Bug 1282834 - [abrt] general protection fault in kmem_cache_alloc_trace
[abrt] general protection fault in kmem_cache_alloc_trace
Status: CLOSED DUPLICATE of bug 1278561
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
23
x86_64 Unspecified
unspecified Severity unspecified
: ---
: ---
Assigned To: Kernel Maintainer List
Fedora Extras Quality Assurance
https://retrace.fedoraproject.org/faf...
abrt_hash:7bec1d850402f16784a7fbd1337...
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2015-11-17 10:03 EST by Vinicius Reis
Modified: 2015-11-17 10:12 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-11-17 10:12:25 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
File: dmesg (66.55 KB, text/plain)
2015-11-17 10:03 EST, Vinicius Reis
no flags Details

  None (edit)
Description Vinicius Reis 2015-11-17 10:03:30 EST
Description of problem:
Hanged while booting

Additional info:
reporter:       libreport-2.6.3
general protection fault: 0000 [#1] SMP 
Modules linked in: pcc_cpufreq(-) acpi_cpufreq(-) i2c_designware_platform(+) i2c_designware_core nfsd auth_rpcgss nfs_acl lockd grace sunrpc hid_sensor_hub hid_multitouch i915 i2c_algo_bit drm_kms_helper drm serio_raw sdhci_acpi sdhci mmc_core video i2c_hid
CPU: 3 PID: 546 Comm: systemd-udevd Not tainted 4.2.5-300.fc23.x86_64 #1
Hardware name: Dell Inc. Inspiron 7348/0RTGX8, BIOS A07 07/07/2015
task: ffff880253821d80 ti: ffff8802538cc000 task.ti: ffff8802538cc000
RIP: 0010:[<ffffffff811ffba2>]  [<ffffffff811ffba2>] kmem_cache_alloc_trace+0x82/0x220
RSP: 0018:ffff8802538cfb28  EFLAGS: 00010246
RAX: 00ff8802521059c0 RBX: 00000000000080d0 RCX: 0000000000000000
RDX: 000000000000288b RSI: 00000000000080d0 RDI: 0000000000019bc0
RBP: ffff8802538cfb68 R08: ffff88025ecd9bc0 R09: ffffffff8139f3ef
R10: 00ff8802521059c0 R11: 0000000000000016 R12: 00000000000080d0
R13: ffff880256003b00 R14: 0000000000000040 R15: ffff880256003b00
FS:  00007f8660dce8c0(0000) GS:ffff88025ecc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f865e73e9c0 CR3: 0000000253838000 CR4: 00000000003406e0
Stack:
 ffff8802538cfb88 ffffffff8139f3ef ffffffffa024d150 ffffffffa024d150
 ffffffffa024d150 ffffffff81a6f7ff ffffffff81cce8e0 ffffffffa024d100
 ffff8802538cfb88 ffffffff8139f3ef ffff8802538cfb88 ffffffffa024d150
Call Trace:
 [<ffffffff8139f3ef>] ? kobject_create+0x1f/0x40
 [<ffffffff8139f3ef>] kobject_create+0x1f/0x40
 [<ffffffff8139f428>] kobject_create_and_add+0x18/0x70
 [<ffffffff814e4dcb>] module_add_driver+0xcb/0xe0
 [<ffffffff814cfab1>] bus_add_driver+0x151/0x280
 [<ffffffffa0250000>] ? 0xffffffffa0250000
 [<ffffffff814d1350>] driver_register+0x60/0xe0
 [<ffffffff814d289a>] __platform_driver_register+0x4a/0x50
 [<ffffffffa0250017>] dw_i2c_init_driver+0x17/0x1000 [i2c_designware_platform]
 [<ffffffff81002123>] do_one_initcall+0xb3/0x200
 [<ffffffff811ffcbe>] ? kmem_cache_alloc_trace+0x19e/0x220
 [<ffffffff81771a3c>] ? do_init_module+0x28/0x1e7
 [<ffffffff81771a74>] do_init_module+0x60/0x1e7
 [<ffffffff8112310f>] load_module+0x20ef/0x2730
 [<ffffffff8111f4b0>] ? __symbol_put+0x60/0x60
 [<ffffffff811238a4>] SyS_init_module+0x154/0x1a0
 [<ffffffff810238e5>] ? syscall_trace_leave+0xb5/0x110
 [<ffffffff817791ee>] entry_SYSCALL_64_fastpath+0x12/0x71
Code: 83 78 10 00 4d 8b 10 0f 84 43 01 00 00 4d 85 d2 0f 84 3a 01 00 00 49 63 45 20 49 8b 7d 00 4c 01 d0 40 f6 c7 0f 0f 85 6c 01 00 00 <48> 8b 18 48 8d 4a 01 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 
RIP  [<ffffffff811ffba2>] kmem_cache_alloc_trace+0x82/0x220
 RSP <ffff8802538cfb28>
Comment 1 Vinicius Reis 2015-11-17 10:03:40 EST
Created attachment 1095503 [details]
File: dmesg
Comment 2 Josh Boyer 2015-11-17 10:12:25 EST

*** This bug has been marked as a duplicate of bug 1278561 ***

Note You need to log in before you can comment on or make changes to this bug.