mac80211 dell_laptop dcdbas iwlwifi snd_hda_core intel_ips dell_smm_hwmon snd_hwdep snd_seq snd_seq_device joydev snd_pcm snd_timer cfg80211 snd soundcore dell_smo8800 wmi video rfkill mei_me mei shpchp i2c_i801 lpc_ich acpi_cpufreq tpm_tis tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc amdkfd amd_iommu_v2 radeon i2c_algo_bit drm_kms_helper serio_raw ttm drm r8169 firewire_ohci sdhci_pci sdhci firewire_core mii mmc_core crc_itu_t fjes
CPU: 0 PID: 3399 Comm: sensors Not tainted 4.3.5-300.fc23.x86_64 #1
Hardware name: Dell Inc. Studio 1558/0NJWJR, BIOS A12 03/30/2011
task: ffff8801d2321cc0 ti: ffff8801d2ef8000 task.ti: ffff8801d2ef8000
RIP: 0010:[<ffffffff8132d147>]  [<ffffffff8132d147>] avc_has_perm_noaudit+0x77/0x120
RSP: 0018:ffff8801d2efbb70  EFLAGS: 00010286
RAX: ffcfffffffffffb2 RBX: 00000000000008e5 RCX: 0000000000000007
RDX: 0000000000000070 RSI: 000000000000001c RDI: 00000000000008e5
RBP: ffff8801d2efbbf0 R08: 0000000000000000 R09: ffff8801d2efbc04
R10: ffff8801d3b60d80 R11: 0000000000000000 R12: 0000000000000007
R13: 0000000000000000 R14: 000000000000001c R15: 0000000000400000
FS:  00007f09e06ac700(0000) GS:ffff8801dbc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f09e06be000 CR3: 00000000833d3000 CR4: 00000000000006f0
Stack:
 0000000000000000 0000000000000000 ffff8801d2efbbe8 ffffffff810d758b
 0000000000000000 ffff8801d5001700 00000000ffffffff 00000000000080d0
 ffff8801dbc1a140 0000000000000000 0000000065be2b4b 0000000000400000
Call Trace:
 [<ffffffff810d758b>] ? enqueue_task_fair+0xab/0x8e0
 [<ffffffff81331320>] selinux_inode_permission+0xb0/0x180
 [<ffffffff813294a1>] security_inode_permission+0x41/0x60
 [<ffffffff8122ecc4>] __inode_permission+0x44/0xb0
 [<ffffffff8122ed44>] inode_permission+0x14/0x50
 [<ffffffff81230f1b>] link_path_walk+0x7b/0x550
 [<ffffffff8122f00c>] ? path_init+0x1ec/0x380
 [<ffffffff812318a8>] path_openat+0xa8/0x1250
 [<ffffffff811e3e62>] ? unlink_anon_vmas+0xd2/0x1b0
 [<ffffffff81233bf1>] do_filp_open+0x91/0x100
 [<ffffffff812047c3>] ? kmem_cache_alloc+0x193/0x210
 [<ffffffff81232c26>] ? getname_flags+0x56/0x1f0
 [<ffffffff81240bcf>] ? __alloc_fd+0x3f/0x100
 [<ffffffff81222ffa>] do_sys_open+0x13a/0x230
 [<ffffffff8122310e>] SyS_open+0x1e/0x20
 [<ffffffff81781e2e>] entry_SYSCALL_64_fastpath+0x12/0x71
Code: 01 00 00 48 8b 04 c5 40 ed 01 82 65 ff 05 92 43 ce 7e 48 85 c0 75 0b eb 66 48 8b 40 28 48 85 c0 74 5d 48 83 e8 28 48 85 c0 74 54 <3b> 18 75 ea 66 3b 48 08 75 e4 44 3b 70 04 75 de 48 8d 50 0c 48 
RIP  [<ffffffff8132d147>] avc_has_perm_noaudit+0x77/0x120
 RSP <ffff8801d2efbb70>

Comment 1 Matt 2016-02-17 04:31:39 UTC
Created attachment 1127842 [details]
File: dmesg

Comment 2 Laura Abbott 2016-09-23 19:20:06 UTC
*********** MASS BUG UPDATE **************
 
We apologize for the inconvenience.  There is a large number of bugs to go through and several of them have gone stale.  Due to this, we are doing a mass bug update across all of the Fedora 23 kernel bugs.
 
Fedora 23 has now been rebased to 4.7.4-100.fc23.  Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.
 
If you have moved on to Fedora 24 or 25, and are still experiencing this issue, please change the version to Fedora 24 or 25.
 
If you experience different issues, please open a new bug report for those.

Comment 3 Laura Abbott 2016-10-26 16:41:07 UTC
*********** MASS BUG UPDATE **************
This bug is being closed with INSUFFICIENT_DATA as there has not been a response in 4 weeks. If you are still experiencing this issue, please reopen and attach the relevant data from the latest kernel you are running and any data that might have been requested previously.