Bug 1358555 - [abrt] general protection fault in strcmp
Summary: [abrt] general protection fault in strcmp
Keywords:
Status: CLOSED WORKSFORME
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 24
Hardware: x86_64
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:ee295ace2e93ac69b7551ffbf60...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-07-21 00:28 UTC by David McInnis
Modified: 2016-09-08 02:13 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-09-08 02:13:54 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: dmesg (55.35 KB, text/plain)
2016-07-21 00:28 UTC, David McInnis
no flags Details

Description David McInnis 2016-07-21 00:28:34 UTC
Description of problem:
more of the same

Additional info:
reporter:       libreport-2.7.1
general protection fault: 0000 [#1] 
SMP 
Modules linked in: ccm ip6t_REJECT nf_reject_ipv6 ip6t_rpfilter xt_conntrack ip_set nfnetlink ebtable_broute bridge stp llc ebtable_nat ip6table_mangle ip6table_security ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_raw iptable_mangle iptable_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables arc4 b43 bcma mac80211 coretemp snd_hda_codec_idt snd_hda_codec_generic kvm_intel cfg80211 snd_hda_intel snd_hda_codec kvm snd_hda_core iTCO_wdt snd_hwdep gpio_ich snd_seq iTCO_vendor_support dell_rbtn snd_seq_device dell_laptop dell_wmi sparse_keymap ppdev dell_smbios snd_pcm rfkill dcdbas irqbypass dell_smm_hwmon ssb lpc_ich mmc_core i2c_i801 snd_timer joydev snd shpchp acpi_cpufreq
 soundcore parport_pc wmi tpm_tis parport tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc i915 i2c_algo_bit drm_kms_helper ata_generic serio_raw drm pata_acpi video
CPU: 1 PID: 1245 Comm: panel-2-systeml Not tainted 4.6.4-301.fc24.x86_64 #1
Hardware name: Dell Inc. Latitude D430                   /0XW739, BIOS A09 01/04/2010
task: ffff88005cf1ba80 ti: ffff88005cc4c000 task.ti: ffff88005cc4c000
RIP: 0010:[<ffffffff813e4266>]  [<ffffffff813e4266>] strcmp+0x16/0x30
RSP: 0018:ffff88005cc4fb90  EFLAGS: 00010202
RAX: 0000000000000070 RBX: ffff88000001be40 RCX: 00000000fffffffe
RDX: ffff88007b3a4000 RSI: 3630a0013630a002 RDI: ffffffff81a33fe3
RBP: ffff88005cc4fb90 R08: ffff8800729eb1b8 R09: 0000000000000000
R10: ffffffff81a3b503 R11: ffffea0001733580 R12: ffff88005ccd5ffa
R13: ffff88005cc4fbfc R14: 0000000000000006 R15: ffffffff81a33fe2
FS:  00007fef17f5fa40(0000) GS:ffff88007f500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b9a365afa0 CR3: 000000005cf77000 CR4: 00000000000006e0
Stack:
 ffff88005cc4fbd0 ffffffff813758dd ffff88005bcda038 ffff880079fb05c8
 ffff88005bcda038 ffff880079fb05a0 ffff88007c814800 ffff88005ccd5000
 ffff88005cc4fc30 ffffffff8135e3b8 000000065bcda1a0 ffff88005cc40700
Call Trace:
 [<ffffffff813758dd>] security_genfs_sid+0x9d/0x150
 [<ffffffff8135e3b8>] inode_doinit_with_dentry+0x3a8/0x6a0
 [<ffffffff8135e7fc>] selinux_d_instantiate+0x1c/0x20
 [<ffffffff813589b2>] security_d_instantiate+0x32/0x50
 [<ffffffff81261f52>] d_add+0x42/0x60
 [<ffffffff812bfb3f>] proc_lookup_de+0x9f/0xb0
 [<ffffffff812bfb6b>] proc_lookup+0x1b/0x20
 [<ffffffff812ba33f>] proc_root_lookup+0x2f/0x40
 [<ffffffff812533dd>] lookup_real+0x1d/0x60
 [<ffffffff812584d6>] path_openat+0x926/0x15b0
 [<ffffffff8125a391>] do_filp_open+0x91/0x100
 [<ffffffff8126771f>] ? __alloc_fd+0x3f/0x170
 [<ffffffff81247ea0>] do_sys_open+0x130/0x220
 [<ffffffff81247fae>] SyS_open+0x1e/0x20
 [<ffffffff817e0772>] entry_SYSCALL_64_fastpath+0x1a/0xa4
Code: 01 0f b6 4e ff 48 83 c2 01 84 c9 88 4a ff 75 ed 5d c3 0f 1f 00 55 48 89 e5 eb 04 84 c0 74 18 48 83 c7 01 0f b6 47 ff 48 83 c6 01 <3a> 46 ff 74 eb 19 c0 83 c8 01 5d c3 31 c0 5d c3 66 2e 0f 1f 84 
RIP  [<ffffffff813e4266>] strcmp+0x16/0x30

Comment 1 David McInnis 2016-07-21 00:28:43 UTC
Created attachment 1182298 [details]
File: dmesg

Comment 2 David McInnis 2016-07-21 00:33:38 UTC
related to bug 1358546 & bug 1317235

Comment 3 David McInnis 2016-09-08 02:13:54 UTC
After the latest Kernel update I no longer have problems.


Note You need to log in before you can comment on or make changes to this bug.