Bug 877580 - [abrt]: general protection fault: 0000 [#1] SMP
Summary: [abrt]: general protection fault: 0000 [#1] SMP
Keywords:
Status: CLOSED DUPLICATE of bug 867537
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 17
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Eric Paris
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:3f2af8ca978134f487de1f39aa7...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-17 00:27 UTC by Ben Greear
Modified: 2013-03-07 19:52 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-03-07 19:52:02 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Ben Greear 2012-11-17 00:27:11 UTC
Description of problem:
Was away from computer for a minute and it crashed.  I'd recently updated to this kernel
(2-3 days ago).  Had been stable for 1+ month before that.


Additional info:
libreport version: 2.0.18
abrt_version:   2.0.18
cmdline:        BOOT_IMAGE=/vmlinuz-3.6.6-1.fc17.x86_64 root=/dev/mapper/vg_ben--dt2-lv_root ro rd.md=0 rd.dm=0 rd.lvm.lv=vg_ben-dt2/lv_swap KEYTABLE=us rd.luks=0 rd.lvm.lv=vg_ben-dt2/lv_root SYSFONT=True LANG=en_US.UTF-8 rhgb quiet
kernel:         3.6.6-1.fc17.x86_64

backtrace:
:general protection fault: 0000 [#1] SMP 
:Modules linked in: nfsv3 fuse nfsv4 nfs dns_resolver fscache bnep bluetooth rfkill snd_hda_codec_hdmi snd_hda_codec_realtek binfmt_misc iTCO_wdt iTCO_vendor_support snd_hda_intel snd_hda_codec pl2303 snd_hwdep snd_seq coretemp snd_seq_device kvm_intel kvm snd_pcm snd_page_alloc microcode i2c_i801 snd_timer lpc_ich mfd_core snd r8169 soundcore mei mii uinput nfsd auth_rpcgss nfs_acl lockd sunrpc crc32c_intel ghash_clmulni_intel nouveau mxm_wmi wmi video i2c_algo_bit drm_kms_helper ttm drm i2c_core
:CPU 1 
:Pid: 1335, comm: pool Not tainted 3.6.6-1.fc17.x86_64 #1 Shuttle SZ77/FZ77
:RIP: 0010:[<ffffffff812e0bed>]  [<ffffffff812e0bed>] strnlen+0xd/0x40
:RSP: 0018:ffff8803eb55db18  EFLAGS: 00010286
:RAX: ffffffff819ce4af RBX: ffff8803896ec03b RCX: fffffffffffffffe
:RDX: 9df7d44be27bcff8 RSI: ffffffffffffffff RDI: 9df7d44be27bcff8
:RBP: ffff8803eb55db18 R08: 000000000000ffff R09: 000000000000ffff
:R10: 0000000000000000 R11: 0000000000000001 R12: 9df7d44be27bcff8
:R13: ffff8803896ec6c0 R14: 000000000000ffff R15: 0000000000000000
:FS:  00007ff6aef7b700(0000) GS:ffff88041ec40000(0000) knlGS:0000000000000000
:CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
:CR2: 00007f4cc7ff4000 CR3: 00000003e8cda000 CR4: 00000000000407e0
:DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
:DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
:Process pool (pid: 1335, threadinfo ffff8803eb55c000, task ffff8803e8cedc40)
:Stack:
: ffff8803eb55db58 ffffffff812e275e 00000000000006b0 ffff8803896ec03b
: ffff8803896ec6c0 ffff8803eb55dc50 ffffffff819cf6e2 ffffffff819cf6e2
: ffff8803eb55dbd8 ffffffff812e39a9 ffff880406b4d380 ffffffff819ce13d
:Call Trace:
: [<ffffffff812e275e>] string.isra.4+0x3e/0xd0
: [<ffffffff812e39a9>] vsnprintf+0x219/0x600
: [<ffffffff810d0463>] audit_log_vformat+0xe3/0x1d0
: [<ffffffff810d0592>] audit_log_format+0x42/0x50
: [<ffffffff81280463>] avc_audit_pre_callback+0xb3/0x140
: [<ffffffff812804f0>] ? avc_audit_pre_callback+0x140/0x140
: [<ffffffff812803b0>] ? avc_node_free+0x30/0x30
: [<ffffffff8129c618>] common_lsm_audit+0x68/0x6f0
: [<ffffffff812966b0>] ? security_compute_av+0xf0/0x2b0
: [<ffffffff81280784>] slow_avc_audit+0x54/0x80
: [<ffffffff81280a8d>] avc_has_perm_flags+0x14d/0x170
: [<ffffffff8128192a>] inode_has_perm.isra.31.constprop.61+0x2a/0x30
: [<ffffffff81282d57>] file_has_perm+0x97/0xb0
: [<ffffffff81285b52>] selinux_file_permission+0xb2/0x130
: [<ffffffff8127e90c>] security_file_permission+0x2c/0xb0
: [<ffffffff8118ed71>] rw_verify_area+0x61/0xf0
: [<ffffffff8118f061>] vfs_write+0x81/0x180
: [<ffffffff8118f3ba>] sys_write+0x4a/0x90
: [<ffffffff81625929>] system_call_fastpath+0x16/0x1b
:Code: c0 01 80 38 00 75 f7 48 29 f8 5d c3 31 c0 5d c3 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 85 f6 48 8d 4e ff 48 89 e5 74 2a <80> 3f 00 74 25 48 89 f8 31 d2 eb 10 0f 1f 80 00 00 00 00 48 83 
:RIP  [<ffffffff812e0bed>] strnlen+0xd/0x40
: RSP <ffff8803eb55db18>

Comment 1 Josh Boyer 2013-01-02 15:17:17 UTC
Looks like something in SELinux passed a bogus string and strnlen choked on it.

Comment 2 Josh Boyer 2013-03-07 19:52:02 UTC

*** This bug has been marked as a duplicate of bug 867537 ***


Note You need to log in before you can comment on or make changes to this bug.