kerneloops-0.12+git20090217/0000755000175000017500000000000011174101254014277 5ustar willywillykerneloops-0.12+git20090217/configfile.c0000644000175000017500000000416511174075563016573 0ustar willywilly/* * Copyright 2007, Intel Corporation * * This file is part of kerneloops.org * * This program file is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * You should have received a copy of the GNU General Public License * along with this program in a file named COPYING; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301 USA * * Authors: * Arjan van de Ven */ #define _GNU_SOURCE #include #include #include #include #include "kerneloops.h" /* 0 = No 1 = Ask 2 = Yes */ int opted_in; int allow_distro_to_pass_on; char *submit_url; char *log_file; void read_config_file(char *filename) { FILE *file; char *line = NULL; size_t dummy; file = fopen(filename, "r"); if (!file) return; while (!feof(file)) { char *c; line = NULL; if (getline(&line, &dummy, file) <= 0) { free(line); break; } if (line[0] == '#') { free(line); continue; } c = strstr(line, "allow-submit "); if (c) { c += 13; if (strstr(c, "yes")) opted_in = 2; if (strstr(c, "ask")) opted_in = 1; } c = strstr(line, "allow-pass-on "); if (c) { c += 14; if (strstr(c, "yes")) allow_distro_to_pass_on = 1; } c = strstr(line, "submit-url "); if (c) { c += 11; c = strstr(c, "http:"); if (c) submit_url = strdup(c); } c = strstr(line, "log-file "); if (c) { c += 9; while(*c) { if ( !isspace(*c) && *c != '=') break; c++; } if (*c) log_file = strdup(c); } free(line); } fclose(file); if (!submit_url) submit_url = strdup("http://submit.kerneloops.org/submitoops.php"); if (!log_file) log_file = strdup("/var/log/messages"); } kerneloops-0.12+git20090217/kerneloops.c0000644000175000017500000001351011174075563016641 0ustar willywilly/* * Copyright 2007, Intel Corporation * * This file is part of kerneloops.org * * This program file is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * You should have received a copy of the GNU General Public License * along with this program in a file named COPYING; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301 USA * * Authors: * Arjan van de Ven */ #include #include #include #include #include #include #include #include #include #include #include #include #include /* * Debian etch has an ancient glib2 library, work around */ #if !GLIB_CHECK_VERSION(2, 14, 0) #define g_timeout_add_seconds(a, b, c) g_timeout_add((a)*1000, b, c) #endif #include "kerneloops.h" static DBusConnection *bus; int pinged; int testmode; static DBusHandlerResult got_message( DBusConnection __unused *conn, DBusMessage *message, void __unused *user_data) { if (dbus_message_is_signal(message, "org.kerneloops.submit.ping", "ping")) { pinged = 1; return DBUS_HANDLER_RESULT_HANDLED; } if (dbus_message_is_signal(message, "org.kerneloops.submit.permission", "yes")) { submit_queue(); return DBUS_HANDLER_RESULT_HANDLED; } if (dbus_message_is_signal(message, "org.kerneloops.submit.permission", "always")) { submit_queue(); opted_in = 2; return DBUS_HANDLER_RESULT_HANDLED; } if (dbus_message_is_signal(message, "org.kerneloops.submit.permission", "never")) { clear_queue(); opted_in = 0; return DBUS_HANDLER_RESULT_HANDLED; } if (dbus_message_is_signal(message, "org.kerneloops.submit.permission", "no")) { clear_queue(); return DBUS_HANDLER_RESULT_HANDLED; } return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; } void dbus_ask_permission(char * detail_file_name) { DBusMessage *message; if (!bus) return; message = dbus_message_new_signal("/org/kerneloops/submit/permission", "org.kerneloops.submit.permission", "ask"); if (detail_file_name) { dbus_message_append_args(message, DBUS_TYPE_STRING, &detail_file_name, DBUS_TYPE_INVALID); } dbus_connection_send(bus, message, NULL); dbus_message_unref(message); } void dbus_say_thanks(char *url) { DBusMessage *message; if (!bus) return; if (url && strlen(url)) { message = dbus_message_new_signal("/org/kerneloops/submit/url", "org.kerneloops.submit.url", "url"); dbus_message_append_args (message, DBUS_TYPE_STRING, &url, DBUS_TYPE_INVALID); dbus_connection_send(bus, message, NULL); dbus_message_unref(message); syslog(LOG_WARNING, "kerneloops.org: oops is posted as %s", url); } message = dbus_message_new_signal("/org/kerneloops/submit/sent", "org.kerneloops.submit.sent", "sent"); dbus_connection_send(bus, message, NULL); dbus_message_unref(message); } int main(int argc, char**argv) { GMainLoop *loop; DBusError error; int godaemon = 1; /* * Signal the kernel that we're not timing critical */ #ifdef PR_SET_TIMERSLACK prctl(PR_SET_TIMERSLACK,1000*1000*1000, 0, 0, 0); #endif read_config_file("/etc/kerneloops.conf"); if (argc > 1 && strstr(argv[1], "--nodaemon")) godaemon = 0; if (argc > 1 && strstr(argv[1], "--debug")) { printf("Starting kerneloops in debug mode\n"); godaemon = 0; testmode = 1; opted_in = 2; } if (!opted_in && !testmode) { fprintf(stderr, " [Inactive by user preference]"); return EXIT_SUCCESS; } /* * the curl docs say that we "should" call curl_global_init early, * even though it'll be called later on via curl_easy_init(). * We ignore this advice, since 99.99% of the time this program * will not use http at all, but the curl code does consume * memory. */ /* curl_global_init(CURL_GLOBAL_ALL); */ if (godaemon && daemon(0, 0)) { printf("kerneloops failed to daemonize.. exiting \n"); return EXIT_FAILURE; } sched_yield(); loop = g_main_loop_new(NULL, FALSE); dbus_error_init(&error); bus = dbus_bus_get(DBUS_BUS_SYSTEM, &error); if (bus) { dbus_connection_setup_with_g_main(bus, NULL); dbus_bus_add_match(bus, "type='signal',interface='org.kerneloops.submit.ping'", &error); dbus_bus_add_match(bus, "type='signal',interface='org.kerneloops.submit.permission'", &error); dbus_connection_add_filter(bus, got_message, NULL, NULL); } /* we scan dmesg before /var/log/messages; dmesg is a more accurate source normally */ scan_dmesg(NULL); /* during boot... don't go too fast and slow the system down */ if (!testmode) sleep(10); scan_filename(log_file, 1); if (argc > 2 && strstr(argv[1], "--file")) scan_filename(argv[2], 1); if (testmode && argc > 2) { int q; for (q = 2; q < argc; q++) { printf("Scanning %s\n", argv[q]); scan_filename(argv[q], 0); } } if (testmode) { g_main_loop_unref(loop); dbus_bus_remove_match(bus, "type='signal',interface='org.kerneloops.submit.ping'", &error); dbus_bus_remove_match(bus, "type='signal',interface='org.kerneloops.submit.permission'", &error); free(submit_url); return EXIT_SUCCESS; } /* now, start polling for oopses to occur */ g_timeout_add_seconds(10, scan_dmesg, NULL); g_main_loop_run(loop); dbus_bus_remove_match(bus, "type='signal',interface='org.kerneloops.submit.ping'", &error); dbus_bus_remove_match(bus, "type='signal',interface='org.kerneloops.submit.permission'", &error); g_main_loop_unref(loop); free(submit_url); return EXIT_SUCCESS; } kerneloops-0.12+git20090217/kerneloops-applet.desktop0000644000175000017500000000031111174075563021346 0ustar willywilly[Desktop Entry] Name=kerneloops applet Comment=Kerneloops.org privacy question applet Icon=stock_alarm Exec=kerneloops-applet Terminal=false Type=Application Categories= X-GNOME-Autostart-enabled=true kerneloops-0.12+git20090217/kerneloops.dbus0000644000175000017500000000176411174075563017364 0ustar willywilly kerneloops-0.12+git20090217/kerneloops.init0000755000175000017500000000310411174075563017363 0ustar willywilly#!/bin/bash # # kerneloops # # chkconfig: 345 90 88 # description: A tool that collects and submits kernel crash \ # signatures to the kerneloops.org website for use by the Linux \ # kernel developers. # processname: kerneloops # config: /etc/kerneloops.conf # ### BEGIN INIT INFO # Provides: kerneloops # Default-Start: 3 4 5 # Default-Stop: 0 1 2 6 # Required-Start: $local_fs $remote_fs $named $network $time $syslog # Required-Stop: $local_fs $remote_fs $syslog # Short-Description: Tool to automatically collect and submit kernel crash signatures # Description: A tool that collects and submits kernel crash # signatures to the kerneloops.org website for use by the Linux # kernel developers. ### END INIT INFO # Source function library. . /etc/rc.d/init.d/functions exec="/usr/sbin/kerneloops" prog=$(basename $exec) sconf="/etc/kerneloops.conf" lockfile=/var/lock/subsys/$prog [ -e /etc/sysconfig/$prog ] && . /etc/sysconfig/$prog start() { echo -n $"Starting $prog:" daemon $prog $OPTS retval=$? echo [ $retval -eq 0 ] && touch $lockfile return $retval } stop() { echo -n $"Stopping $prog: " killproc $prog retval=$? echo [ $retval -eq 0 ] && rm -f $lockfile return $retval } restart() { stop start } reload() { restart } force_reload() { restart } fdr_status() { status $prog } case "$1" in start|stop|restart|reload) $1 ;; force-reload) force_reload ;; status) fdr_status ;; condrestart|try-restart) [ -f $lockfile ] || restart ;; *) echo $"Usage: $0 {start|stop|status|restart|try-restart|reload|force-reload}" exit 1 esac kerneloops-0.12+git20090217/dmesg.c0000644000175000017500000002323511174075563015564 0ustar willywilly#define _GNU_SOURCE /* * Copyright 2007, Intel Corporation * * This file is part of kerneloops.org * * This program file is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * You should have received a copy of the GNU General Public License * along with this program in a file named COPYING; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301 USA * * Authors: * Arjan van de Ven */ #include #include #include #include #include #include #include #include #include "kerneloops.h" static char **linepointer; static char *linelevel; static int linecount; #define MAX(A,B) ((A) > (B) ? (A) : (B)) /* * This function splits the dmesg buffer data into lines * (null terminated). The linepointer array is assumed to be * allocated already. */ static void fill_linepointers(char *buffer, int remove_syslog) { char *c; linecount = 0; c = buffer; while (c) { int len = 0; char *c9; c9 = strchr(c, '\n'); if (c9) len = c9 - c; /* in /var/log/messages, we need to strip the first part off, upto the 3rd ':' */ if (remove_syslog) { char *c2; /* skip non-kernel lines */ c2 = memmem(c, len, "kernel:", 7); if (!c2) c2 = memmem(c, len, "kerneloops:", 11); if (!c2) { c2 = c9; if (c2) { c = c2 + 1; continue; } else break; } c = strchr(c, ':'); if (!c) break; c++; c = strchr(c, ':'); if (!c) break; c++; c = strchr(c, ':'); if (!c) break; c++; if (*c) c++; } linepointer[linecount] = c; linelevel[linecount] = 0; /* store and remove kernel log level */ if (*c == '<' && *(c+2) == '>') { linelevel[linecount] = *(c+1); c = c + 3; linepointer[linecount] = c; } /* remove jiffies time stamp counter if present */ if (*c == '[') { char *c2, *c3; c2 = strchr(c, '.'); c3 = strchr(c, ']'); if (c2 && c3 && (c2 < c3) && (c3-c) < 14 && (c2-c) < 8) { c = c3+1; if (*c == ' ') c++; linepointer[linecount] = c; } } c = strchr(c, '\n'); /* turn the \n into a string termination */ if (c) { *c = 0; c = c+1; } /* if we see our own marker, we know we submitted everything upto here already */ if (strstr(linepointer[linecount], "www.kerneloops.org")) { linecount = 0; linepointer[0] = NULL; } linecount++; } } /* * extract_oops tries to find oops signatures in a log */ static void extract_oops(char *buffer, size_t buflen, int remove_syslog) { int i; char prevlevel = 0; int oopsstart = -1; int oopsend; int inbacktrace = 0; linepointer = calloc(buflen+1, sizeof(char*)); if (!linepointer) return; linelevel = calloc(buflen+1, sizeof(char)); if (!linelevel) { free(linepointer); linepointer = NULL; return; } fill_linepointers(buffer, remove_syslog); oopsend = linecount; i = 0; while (i < linecount) { char *c = linepointer[i]; if (c == NULL) { i++; continue; } if (oopsstart < 0) { /* find start-of-oops markers */ if (strstr(c, "general protection fault:")) oopsstart = i; if (strstr(c, "BUG:")) oopsstart = i; if (strstr(c, "kernel BUG at")) oopsstart = i; if (strstr(c, "do_IRQ: stack overflow:")) oopsstart = i; if (strstr(c, "RTNL: assertion failed")) oopsstart = i; if (strstr(c, "Eeek! page_mapcount(page) went negative!")) oopsstart = i; if (strstr(c, "near stack overflow (cur:")) oopsstart = i; if (strstr(c, "double fault:")) oopsstart = i; if (strstr(c, "Badness at")) oopsstart = i; if (strstr(c, "NETDEV WATCHDOG")) oopsstart = i; if (strstr(c, "WARNING:") && !strstr(c, "appears to be on the same physical disk")) oopsstart = i; if (strstr(c, "Unable to handle kernel")) oopsstart = i; if (strstr(c, "sysctl table check failed")) oopsstart = i; if (strstr(c, "------------[ cut here ]------------")) oopsstart = i; if (strstr(c, "list_del corruption.")) oopsstart = i; if (strstr(c, "list_add corruption.")) oopsstart = i; if (strstr(c, "Oops:") && i >= 3) oopsstart = i-3; if (oopsstart >= 0 && testmode) { printf("Found start of oops at line %i\n", oopsstart); printf(" start line is -%s-\n", linepointer[oopsstart]); if (oopsstart != i) printf(" trigger line is -%s-\n", c); } /* try to find the end marker */ if (oopsstart >= 0) { int i2; i2 = i+1; while (i2 < linecount && i2 < (i+50)) { if (strstr(linepointer[i2], "---[ end trace")) { inbacktrace = 1; i = i2; break; } i2++; } } } /* a calltrace starts with "Call Trace:" or with the " [<.......>] function+0xFF/0xAA" pattern */ if (oopsstart >= 0 && strstr(linepointer[i], "Call Trace:")) inbacktrace = 1; else if (oopsstart >= 0 && inbacktrace == 0 && strlen(linepointer[i]) > 8) { char *c1, *c2, *c3; c1 = strstr(linepointer[i], ">]"); c2 = strstr(linepointer[i], "+0x"); c3 = strstr(linepointer[i], "/0x"); if (linepointer[i][0] == ' ' && linepointer[i][1] == '[' && linepointer[i][2] == '<' && c1 && c2 && c3) inbacktrace = 1; } else /* try to see if we're at the end of an oops */ if (oopsstart >= 0 && inbacktrace > 0) { char c2, c3; c2 = linepointer[i][0]; c3 = linepointer[i][1]; /* line needs to start with " [" or have "] ["*/ if ((c2 != ' ' || c3 != '[') && strstr(linepointer[i], "] [") == NULL && strstr(linepointer[i], "--- Exception") == NULL && strstr(linepointer[i], " LR =") == NULL && strstr(linepointer[i], "<#DF>") == NULL && strstr(linepointer[i], "") == NULL && strstr(linepointer[i], "") == NULL && strstr(linepointer[i], "<>") == NULL) oopsend = i-1; /* oops lines are always more than 8 long */ if (strlen(linepointer[i]) < 8) oopsend = i-1; /* single oopses are of the same loglevel */ if (linelevel[i] != prevlevel) oopsend = i-1; /* The Code: line means we're done with the backtrace */ if (strstr(linepointer[i], "Code:") != NULL) oopsend = i; if (strstr(linepointer[i], "Instruction dump::") != NULL) oopsend = i; /* if a new oops starts, this one has ended */ if (strstr(linepointer[i], "WARNING:") != NULL && oopsstart != i) oopsend = i-1; if (strstr(linepointer[i], "Unable to handle") != NULL && oopsstart != i) oopsend = i-1; /* kernel end-of-oops marker */ if (strstr(linepointer[i], "---[ end trace") != NULL) oopsend = i; if (oopsend <= i) { int q; int len; char *oops; len = 2; for (q = oopsstart; q <= oopsend; q++) len += strlen(linepointer[q])+1; oops = calloc(len, 1); for (q = oopsstart; q <= oopsend; q++) { strcat(oops, linepointer[q]); strcat(oops, "\n"); } /* too short oopses are invalid */ if (strlen(oops) > 100) queue_oops(oops); oopsstart = -1; inbacktrace = 0; oopsend = linecount; free(oops); } } prevlevel = linelevel[i]; i++; if (oopsstart > 0 && i-oopsstart > 50) { oopsstart = -1; inbacktrace = 0; oopsend = linecount; } if (oopsstart > 0 && !inbacktrace && i-oopsstart > 30) { oopsstart = -1; inbacktrace = 0; oopsend = linecount; } } if (oopsstart >= 0) { char *oops; int len; int q; oopsend = i-1; len = 2; while (oopsend > 0 && linepointer[oopsend] == NULL) oopsend--; for (q = oopsstart; q <= oopsend; q++) len += strlen(linepointer[q])+1; oops = calloc(len, 1); for (q = oopsstart; q <= oopsend; q++) { strcat(oops, linepointer[q]); strcat(oops, "\n"); } /* too short oopses are invalid */ if (strlen(oops) > 100) queue_oops(oops); oopsstart = -1; inbacktrace = 0; oopsend = linecount; free(oops); } free(linepointer); free(linelevel); linepointer = NULL; linelevel = NULL; } int scan_dmesg(void __unused *unused) { char *buffer; buffer = calloc(getpagesize()+1, 1); syscall(__NR_syslog, 3, buffer, getpagesize()); extract_oops(buffer, strlen(buffer), 0); free(buffer); if (opted_in >= 2) submit_queue(); else if (opted_in >= 1) ask_permission(); return 1; } void scan_filename(char *filename, int issyslog) { char *buffer; struct stat statb; FILE *file; int ret; size_t buflen; memset(&statb, 0, sizeof(statb)); ret = stat(filename, &statb); if (statb.st_size < 1 || ret != 0) return; /* * in theory there's a race here, since someone could spew * to /var/log/messages before we read it in... we try to * deal with it by reading at most 1023 bytes extra. If there's * more than that.. any oops will be in dmesg anyway. * Do not try to allocate an absurt amount of memory; ignore * older log messages because they are unlikely to have * sufficiently recent data to be useful. 32MB is more * than enough; it's not worth looping through more log * if the log is larger than that. */ buflen = MAX(statb.st_size+1024, 32*1024*1024); buffer = calloc(buflen, 1); assert(buffer != NULL); file = fopen(filename, "rm"); if (!file) { free(buffer); return; } fseek(file, -buflen, SEEK_END); ret = fread(buffer, 1, buflen-1, file); fclose(file); if (ret > 0) extract_oops(buffer, buflen-1, issyslog); free(buffer); if (opted_in >= 2) submit_queue(); else if (opted_in >= 1) ask_permission(); } kerneloops-0.12+git20090217/distro/0000755000175000017500000000000011174075563015620 5ustar willywillykerneloops-0.12+git20090217/distro/kerneloops.spec0000644000175000017500000000514511174075563020662 0ustar willywillyName: kerneloops Version: 0.10 Release: 1%{?dist} Summary: Tool to automatically collect and submit kernel crash signatures Group: System Environment/Base License: GPLv2 URL: http://www.kerneloops.org Source0: http://www.kerneloops.org/download/%{name}-%{version}.tar.gz BuildRoot: %(mktemp -ud %{_tmppath}/%{name}-%{version}-%{release}-XXXXXX) BuildRequires: curl-devel BuildRequires: libnotify-devel BuildRequires: gtk2-devel BuildRequires: dbus-glib-devel BuildRequires: gettext BuildRequires: desktop-file-utils Requires(post): chkconfig Requires(preun): chkconfig, initscripts %description This package contains the tools to collect kernel crash signatures, and to submit them to the kerneloops.org website where the kernel crash signatures get collected and grouped for presentation to the Linux kernel developers. %prep %setup -q %build make CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags} %check make tests %install rm -rf $RPM_BUILD_ROOT make install DESTDIR=$RPM_BUILD_ROOT mkdir -m 0755 -p $RPM_BUILD_ROOT%{_initrddir} install -p -m 0755 kerneloops.init $RPM_BUILD_ROOT%{_initrddir}/%{name} %find_lang %{name} %clean make clean rm -rf $RPM_BUILD_ROOT %post /sbin/chkconfig --add %{name} %preun if [ $1 = 0 ]; then /sbin/service %{name} stop > /dev/null 2>&1 /sbin/chkconfig --del %{name} fi %files -f %{name}.lang %defattr(-,root,root) %doc COPYING Changelog %{_sbindir}/%{name} %config(noreplace) %{_sysconfdir}/kerneloops.conf %{_initrddir}/%{name} %{_sysconfdir}/dbus-1/system.d/kerneloops.dbus %{_sysconfdir}/xdg/autostart/kerneloops-applet.desktop %{_datadir}/kerneloops/ %{_bindir}/kerneloops-applet %{_mandir}/man8/kerneloops.8.gz %changelog * Sat Jan 5 2008 Arjan van de Ven - 0.10-1 - fix some bugs caught by the fedora review process * Tue Jan 1 2008 Arjan van de Ven - 0.9-1 - make translatable * Mon Dec 31 2007 Arjan van de Ven - 0.8-1 - Add UI applet to ask the privacy question * Sat Dec 29 2007 Arjan van de Ven - 0.7-1 - fix memory leak * Wed Dec 19 2007 Arjan van de Ven - 0.6-1 - various cleanups and minor improvements - Merged Matt Domsch's improvements * Tue Dec 18 2007 Arjan van de Ven - 0.5-1 - fix infinite loop * Mon Dec 17 2007 Arjan van de Ven - 0.4-1 - PPC bugfixes * Sun Dec 9 2007 Arjan van de Ven - 0.3-1 - more fixes * Sat Dec 8 2007 Arjan van de Ven - 0.2-1 - bugfix to submit the whole oops on x86 * Sat Dec 1 2007 Arjan van de Ven - 0.1-1 - Initial packaging kerneloops-0.12+git20090217/Changelog0000644000175000017500000000206411174075563016130 0ustar willywilly0.12 - Jun 22nd 2008 * Contributions from Michael Johnson - show the oops text before submitting - various speedups 0.11 - Jan 11 2008 * Improve the makefile (GregKH) 0.10 - Jan 05 2008 * Fix some bugs found in the fedora package review process 0.9 - Jan 03 2008 * Make the UI translatable * Have the applet show a thank-you message on oops submission * bunch of comments in the code 0.8 - Dec 31th 2007 * Add kerneloops-applet, so that we can ask the user for permission 0.7 - Dec 29th 2007 * Fix memory leak (woops) * Add valgrind to the testsuite * minor cleanups 0.6 - Dec 19th 2007 * minor cleanups, adding comments * more testcases * use "start of new oops" also as oops-end condition * rewrote most of the oops-end logic to work in the light of the 2.6.24-rc6 oops end marker/UUID code * fixed infinite loop in oops parsing code due to shadowed variable 0.5 - Dec 18th 2007 * fix infinite loop (Antony Dovgal) 0.4 - Dec 17th 2007 * Many bugfixes for powerpc compatibility * Reject many invalid (short or long) oopses * Create a testsuitekerneloops-0.12+git20090217/test/0000755000175000017500000000000011174075563015273 5ustar willywillykerneloops-0.12+git20090217/test/i386-warn-on.txt.out0000644000175000017500000000107311174075563020713 0ustar willywillyStarting kerneloops in debug mode Scanning test/i386-warn-on.txt Found start of oops at line 428 start line is -WARNING: at /tmp/oops.c:5 modinit() (Not tainted)- Submit text is: ---[start of oops]--- WARNING: at /tmp/oops.c:5 modinit() (Not tainted) Pid: 8190, comm: insmod Not tainted 2.6.24-0.77.rc4.git4.fc9 #1 [] show_trace_log_lvl+0x1a/0x2f [] show_trace+0x12/0x14 [] dump_stack+0x6c/0x72 [] modinit+0x38/0x3f [oops] [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ---[end of oops]--- kerneloops-0.12+git20090217/test/i386-warn-on.txt0000644000175000017500000004742511174075563020120 0ustar willywillyInitializing cgroup subsys cpuset Linux version 2.6.24-0.77.rc4.git4.fc9 (kojibuilder@) (gcc version 4.1.2 20071124 (Red Hat 4.1.2-35)) #1 SMP Thu Dec 6 16:50:13 EST 2007 BIOS-provided physical RAM map: BIOS-e820: 0000000000000000 - 000000000009fc00 (usable) BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved) BIOS-e820: 00000000000e4000 - 0000000000100000 (reserved) BIOS-e820: 0000000000100000 - 000000001f780000 (usable) BIOS-e820: 000000001f780000 - 000000001f790000 (ACPI data) BIOS-e820: 000000001f790000 - 000000001f7d0000 (ACPI NVS) BIOS-e820: 000000001f7d0000 - 000000001f7de000 (reserved) BIOS-e820: 000000001f7e0000 - 000000001f800000 (reserved) BIOS-e820: 00000000fee00000 - 00000000fee01000 (reserved) BIOS-e820: 00000000fff80000 - 0000000100000000 (reserved) 0MB HIGHMEM available. 503MB LOWMEM available. found SMP MP-table at 000ff780 Using x86 segment limits to approximate NX protection Entering add_active_range(0, 0, 128896) 0 entries of 256 used Zone PFN ranges: DMA 0 -> 4096 Normal 4096 -> 128896 HighMem 128896 -> 128896 Movable zone start PFN for each node early_node_map[1] active PFN ranges 0: 0 -> 128896 On node 0 totalpages: 128896 DMA zone: 56 pages used for memmap DMA zone: 0 pages reserved DMA zone: 4040 pages, LIFO batch:0 Normal zone: 1706 pages used for memmap Normal zone: 123094 pages, LIFO batch:31 HighMem zone: 0 pages used for memmap Movable zone: 0 pages used for memmap DMI present. Using APIC driver default ACPI: RSDP 000FBE60, 0014 (r0 ACPIAM) ACPI: RSDT 1F780000, 0034 (r1 A M I OEMRSDT 10000717 MSFT 97) ACPI: FACP 1F780200, 0081 (r1 A M I OEMFACP 10000717 MSFT 97) ACPI: DSDT 1F780400, 5F17 (r1 A0797 A0797000 0 INTL 20051117) ACPI: FACS 1F790000, 0040 ACPI: APIC 1F780390, 0068 (r1 A M I OEMAPIC 10000717 MSFT 97) ACPI: OEMB 1F790040, 0046 (r1 A M I AMI_OEM 10000717 MSFT 97) ACPI: MCFG 1F786320, 003C (r1 A M I OEMMCFG 10000717 MSFT 97) ACPI: PM-Timer IO Port: 0x808 ACPI: Local APIC address 0xfee00000 ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled) Processor #0 6:13 APIC version 20 ACPI: IOAPIC (id[0x01] address[0xfec00000] gsi_base[0]) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23 ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) ACPI: IRQ0 used by override. ACPI: IRQ2 used by override. ACPI: IRQ9 used by override. Enabling APIC mode: Flat. Using 1 I/O APICs Using ACPI (MADT) for SMP configuration information Allocating PCI resources starting at 20000000 (gap: 1f800000:df600000) swsusp: Registered nosave memory region: 000000000009f000 - 00000000000a0000 swsusp: Registered nosave memory region: 00000000000a0000 - 00000000000e4000 swsusp: Registered nosave memory region: 00000000000e4000 - 0000000000100000 Built 1 zonelists in Zone order, mobility grouping on. Total pages: 127134 Kernel command line: ro root=/dev/VolGroup00/LogVol00 selinux=off mapped APIC to ffffb000 (fee00000) mapped IOAPIC to ffffa000 (fec00000) Enabling fast FPU save and restore... done. Enabling unmasked SIMD FPU exception support... done. Initializing CPU#0 CPU 0 irqstacks, hard=c0826000 soft=c0806000 PID hash table entries: 2048 (order: 11, 8192 bytes) Detected 630.085 MHz processor. Console: colour VGA+ 80x25 console [tty0] enabled Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar ... MAX_LOCKDEP_SUBCLASSES: 8 ... MAX_LOCK_DEPTH: 30 ... MAX_LOCKDEP_KEYS: 2048 ... CLASSHASH_SIZE: 1024 ... MAX_LOCKDEP_ENTRIES: 8192 ... MAX_LOCKDEP_CHAINS: 16384 ... CHAINHASH_SIZE: 8192 memory used by lock dependency info: 1024 kB per task-struct memory footprint: 1680 bytes Dentry cache hash table entries: 65536 (order: 6, 262144 bytes) Inode-cache hash table entries: 32768 (order: 5, 131072 bytes) Memory: 496588k/515584k available (2325k kernel code, 18484k reserved, 1184k data, 576k init, 0k highmem) virtual kernel memory layout: fixmap : 0xffc53000 - 0xfffff000 (3760 kB) pkmap : 0xff800000 - 0xffc00000 (4096 kB) vmalloc : 0xe0000000 - 0xff7fe000 ( 503 MB) lowmem : 0xc0000000 - 0xdf780000 ( 503 MB) .init : 0xc0773000 - 0xc0803000 ( 576 kB) .data : 0xc0645577 - 0xc076d924 (1184 kB) .text : 0xc0400000 - 0xc0645577 (2325 kB) Checking if this processor honours the WP bit even in supervisor mode... Ok. SLUB: Genslabs=11, HWalign=64, Order=0-1, MinObjects=4, CPUs=1, Nodes=1 Calibrating delay using timer specific routine.. 1262.52 BogoMIPS (lpj=631262) Security Framework initialized SELinux: Disabled at boot. Capability LSM initialized Mount-cache hash table entries: 512 Initializing cgroup subsys ns Initializing cgroup subsys cpuacct CPU: After generic identify, caps: afe9fbbf 00000000 00000000 00000000 00000000 00000000 00000000 00000000 CPU: L1 I cache: 32K, L1 D cache: 32K CPU: L2 cache: 512K CPU: After all inits, caps: afe9f3bf 00000000 00000000 00002040 00000000 00000000 00000000 00000000 Intel machine check architecture supported. Intel machine check reporting enabled on CPU#0. Compat vDSO mapped to ffffe000. Checking 'hlt' instruction... OK. SMP alternatives: switching to UP code Freeing SMP alternatives: 12k freed ACPI: Core revision 20070126 CPU0: Intel(R) Celeron(R) M processor 900MHz stepping 06 Total of 1 processors activated (1262.52 BogoMIPS). ENABLING IO-APIC IRQs ..TIMER: vector=0x31 apic1=0 pin1=2 apic2=-1 pin2=-1 APIC calibration not consistent with PM Timer: 119ms instead of 100ms APIC delta adjusted to PM-Timer: 437545 (524973) Brought up 1 CPUs sizeof(vma)=84 bytes sizeof(page)=56 bytes sizeof(inode)=604 bytes sizeof(dentry)=160 bytes sizeof(ext3inode)=856 bytes sizeof(buffer_head)=56 bytes sizeof(skbuff)=176 bytes sizeof(task_struct)=3552 bytes CPU0 attaching sched-domain: domain 0: span 00000001 groups: 00000001 khelper used greatest stack depth: 3104 bytes left net_namespace: 80 bytes Booting paravirtualized kernel on bare hardware Time: 19:23:47 Date: 12/18/07 NET: Registered protocol family 16 No dock devices found. ACPI: bus type pci registered PCI: BIOS Bug: MCFG area at e0000000 is not E820-reserved PCI: Not using MMCONFIG. PCI: PCI BIOS revision 3.00 entry at 0xf0031, last bus=4 PCI: Using configuration type 1 Setting up standard PCI resources khelper used greatest stack depth: 2844 bytes left ACPI: EC: Look up EC in DSDT ACPI: Interpreter enabled ACPI: (supports S0 S1 S3 S4 S5) ACPI: Using IOAPIC for interrupt routing ACPI: EC: GPE = 0x18, I/O: command/status = 0x66, data = 0x62 ACPI: EC: driver started in poll mode ACPI: PCI Root Bridge [PCI0] (0000:00) Force enabled HPET at base address 0xfed00000 PCI quirk: region 0800-087f claimed by ICH6 ACPI/GPIO/TCO PCI quirk: region 0480-04bf claimed by ICH6 GPIO PCI: Transparent bridge - 0000:00:1e.0 ACPI: PCI Interrupt Routing Table [\_SB_.PCI0._PRT] ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.P0P3._PRT] ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.P0P6._PRT] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 10 *11 12 14 15) ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 7 *10 11 12 14 15) ACPI: PCI Interrupt Link [LNKD] (IRQs *3 4 5 6 7 10 11 12 14 15) ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 *5 6 7 10 11 12 14 15) Linux Plug and Play Support v0.97 (c) Adam Belay pnp: PnP ACPI init ACPI: bus type pnp registered pnp: PnP ACPI: found 13 devices ACPI: ACPI bus type pnp unregistered usbcore: registered new interface driver usbfs usbcore: registered new interface driver hub usbcore: registered new device driver usb PCI: Using ACPI for IRQ routing PCI: If a device doesn't work, try "pci=routeirq". If it helps, post a report NetLabel: Initializing NetLabel: domain hash size = 128 NetLabel: protocols = UNLABELED CIPSOv4 NetLabel: unlabeled traffic allowed by default hpet clockevent registered hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 hpet0: 3 64-bit timers, 14318180 Hz ACPI: RTC can wake from S4 Time: tsc clocksource has been installed. system 00:01: iomem range 0xfed13000-0xfed19fff has been reserved system 00:08: ioport range 0x4d0-0x4d1 has been reserved system 00:08: ioport range 0x800-0x87f has been reserved system 00:08: ioport range 0x480-0x4bf has been reserved system 00:08: iomem range 0xfed1c000-0xfed1ffff has been reserved system 00:08: iomem range 0xfed20000-0xfed8ffff has been reserved system 00:09: iomem range 0xfec00000-0xfec00fff has been reserved system 00:09: iomem range 0xfee00000-0xfee00fff could not be reserved system 00:0a: iomem range 0xe0000000-0xefffffff has been reserved system 00:0b: iomem range 0xe0000000-0xefffffff has been reserved system 00:0c: iomem range 0x0-0x9ffff could not be reserved system 00:0c: iomem range 0xc0000-0xcffff could not be reserved system 00:0c: iomem range 0xe0000-0xfffff could not be reserved system 00:0c: iomem range 0x100000-0x1f7fffff could not be reserved system 00:0c: iomem range 0x0-0x0 could not be reserved PCI: Bridge: 0000:00:1c.0 IO window: disabled. MEM window: disabled. PREFETCH window: disabled. PCI: Bridge: 0000:00:1c.2 IO window: disabled. MEM window: fa000000-fbffffff PREFETCH window: f4000000-f8ffffff PCI: Bridge: 0000:00:1e.0 IO window: disabled. MEM window: disabled. PREFETCH window: disabled. ACPI: PCI Interrupt 0000:00:1c.0[A] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:00:1c.0 to 64 ACPI: PCI Interrupt 0000:00:1c.2[C] -> GSI 18 (level, low) -> IRQ 17 PCI: Setting latency timer of device 0000:00:1c.2 to 64 PCI: Setting latency timer of device 0000:00:1e.0 to 64 NET: Registered protocol family 2 IP route cache hash table entries: 4096 (order: 2, 16384 bytes) TCP established hash table entries: 16384 (order: 5, 131072 bytes) TCP bind hash table entries: 16384 (order: 7, 589824 bytes) TCP: Hash tables configured (established 16384 bind 16384) TCP reno registered checking if image is initramfs...<7>Switched to high resolution mode on CPU 0 it is Freeing initrd memory: 3645k freed ACPI: EC: non-query interrupt received, switching to interrupt mode khelper used greatest stack depth: 2760 bytes left khelper used greatest stack depth: 2740 bytes left apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16ac) apm: overridden by ACPI. audit: initializing netlink socket (disabled) audit(1198005827.694:1): initialized Total HugeTLB memory allocated, 0 VFS: Disk quotas dquot_6.5.1 Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) io scheduler noop registered io scheduler anticipatory registered io scheduler deadline registered io scheduler cfq registered (default) Boot video device is 0000:00:02.0 PCI: Setting latency timer of device 0000:00:1c.0 to 64 assign_interrupt_mode Found MSI capability Allocate Port Service[0000:00:1c.0:pcie00] Allocate Port Service[0000:00:1c.0:pcie02] PCI: Setting latency timer of device 0000:00:1c.2 to 64 assign_interrupt_mode Found MSI capability Allocate Port Service[0000:00:1c.2:pcie00] Allocate Port Service[0000:00:1c.2:pcie02] pci_hotplug: PCI Hot Plug PCI Core version: 0.5 ACPI: CPU0 (power states: C1[C1] C2[C2] C3[C3]) ACPI: Processor [CPU1] (supports 8 throttling states) ACPI: Thermal Zone [TZ00] (35 C) isapnp: Scanning for PnP cards... isapnp: No Plug & Play device found khelper used greatest stack depth: 2732 bytes left Non-volatile memory driver v1.2 Linux agpgart interface v0.103 agpgart: Detected an Intel 915GM Chipset. agpgart: Detected 7932K stolen memory. agpgart: AGP aperture is 256M @ 0xd0000000 Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled RAMDISK driver initialized: 16 RAM disks of 16384K size 4096 blocksize input: Macintosh mouse button emulation as /class/input/input0 PNP: PS/2 Controller [PNP0303:PS2K,PNP0f13:PS2M] at 0x60,0x64 irq 1,12 serio: i8042 KBD port at 0x60,0x64 irq 1 serio: i8042 AUX port at 0x60,0x64 irq 12 khelper used greatest stack depth: 2580 bytes left mice: PS/2 mouse device common for all mice input: AT Translated Set 2 keyboard as /class/input/input1 cpuidle: using governor ladder Synaptics Touchpad, model: 1, fw: 6.3, id: 0x180b1, caps: 0xa04713/0x200000 cpuidle: using governor menu usbcore: registered new interface driver hiddev usbcore: registered new interface driver usbhid drivers/hid/usbhid/hid-core.c: v2.6:USB HID core driver TCP cubic registered Initializing XFRM netlink socket NET: Registered protocol family 1 NET: Registered protocol family 17 Using IPI No-Shortcut mode registered taskstats version 1 Magic number: 3:229:395 Freeing unused kernel memory: 576k freed Write protecting the kernel read-only data: 919k input: SynPS/2 Synaptics TouchPad as /class/input/input2 ACPI: PCI Interrupt 0000:00:1d.7[A] -> GSI 23 (level, low) -> IRQ 18 PCI: Setting latency timer of device 0000:00:1d.7 to 64 ehci_hcd 0000:00:1d.7: EHCI Host Controller ehci_hcd 0000:00:1d.7: new USB bus registered, assigned bus number 1 ehci_hcd 0000:00:1d.7: debug port 1 PCI: cache line size of 32 is not supported by device 0000:00:1d.7 ehci_hcd 0000:00:1d.7: irq 18, io mem 0xf9ebbc00 ehci_hcd 0000:00:1d.7: USB 2.0 started, EHCI 1.00, driver 10 Dec 2004 usb usb1: configuration #1 chosen from 1 choice hub 1-0:1.0: USB hub found hub 1-0:1.0: 8 ports detected insmod used greatest stack depth: 1892 bytes left ohci_hcd: 2006 August 04 USB 1.1 'Open' Host Controller (OHCI) Driver USB Universal Host Controller Interface driver v3.0 ACPI: PCI Interrupt 0000:00:1d.0[A] -> GSI 23 (level, low) -> IRQ 18 PCI: Setting latency timer of device 0000:00:1d.0 to 64 uhci_hcd 0000:00:1d.0: UHCI Host Controller uhci_hcd 0000:00:1d.0: new USB bus registered, assigned bus number 2 uhci_hcd 0000:00:1d.0: irq 18, io base 0x0000e400 usb usb2: configuration #1 chosen from 1 choice hub 2-0:1.0: USB hub found hub 2-0:1.0: 2 ports detected ACPI: PCI Interrupt 0000:00:1d.1[B] -> GSI 19 (level, low) -> IRQ 19 PCI: Setting latency timer of device 0000:00:1d.1 to 64 uhci_hcd 0000:00:1d.1: UHCI Host Controller uhci_hcd 0000:00:1d.1: new USB bus registered, assigned bus number 3 uhci_hcd 0000:00:1d.1: irq 19, io base 0x0000e480 usb usb3: configuration #1 chosen from 1 choice hub 3-0:1.0: USB hub found hub 3-0:1.0: 2 ports detected usb 1-5: new high speed USB device using ehci_hcd and address 2 ACPI: PCI Interrupt 0000:00:1d.2[C] -> GSI 18 (level, low) -> IRQ 17 PCI: Setting latency timer of device 0000:00:1d.2 to 64 uhci_hcd 0000:00:1d.2: UHCI Host Controller uhci_hcd 0000:00:1d.2: new USB bus registered, assigned bus number 4 uhci_hcd 0000:00:1d.2: irq 17, io base 0x0000e800 usb usb4: configuration #1 chosen from 1 choice hub 4-0:1.0: USB hub found hub 4-0:1.0: 2 ports detected usb 1-5: configuration #1 chosen from 1 choice ACPI: PCI Interrupt 0000:00:1d.3[D] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:00:1d.3 to 64 uhci_hcd 0000:00:1d.3: UHCI Host Controller uhci_hcd 0000:00:1d.3: new USB bus registered, assigned bus number 5 uhci_hcd 0000:00:1d.3: irq 16, io base 0x0000e880 usb usb5: configuration #1 chosen from 1 choice hub 5-0:1.0: USB hub found hub 5-0:1.0: 2 ports detected insmod used greatest stack depth: 1672 bytes left SCSI subsystem initialized libata version 3.00 loaded. ata_piix 0000:00:1f.2: version 2.12 ata_piix 0000:00:1f.2: MAP [ P0 P2 IDE IDE ] ACPI: PCI Interrupt 0000:00:1f.2[B] -> GSI 19 (level, low) -> IRQ 19 PCI: Setting latency timer of device 0000:00:1f.2 to 64 scsi0 : ata_piix scsi1 : ata_piix ata1: SATA max UDMA/133 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14 ata2: PATA max UDMA/100 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15 ata2.00: ATA-4: SILICONMOTION SM223AC, , max UDMA/66 ata2.00: 7815024 sectors, multi 0: LBA ata2.00: limited to UDMA/33 due to 40-wire cable ata2.00: configured for UDMA/33 scsi 1:0:0:0: Direct-Access ATA SILICONMOTION SM n/a PQ: 0 ANSI: 5 sd 1:0:0:0: [sda] 7815024 512-byte hardware sectors (4001 MB) sd 1:0:0:0: [sda] Write Protect is off sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA sd 1:0:0:0: [sda] 7815024 512-byte hardware sectors (4001 MB) sd 1:0:0:0: [sda] Write Protect is off sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA sda: sda1 sda2 sd 1:0:0:0: [sda] Attached SCSI disk insmod used greatest stack depth: 812 bytes left device-mapper: uevent: version 1.0.3 device-mapper: ioctl: 4.12.0-ioctl (2007-10-02) initialised: dm-devel@redhat.com Initializing USB Mass Storage driver... scsi2 : SCSI emulation for USB Mass Storage devices usbcore: registered new interface driver usb-storage USB Mass Storage support registered. usb-storage: device found at 2 usb-storage: waiting for device to settle before scanning kjournald starting. Commit interval 5 seconds EXT3-fs: mounted filesystem with ordered data mode. Marking TSC unstable due to: TSC halts in idle. Time: hpet clocksource has been installed. sd 1:0:0:0: Attached scsi generic sg0 type 0 usb-storage: device scan complete scsi 2:0:0:0: Direct-Access USB2.0 CardReader SD0 0100 PQ: 0 ANSI: 0 sd 2:0:0:0: [sdb] 7903232 512-byte hardware sectors (4046 MB) sd 2:0:0:0: [sdb] Write Protect is off sd 2:0:0:0: [sdb] Mode Sense: 03 00 00 00 sd 2:0:0:0: [sdb] Assuming drive cache: write through sd 2:0:0:0: [sdb] 7903232 512-byte hardware sectors (4046 MB) sd 2:0:0:0: [sdb] Write Protect is off sd 2:0:0:0: [sdb] Mode Sense: 03 00 00 00 sd 2:0:0:0: [sdb] Assuming drive cache: write through sdb: sdb1 sd 2:0:0:0: [sdb] Attached SCSI removable disk sd 2:0:0:0: Attached scsi generic sg1 type 0 input: Power Button (FF) as /class/input/input3 ACPI: Power Button (FF) [PWRF] input: Lid Switch as /class/input/input4 ACPI: Lid Switch [LID] input: Sleep Button (CM) as /class/input/input5 ACPI: Sleep Button (CM) [SLPB] input: Power Button (CM) as /class/input/input6 ACPI: Power Button (CM) [PWRB] ACPI: AC Adapter [AC0] (off-line) input: Video Bus as /class/input/input7 ACPI: Video Device [VGA] (multi-head: yes rom: no post: no) intel_rng: FWH not detected ACPI: PCI Interrupt 0000:00:1f.3[B] -> GSI 19 (level, low) -> IRQ 19 input: PC Speaker as /class/input/input8 iTCO_vendor_support: vendor-support=0 iTCO_wdt: Intel TCO WatchDog Timer Driver v1.02 (26-Jul-2007) iTCO_wdt: Found a ICH6-M TCO device (Version=2, TCOBASE=0x0860) iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) rtc_cmos 00:03: rtc core: registered rtc_cmos as rtc0 rtc0: alarms up to one month ACPI: Battery Slot [BAT0] (battery present) device-mapper: multipath: version 1.0.5 loaded Clocksource tsc unstable (delta = -67429974 ns) loop: module loaded EXT3 FS on dm-0, internal journal kjournald starting. Commit interval 5 seconds EXT3 FS on sda1, internal journal EXT3-fs: mounted filesystem with ordered data mode. IA-32 Microcode Update Driver: v1.14a NET: Registered protocol family 10 lo: Disabled Privacy Extensions ip6_tables: (C) 2000-2006 Netfilter Core Team nf_conntrack version 0.5.0 (8192 buckets, 32768 max) ip_tables: (C) 2000-2006 Netfilter Core Team ACPI: PCI Interrupt 0000:00:02.0[A] -> GSI 16 (level, low) -> IRQ 16 [drm] Initialized drm 1.1.0 20060810 [drm] Initialized i915 1.11.0 20071122 on minor 0 EXT2-fs warning: mounting unchecked fs, running e2fsck is recommended WARNING: at /tmp/oops.c:5 modinit() (Not tainted) Pid: 8190, comm: insmod Not tainted 2.6.24-0.77.rc4.git4.fc9 #1 [] show_trace_log_lvl+0x1a/0x2f [] show_trace+0x12/0x14 [] dump_stack+0x6c/0x72 [] modinit+0x38/0x3f [oops] [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ======================= kerneloops-0.12+git20090217/test/i386-oops-with-end-marker.txt0000644000175000017500000000364511174075563022507 0ustar willywillyaudit_log_user_command(): Connection refused double fault: 0000 [1] PREEMPT SMP CPU 0 Pid: 2847, comm: grub Not tainted 2.6.24-rc5 #234 RIP: 0010:[] [] search_extable+0x0/0x64 RSP: 0000:ffff810008000000 EFLAGS: 00010046 RAX: ffffffff8020e66f RBX: 080e050809993830 RCX: ffffffff8020e732 RDX: ffffffff8020e732 RSI: ffffffff80870460 RDI: ffffffff8086c370 RBP: ffff810008000008 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000200 R12: ffff810008000048 R13: 0000000000000000 R14: 0000000000000000 R15: ffff81003c913e78 FS: 00007f80aed7f780(0000) GS:ffffffff80be4000(0063) knlGS:0000000009993830 CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b CR2: ffff810007fffff8 CR3: 000000003cddc000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process grub (pid: 2847, threadinfo ffff81003c912000, task ffff81003fabade0) Stack: Call Trace: Code: 55 48 89 d0 48 89 d1 48 c1 e8 20 48 89 e5 53 75 46 48 b8 00 RIP [] search_extable+0x0/0x64 RSP ---[ end trace a28726ab5968e532 ]--- BUG: spinlock lockup on CPU#0, grub/2847, ffff81003c57fd50 Pid: 2847, comm: grub Tainted: G D 2.6.24-rc5 #234 Call Trace: <#DF> [] _raw_spin_lock+0xfd/0x125 [] _spin_lock_irqsave+0x20/0x27 [] taskstats_exit+0xd2/0x2cf [] do_exit+0x24f/0x772 [] do_unblank_screen+0xf/0x11e [] oops_begin+0x0/0x96 [] die+0x5d/0x66 [] do_double_fault+0x63/0x65 [] double_fault+0x7d/0x90 [] do_general_protection+0x0/0x11a [] do_general_protection+0xc3/0x11a [] do_general_protection+0xc3/0x11a [] search_extable+0x0/0x64 <> kerneloops-0.12+git20090217/test/powerpc-with-jiffies-count.txt0000644000175000017500000003615511174075563023241 0ustar willywilly[ 0.000000] Using Efika machine description [ 0.000000] Linux version 2.6.24-rc3 (dwmw2@pmac.infradead.org) (gcc version 4.1.2 20070925 (Red Hat 4.1.2-33)) #5 Thu Dec 6 15:35:03 GMT 2007 [ 0.000000] Found initrd at 0xc2100000:0xc2554800 [ 0.000000] console [udbg0] enabled [ 0.000000] Entering add_active_range(0, 0, 32768) 0 entries of 256 used [ 0.000000] Efika: PCI bus 0 controlled by /pci@80000000 [ 0.000000] [ 0.000000] Top of RAM: 0x8000000, Total RAM: 0x8000000 [ 0.000000] Memory hole size: 0MB [ 0.000000] Zone PFN ranges: [ 0.000000] DMA 0 -> 32768 [ 0.000000] Normal 32768 -> 32768 [ 0.000000] HighMem 32768 -> 32768 [ 0.000000] Movable zone start PFN for each node [ 0.000000] early_node_map[1] active PFN ranges [ 0.000000] 0: 0 -> 32768 [ 0.000000] On node 0 totalpages: 32768 [ 0.000000] DMA zone: 256 pages used for memmap [ 0.000000] DMA zone: 0 pages reserved [ 0.000000] DMA zone: 32512 pages, LIFO batch:7 [ 0.000000] Normal zone: 0 pages used for memmap [ 0.000000] HighMem zone: 0 pages used for memmap [ 0.000000] Movable zone: 0 pages used for memmap [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512 [ 0.000000] Kernel command line: root=/dev/VolGroup00/LogVol00 ro console=ttyPSC0,115200 [ 0.000000] MPC52xx PIC is up and running! [ 0.000000] PID hash table entries: 512 (order: 9, 2048 bytes) [ 0.000000] time_init: decrementer frequency = 33.000000 MHz [ 0.000000] time_init: processor frequency = 396.000000 MHz [ 0.000015] clocksource: timebase mult[79364d9] shift[22] registered [ 0.000051] clockevent: decrementer mult[872] shift[16] cpu[0] [ 0.000205] Console: colour dummy device 80x25 [ 0.000403] console handover: boot [udbg0] -> real [ttyPSC0] [ 0.000909] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) [ 0.008761] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) [ 0.032699] High memory: 0k [ 0.032726] Memory: 120332k/131072k available (4224k kernel code, 10592k reserved, 192k data, 367k bss, 228k init) [ 0.043515] SLUB: Genslabs=11, HWalign=32, Order=0-1, MinObjects=4, CPUs=1, Nodes=1 [ 0.051360] Calibrating delay loop... 65.53 BogoMIPS (lpj=32768) [ 0.072883] Security Framework initialized [ 0.077126] SELinux: Initializing. [ 0.080868] SELinux: Starting in permissive mode [ 0.081015] selinux_register_security: Registering secondary module capability [ 0.088517] Capability LSM initialized as secondary [ 0.093661] Mount-cache hash table entries: 512 [ 0.107961] Initializing cgroup subsys ns [ 0.116394] khelper used greatest stack depth: 6948 bytes left [ 0.124146] net_namespace: 64 bytes [ 0.134630] NET: Registered protocol family 16 [ 0.196466] PCI: Probing PCI hardware [ 0.207980] khelper used greatest stack depth: 6804 bytes left [ 0.214272] DMA: MPC52xx BestComm driver [ 0.218546] DMA: MPC52xx BestComm engine @f0001200 ok ! [ 0.277957] Linux Plug and Play Support v0.97 (c) Adam Belay [ 0.296671] usbcore: registered new interface driver usbfs [ 0.303866] usbcore: registered new interface driver hub [ 0.311248] usbcore: registered new device driver usb [ 0.331263] NetLabel: Initializing [ 0.334792] NetLabel: domain hash size = 128 [ 0.339258] NetLabel: protocols = UNLABELED CIPSOv4 [ 0.344750] NetLabel: unlabeled traffic allowed by default [ 0.351571] Time: timebase clocksource has been installed. [ 0.357259] Switched to high resolution mode on CPU 0 [ 0.379419] NET: Registered protocol family 2 [ 0.394163] IP route cache hash table entries: 1024 (order: 0, 4096 bytes) [ 0.403776] TCP established hash table entries: 4096 (order: 3, 32768 bytes) [ 0.411368] TCP bind hash table entries: 4096 (order: 4, 81920 bytes) [ 0.418723] TCP: Hash tables configured (established 4096 bind 4096) [ 0.425260] TCP reno registered [ 0.438004] checking if image is initramfs... it is [ 3.608220] Freeing initrd memory: 4434k freed [ 3.615069] Thermal assist unit not available [ 3.625240] khelper used greatest stack depth: 6772 bytes left [ 3.636286] audit: initializing netlink socket (disabled) [ 3.642268] audit(1197156086.513:1): initialized [ 3.657936] khelper used greatest stack depth: 6436 bytes left [ 3.796894] VFS: Disk quotas dquot_6.5.1 [ 3.803081] Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) [ 3.816851] SELinux: Registering netfilter hooks [ 3.822385] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) [ 3.830013] io scheduler noop registered [ 3.834186] io scheduler anticipatory registered [ 3.838967] io scheduler deadline registered [ 3.847124] io scheduler cfq registered (default) [ 3.860068] matroxfb: Matrox G550 detected [ 5.549143] PInS data found at offset 31936 [ 5.555772] PInS memtype = 5 [ 5.558946] matroxfb: 640x480x8bpp (virtual: 640x26214) [ 5.564352] matroxfb: framebuffer at 0x80000000, mapped to 0xc9080000, size 33554432 [ 5.580371] Console: switching to colour frame buffer device 80x30 [ 5.589566] fb0: MATROX frame buffer device [ 5.596079] matroxfb_crtc2: secondary head of fb0 was registered as fb1 [ 5.730536] Macintosh non-volatile memory driver v1.1 [ 5.737304] Linux agpgart interface v0.102 [ 5.743292] Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled [ 5.764833] Serial: MPC52xx PSC UART driver [ 5.770998] f0002000.serial: ttyPSC0 at MMIO 0xf0002000 (irq = 129) is a MPC52xx PSC [ 5.815829] RAMDISK driver initialized: 16 RAM disks of 16384K size 4096 blocksize [ 5.827213] input: Macintosh mouse button emulation as /class/input/input0 [ 5.834521] apm_emu: PMU APM Emulation initialized. [ 5.841100] Uniform Multi-Platform E-IDE driver Revision: 7.00alpha2 [ 5.847781] ide: Assuming 33MHz system bus speed for PIO modes; override with idebus=xx [ 5.873125] mice: PS/2 mouse device common for all mice [ 5.892865] usbcore: registered new interface driver hiddev [ 5.900213] usbcore: registered new interface driver usbhid [ 5.906179] drivers/hid/usbhid/hid-core.c: v2.6:USB HID core driver [ 5.914906] TCP cubic registered [ 5.918270] Initializing XFRM netlink socket [ 5.924728] NET: Registered protocol family 1 [ 5.929456] NET: Registered protocol family 17 [ 5.934447] registered taskstats version 1 [ 5.939967] drivers/rtc/hctosys.c: unable to open rtc device (rtc0) [ 5.946751] Freeing unused kernel memory: 228k init [ 6.478520] ohci_hcd: 2006 August 04 USB 1.1 'Open' Host Controller (OHCI) Driver [ 6.479747] ppc-of-ohci f0001000.usb: OF OHCI [ 6.485815] ppc-of-ohci f0001000.usb: new USB bus registered, assigned bus number 1 [ 6.493812] ppc-of-ohci f0001000.usb: irq 134, io mem 0xf0001000 [ 6.557313] usb usb1: configuration #1 chosen from 1 choice [ 6.563734] hub 1-0:1.0: USB hub found [ 6.567755] hub 1-0:1.0: 2 ports detected [ 6.675335] insmod used greatest stack depth: 5988 bytes left [ 6.728761] USB Universal Host Controller Interface driver v3.0 [ 7.021307] usb 1-2: new full speed USB device using ppc-of-ohci and address 2 [ 7.224377] usb 1-2: configuration #1 chosen from 1 choice [ 7.697791] SCSI subsystem initialized [ 8.135674] libata version 3.00 loaded. [ 8.179503] ata: MPC52xx IDE/ATA libata driver [ 8.190679] scsi0 : mpc52xx_ata [ 8.194804] ata1: PATA max PIO4 ata_regs 0xf0003a00 irq 135 [ 8.814192] ata1.00: ATA-5: TOSHIBA MK6017MAP, A2.10 A, max UDMA/66 [ 8.820655] ata1.00: 11733120 sectors, multi 16: LBA [ 8.829088] ata1.00: configured for PIO4 [ 8.835176] scsi 0:0:0:0: Direct-Access ATA TOSHIBA MK6017MA A2.1 PQ: 0 ANSI: 5 [ 8.845371] sd 0:0:0:0: [sda] 11733120 512-byte hardware sectors (6007 MB) [ 8.852850] sd 0:0:0:0: [sda] Write Protect is off [ 8.857813] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 8.858492] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 8.869085] sd 0:0:0:0: [sda] 11733120 512-byte hardware sectors (6007 MB) [ 8.876507] sd 0:0:0:0: [sda] Write Protect is off [ 8.881471] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 8.882186] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 8.891518] sda: sda1 sda2 [ 9.327339] sd 0:0:0:0: [sda] Attached SCSI disk [ 9.334505] insmod used greatest stack depth: 4772 bytes left [ 11.963929] device-mapper: uevent: version 1.0.3 [ 11.969177] device-mapper: ioctl: 4.12.0-ioctl (2007-10-02) initialised: dm-devel@redhat.com [ 14.592267] EXT3-fs: INFO: recovery required on readonly filesystem. [ 14.598829] EXT3-fs: write access will be enabled during recovery. [ 32.857697] kjournald starting. Commit interval 5 seconds [ 32.863481] EXT3-fs: recovery complete. [ 32.876542] EXT3-fs: mounted filesystem with ordered data mode. [ 34.103928] audit(1197156116.975:2): enforcing=1 old_enforcing=0 auid=4294967295 [ 35.692095] SELinux:8192 avtab hash slots allocated.Num of rules:212170 [ 38.167096] SELinux:8192 avtab hash slots allocated.Num of rules:212170 [ 40.420695] security: 8 users, 11 roles, 2356 types, 114 bools, 1 sens, 1024 cats [ 40.420728] security: 67 classes, 212170 rules [ 40.520001] SELinux: Completing initialization. [ 40.520028] SELinux: Setting up existing superblocks. [ 40.530704] SELinux: initialized (dev dm-0, type ext3), uses xattr [ 40.737057] SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts [ 40.737140] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs [ 40.740097] SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts [ 40.740325] SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs [ 40.740467] SELinux: initialized (dev devpts, type devpts), uses transition SIDs [ 40.740711] SELinux: initialized (dev inotifyfs, type inotifyfs), uses genfs_contexts [ 40.740757] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs [ 40.740910] SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts [ 40.740982] SELinux: initialized (dev anon_inodefs, type anon_inodefs), uses genfs_contexts [ 40.741022] SELinux: initialized (dev pipefs, type pipefs), uses task SIDs [ 40.741091] SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts [ 40.741224] SELinux: initialized (dev sockfs, type sockfs), uses task SIDs [ 40.741314] SELinux: initialized (dev proc, type proc), uses genfs_contexts [ 40.741436] SELinux: initialized (dev bdev, type bdev), uses genfs_contexts [ 40.741491] SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts [ 40.741757] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts [ 40.870985] SELinux: policy loaded with handle_unknown=allow [ 40.877015] audit(1197156123.748:3): policy loaded auid=4294967295 [ 62.046977] sd 0:0:0:0: Attached scsi generic sg0 type 0 [ 79.144110] ieee80211_crypt: registered algorithm 'NULL' [ 79.615725] ieee80211: 802.11 data/management/control stack, git-1.1.13 [ 79.615757] ieee80211: Copyright (C) 2004-2005 Intel Corporation [ 79.845040] mpc52xx MII bus: probed [ 97.534973] device-mapper: multipath: version 1.0.5 loaded [ 99.754221] loop: module loaded [ 103.390494] EXT3 FS on dm-0, internal journal [ 106.379248] kjournald starting. Commit interval 5 seconds [ 106.384649] EXT3 FS on sda1, internal journal [ 106.384705] EXT3-fs: mounted filesystem with ordered data mode. [ 106.408819] SELinux: initialized (dev sda1, type ext3), uses xattr [ 106.417924] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs [ 113.524487] Adding 524280k swap on /dev/mapper/VolGroup00-LogVol01. Priority:-1 extents:1 across:524280k [ 113.564414] SELinux: initialized (dev binfmt_misc, type binfmt_misc), uses genfs_contexts [ 115.073453] warning: process `kudzu' used the deprecated sysctl system call with 1.23. [ 123.202863] NET: Registered protocol family 10 [ 123.222245] lo: Disabled Privacy Extensions [ 123.603103] ip6_tables: (C) 2000-2006 Netfilter Core Team [ 124.428218] ip_tables: (C) 2000-2006 Netfilter Core Team [ 129.968068] net eth0: attached phy 16 to driver Generic PHY [ 132.967755] PHY: f0003000:10 - Link is Up - 100/Full [ 144.051878] audit(1197156226.923:4): audit_pid=1372 old=0 by auid=4294967295 subj=system_u:system_r:auditd_t:s0 [ 152.148005] RPC: Registered udp transport module. [ 152.148033] RPC: Registered tcp transport module. [ 152.230776] SELinux: initialized (dev rpc_pipefs, type rpc_pipefs), uses genfs_contexts [ 166.016959] SELinux: initialized (dev autofs, type autofs), uses genfs_contexts [ 167.030261] SELinux: initialized (dev autofs, type autofs), uses genfs_contexts [ 167.188086] SELinux: initialized (dev autofs, type autofs), uses genfs_contexts [ 169.784395] Bluetooth: Core ver 2.11 [ 169.803287] NET: Registered protocol family 31 [ 169.803330] Bluetooth: HCI device and connection manager initialized [ 169.803355] Bluetooth: HCI socket layer initialized [ 171.573895] Bluetooth: L2CAP ver 2.9 [ 171.573939] Bluetooth: L2CAP socket layer initialized [ 172.279837] Bluetooth: RFCOMM socket layer initialized [ 172.281138] Bluetooth: RFCOMM TTY layer initialized [ 172.281186] Bluetooth: RFCOMM ver 1.8 [ 436.964686] foo: module license 'unspecified' taints kernel. [ 537.397123] Unable to handle kernel paging request for data at address 0x00000000 [ 537.404868] Faulting instruction address: 0xcb14f004 [ 539.411091] Oops: Kernel access of bad area, sig: 11 [#1] [ 539.416599] Efika [ 539.418552] Modules linked in: foo(P) rfcomm l2cap bluetooth autofs4 sunrpc iptable_filter ip_tables ip6table_filter ip6_tables x_tables ipv6 loop dm_multipath fec_mpc52xx bestcomm_fec ieee80211 fec_mpc52xx_phy libphy ieee80211_crypt sg dm_snapshot dm_zero dm_mirror dm_mod pata_mpc52xx libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd [ 539.450407] NIP: cb14f004 LR: c0062550 CTR: cb14f000 [ 539.455469] REGS: c2315df0 TRAP: 0300 Tainted: P (2.6.24-rc3) [ 539.462206] MSR: 00009032 CR: 24000488 XER: 00000000 [ 539.468711] DAR: 00000000, DSISR: 22000000 [ 539.472881] TASK = c6ef3770[2026] 'insmod' THREAD: c2314000 [ 539.478380] GPR00: cb14f000 c2315ea0 c6ef3770 00000000 00000001 cb14f280 ffffffff 00000000 [ 539.486918] GPR08: c6ef3770 00000000 000000c2 c6598410 00127309 10019350 cb1b377c 0000001c [ 539.495454] GPR16: c5574000 cb1ad5a8 cb1ad580 0000001b cb1ad558 00000000 0000001e 0000001f [ 539.503997] GPR24: cb1acfd6 cb19f000 c69dab68 00000001 cb14f280 00000001 c69dab60 c042b658 [ 539.512719] NIP [cb14f004] foo_init+0x4/0x40 [foo] [ 539.517613] LR [c0062550] sys_init_module+0x12d4/0x140c [ 539.522962] Call Trace: [ 539.525449] [c2315ea0] [c006253c] sys_init_module+0x12c0/0x140c (unreliable) [ 539.532652] [c2315f40] [c0013d00] ret_from_syscall+0x0/0x38 [ 539.538356] --- Exception: c00 at 0xff13a24 [ 539.542632] LR = 0x10000a3c [ 539.545826] Instruction dump: [ 539.548855] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX [ 539.556798] XXXXXXXX XXXXXXXX XXXXXXXX 39200000 <91290000> 0fe00000 48000000 00000000 kerneloops-0.12+git20090217/test/powerpc-with-jiffies-count.txt.out0000644000175000017500000000305611174075563024041 0ustar willywillyStarting kerneloops in debug mode Scanning test/powerpc-with-jiffies-count.txt Found start of oops at line 216 start line is -Unable to handle kernel paging request for data at address 0x00000000- Submit text is: ---[start of oops]--- Unable to handle kernel paging request for data at address 0x00000000 Faulting instruction address: 0xcb14f004 Oops: Kernel access of bad area, sig: 11 [#1] Efika Modules linked in: foo(P) rfcomm l2cap bluetooth autofs4 sunrpc iptable_filter ip_tables ip6table_filter ip6_tables x_tables ipv6 loop dm_multipath fec_mpc52xx bestcomm_fec ieee80211 fec_mpc52xx_phy libphy ieee80211_crypt sg dm_snapshot dm_zero dm_mirror dm_mod pata_mpc52xx libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd NIP: cb14f004 LR: c0062550 CTR: cb14f000 REGS: c2315df0 TRAP: 0300 Tainted: P (2.6.24-rc3) MSR: 00009032 CR: 24000488 XER: 00000000 DAR: 00000000, DSISR: 22000000 TASK = c6ef3770[2026] 'insmod' THREAD: c2314000 GPR00: cb14f000 c2315ea0 c6ef3770 00000000 00000001 cb14f280 ffffffff 00000000 GPR08: c6ef3770 00000000 000000c2 c6598410 00127309 10019350 cb1b377c 0000001c GPR16: c5574000 cb1ad5a8 cb1ad580 0000001b cb1ad558 00000000 0000001e 0000001f GPR24: cb1acfd6 cb19f000 c69dab68 00000001 cb14f280 00000001 c69dab60 c042b658 NIP [cb14f004] foo_init+0x4/0x40 [foo] LR [c0062550] sys_init_module+0x12d4/0x140c Call Trace: [c2315ea0] [c006253c] sys_init_module+0x12c0/0x140c (unreliable) [c2315f40] [c0013d00] ret_from_syscall+0x0/0x38 --- Exception: c00 at 0xff13a24 LR = 0x10000a3c ---[end of oops]--- kerneloops-0.12+git20090217/test/power5-with-machinecheck.txt0000644000175000017500000001054511174075563022633 0ustar willywilly$ mkvt -id 6 1:mon> t [c000000008c738d0] c000000000432060 .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73a20] c0000000003972e4 .sock_aio_read+0x154/0x18c [c000000008c73b50] c00000000010e5e4 .do_sync_read+0xc4/0x124 [c000000008c73cf0] c00000000010f060 .vfs_read+0x13c/0x208 [c000000008c73d90] c00000000010f830 .sys_read+0x4c/0x8c [c000000008c73e30] c0000000000086c8 syscall_exit+0x0/0x40 --- Exception: c01 (System Call) at 000000001fa473c4 SP (ffafe0d0) is in userspace 1:mon> X Oops: Machine check, sig: 7 [#1] SMP NR_CPUS=128 NUMA pSeries Modules linked in: oprofile autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns nf_conntrack_ipv4 ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state nf_conntrack nfnetlink xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 dm_multipath snd_powermac snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc snd_timer snd soundcore parport_pc lp parport sg ibmveth dm_snapshot dm_zero dm_mirror dm_mod ibmvscsic sd_mod scsi_mod ext3 jbd mbcache ehci_hcd ohci_hcd uhci_hcd NIP: c000000000441188 LR: c000000000432060 CTR: c000000000073cfc REGS: c000000008c735d0 TRAP: 0200 Not tainted (2.6.22.9-61.fc6) MSR: 8000000000109032 CR: 24000448 XER: 00000010 TASK = c000000033b12000[28081] 'scp' THREAD: c000000008c70000 CPU: 1 GPR00: 0000000080000001 c000000008c73850 c000000000741920 c000000018561584 GPR04: c000000033b12360 0000000000000e0c 0000000024000442 0000000000e98000 GPR08: 0000000000000000 0000000000000000 c0000000005fc080 0000000000000000 GPR12: 000000000000d032 c000000000625100 00000000ffafe9cb 0000000000000000 GPR16: 0000000000000000 c000000018aa1300 0000000000000000 0000000000000000 GPR20: 7fffffffffffffff 0000000000000000 0000000000001000 0000000000000001 GPR24: c000000008c73ac8 ffffffffffffffa1 c000000018561584 c000000008c73a90 GPR28: c000000018561300 c0000000185613b0 c000000000707988 c000000018561584 NIP [c000000000441188] ._spin_lock+0x20/0x88 LR [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 Call Trace: [c000000008c73850] [c0000000001971c4] .avc_has_perm+0x6c/0x9c (unreliable) [c000000008c738d0] [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73a20] [c0000000003972e4] .sock_aio_read+0x154/0x18c [c000000008c73b50] [c00000000010e5e4] .do_sync_read+0xc4/0x124 [c000000008c73cf0] [c00000000010f060] .vfs_read+0x13c/0x208 [c000000008c73d90] [c00000000010f830] .sys_read+0x4c/0x8c [c000000008c73e30] [c0000000000086c8] syscall_exit+0x0/0x40 Instruction dump: e8010010 ebe1fff0 7c0803a6 4e800020 7c0802a6 fbe1fff0 7c7f1b78 f8010010 38000000 f821ff81 980d01dc 800d0010 <7d20f828> 2c090000 40820010 7c00f92d BUG: sleeping function called from invalid context at kernel/rwsem.c:20 in_atomic():0, irqs_disabled():1 Call Trace: [c000000008c730b0] [c000000000010594] .show_stack+0x68/0x1b0 (unreliable) [c000000008c73150] [c000000000076ae0] .__might_sleep+0xec/0x108 [c000000008c731d0] [c00000000009fc7c] .down_read+0x28/0x78 [c000000008c73260] [c000000000091bf0] .__blocking_notifier_call_chain+0x4c/0xa4 [c000000008c73310] [c0000000000820b0] .profile_task_exit+0x24/0x3c [c000000008c73390] [c000000000084ae4] .do_exit+0x3c/0x9bc [c000000008c73440] [c000000000027c94] .die+0x238/0x264 [c000000008c734e0] [c0000000000286d0] .machine_check_exception+0x21c/0x24c [c000000008c73560] [c000000000003a24] machine_check_common+0x124/0x180 --- Exception: 200 at ._spin_lock+0x20/0x88 LR = .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73850] [c0000000001971c4] .avc_has_perm+0x6c/0x9c (unreliable) [c000000008c738d0] [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73a20] [c0000000003972e4] .sock_aio_read+0x154/0x18c [c000000008c73b50] [c00000000010e5e4] .do_sync_read+0xc4/0x124 [c000000008c73cf0] [c00000000010f060] .vfs_read+0x13c/0x208 [c000000008c73d90] [c00000000010f830] .sys_read+0x4c/0x8c [c000000008c73e30] [c0000000000086c8] syscall_exit+0x0/0x40 RTAS: event: 5, Type: Unknown, Severity: 3 Machine check in kernel mode. Caused by (from SRR1=8000000000101032): L2 data cache parity error cpu 0x1: Vector: 200 (Machine Check) at [c000000008c72df0] pc: d0000000002dee68: .sync_buffer+0x19c/0x4c0 [oprofile] lr: d0000000002dee4c: .sync_buffer+0x180/0x4c0 [oprofile] sp: c000000008c73070 msr: 8000000000101032 current = 0xc000000033b12000 paca = 0xc000000000625100 pid = 28081, comm = scp enter ? for help 1:mon> zr kerneloops-0.12+git20090217/test/i386-bug-on.txt.out0000644000175000017500000000436711174075563020532 0ustar willywillyStarting kerneloops in debug mode Scanning test/i386-bug-on.txt Found start of oops at line 428 start line is -WARNING: at /tmp/oops.c:5 modinit() (Not tainted)- Found start of oops at line 437 start line is -------------[ cut here ]------------- Submit text is: ---[start of oops]--- ------------[ cut here ]------------ kernel BUG at /tmp/oops.c:5! invalid opcode: 0000 [#1] SMP Modules linked in: oops cpufreq_stats ext2 i915 drm nf_conntrack_ipv4 ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state nf_conntrack xt_tcpudp ip6t_ipv6header ip6t_REJECT ip6table_filter ip6_tables x_tables ipv6 loop dm_multipath rtc_cmos iTCO_wdt iTCO_vendor_support pcspkr i2c_i801 i2c_core battery video ac output power_supply button sg joydev usb_storage dm_snapshot dm_zero dm_mirror dm_mod ahci pata_acpi ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd Pid: 8369, comm: insmod Not tainted (2.6.24-0.77.rc4.git4.fc9 #1) EIP: 0060:[] EFLAGS: 00210286 CPU: 0 EIP is at modinit+0x3/0x7 [oops] EAX: e024e000 EBX: d434d9c8 ECX: e024e300 EDX: 00000001 ESI: e024e300 EDI: e024e300 EBP: d4347eb0 ESP: d4347eb0 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process insmod (pid: 8369, ti=d4347000 task=d4222e10 task.ti=d4347000) Stack: d4347fb0 c0455445 00000000 00000000 d4347ee0 c0423edd 0000001c d434d9a8 00795000 c16df1e8 d41a6af0 0000be7f 00000000 e024e300 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call Trace: [] show_trace_log_lvl+0x1a/0x2f [] show_stack_log_lvl+0x9b/0xa3 [] show_registers+0xa7/0x178 [] die+0x121/0x20c [] do_trap+0x8a/0xa3 [] do_invalid_op+0x88/0x92 [] error_code+0x72/0x78 [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ---[end of oops]--- Submit text is: ---[start of oops]--- WARNING: at /tmp/oops.c:5 modinit() (Not tainted) Pid: 8190, comm: insmod Not tainted 2.6.24-0.77.rc4.git4.fc9 #1 [] show_trace_log_lvl+0x1a/0x2f [] show_trace+0x12/0x14 [] dump_stack+0x6c/0x72 [] modinit+0x38/0x3f [oops] [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ---[end of oops]--- kerneloops-0.12+git20090217/test/powerpc-ps3-oops.txt0000644000175000017500000037420611174075563021210 0ustar willywilly5:333): avc: denied { append } for pid=4820 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690450.081:334): avc: denied { append } for pid=4823 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690452.180:335): avc: denied { append } for pid=4823 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690453.466:336): avc: denied { append } for pid=4825 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690455.644:337): avc: denied { append } for pid=4825 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690456.929:338): avc: denied { append } for pid=4827 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690458.185:339): avc: denied { append } for pid=4827 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690459.396:340): avc: denied { append } for pid=4829 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690461.729:341): avc: denied { append } for pid=4829 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690463.012:342): avc: denied { append } for pid=4831 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690464.563:343): avc: denied { append } for pid=4831 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690465.798:344): avc: denied { append } for pid=4837 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690467.957:345): avc: denied { append } for pid=4837 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690469.215:346): avc: denied { append } for pid=4839 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690471.588:347): avc: denied { append } for pid=4839 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690472.836:348): avc: denied { append } for pid=4841 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690475.622:349): avc: denied { append } for pid=4841 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690476.884:350): avc: denied { append } for pid=4843 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690478.886:351): avc: denied { append } for pid=4843 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690480.099:352): avc: denied { append } for pid=4845 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690481.315:353): avc: denied { append } for pid=4845 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690482.585:354): avc: denied { append } for pid=4847 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690484.744:355): avc: denied { append } for pid=4847 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690485.990:356): avc: denied { append } for pid=4849 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690487.561:357): avc: denied { append } for pid=4849 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690488.805:358): avc: denied { append } for pid=4851 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690490.787:359): avc: denied { append } for pid=4851 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690492.061:360): avc: denied { append } for pid=4853 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690493.593:361): avc: denied { append } for pid=4853 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690494.880:362): avc: denied { append } for pid=4855 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690497.018:363): avc: denied { append } for pid=4855 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690498.260:364): avc: denied { append } for pid=4857 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690499.617:365): avc: denied { append } for pid=4857 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690500.891:366): avc: denied { append } for pid=4859 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690502.853:367): avc: denied { append } for pid=4859 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690504.120:368): avc: denied { append } for pid=4861 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690506.299:369): avc: denied { append } for pid=4861 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690507.538:370): avc: denied { append } for pid=4863 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690510.127:371): avc: denied { append } for pid=4863 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690511.375:372): avc: denied { append } for pid=4865 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690513.182:373): avc: denied { append } for pid=4865 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690514.429:374): avc: denied { append } for pid=4867 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690516.648:375): avc: denied { append } for pid=4867 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690517.875:376): avc: denied { append } for pid=4869 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690519.839:377): avc: denied { append } for pid=4869 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690521.099:378): avc: denied { append } for pid=4871 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690522.610:379): avc: denied { append } for pid=4871 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690523.864:380): avc: denied { append } for pid=4874 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690525.652:381): avc: denied { append } for pid=4874 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690526.886:382): avc: denied { append } for pid=4876 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690529.084:383): avc: denied { append } for pid=4876 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690530.344:384): avc: denied { append } for pid=4878 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690532.428:385): avc: denied { append } for pid=4878 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690533.725:386): avc: denied { append } for pid=4880 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690535.552:387): avc: denied { append } for pid=4880 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690536.742:388): avc: denied { append } for pid=4882 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690538.313:389): avc: denied { append } for pid=4882 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690539.553:390): avc: denied { append } for pid=4885 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690541.537:391): avc: denied { append } for pid=4885 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690542.846:392): avc: denied { append } for pid=4887 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690544.910:393): avc: denied { append } for pid=4887 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690546.207:394): avc: denied { append } for pid=4889 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690547.818:395): avc: denied { append } for pid=4889 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690549.126:396): avc: denied { append } for pid=4891 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690551.149:397): avc: denied { append } for pid=4891 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690552.511:398): avc: denied { append } for pid=4893 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690554.615:399): avc: denied { append } for pid=4893 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690555.908:400): avc: denied { append } for pid=4895 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690557.755:401): avc: denied { append } for pid=4895 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690559.073:402): avc: denied { append } for pid=4897 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690560.800:403): avc: denied { append } for pid=4897 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690562.106:404): avc: denied { append } for pid=4899 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690563.914:405): avc: denied { append } for pid=4899 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690565.245:406): avc: denied { append } for pid=4901 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690567.133:407): avc: denied { append } for pid=4901 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690568.472:408): avc: denied { append } for pid=4903 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690570.770:409): avc: denied { append } for pid=4903 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690572.003:410): avc: denied { append } for pid=4905 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690573.515:411): avc: denied { append } for pid=4905 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690574.785:412): avc: denied { append } for pid=4907 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690576.909:413): avc: denied { append } for pid=4907 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690578.219:414): avc: denied { append } for pid=4909 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690579.891:415): avc: denied { append } for pid=4909 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690581.167:416): avc: denied { append } for pid=4911 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690582.583:417): avc: denied { append } for pid=4911 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690583.801:418): avc: denied { append } for pid=4913 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690585.157:419): avc: denied { append } for pid=4913 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690586.495:420): avc: denied { append } for pid=4915 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690588.598:421): avc: denied { append } for pid=4915 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690589.878:422): avc: denied { append } for pid=4917 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690591.725:423): avc: denied { append } for pid=4917 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690593.038:424): avc: denied { append } for pid=4919 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690594.434:425): avc: denied { append } for pid=4919 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690595.737:426): avc: denied { append } for pid=4921 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690597.740:427): avc: denied { append } for pid=4921 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690599.027:428): avc: denied { append } for pid=4924 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690600.914:429): avc: denied { append } for pid=4924 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690602.232:430): avc: denied { append } for pid=4926 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690603.864:431): avc: denied { append } for pid=4926 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690605.259:432): avc: denied { append } for pid=4928 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690606.635:433): avc: denied { append } for pid=4928 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690607.894:434): avc: denied { append } for pid=4930 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690610.213:435): avc: denied { append } for pid=4930 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690611.436:436): avc: denied { append } for pid=4932 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690613.303:437): avc: denied { append } for pid=4932 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690614.563:438): avc: denied { append } for pid=4935 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690616.175:439): avc: denied { append } for pid=4935 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690617.499:440): avc: denied { append } for pid=4937 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690618.856:441): avc: denied { append } for pid=4937 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690620.198:442): avc: denied { append } for pid=4939 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690622.301:443): avc: denied { append } for pid=4939 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690623.616:444): avc: denied { append } for pid=4941 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690625.463:445): avc: denied { append } for pid=4941 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690626.759:446): avc: denied { append } for pid=4943 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690628.350:447): avc: denied { append } for pid=4943 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690629.699:448): avc: denied { append } for pid=4945 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690631.371:449): avc: denied { append } for pid=4945 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690632.773:450): avc: denied { append } for pid=4947 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690634.857:451): avc: denied { append } for pid=4947 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690636.112:452): avc: denied { append } for pid=4949 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690637.744:453): avc: denied { append } for pid=4949 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690639.070:454): avc: denied { append } for pid=4951 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690641.114:455): avc: denied { append } for pid=4951 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690642.418:456): avc: denied { append } for pid=4953 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690644.542:457): avc: denied { append } for pid=4953 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690645.819:458): avc: denied { append } for pid=4955 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690647.687:459): avc: denied { append } for pid=4955 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690648.981:460): avc: denied { append } for pid=4957 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690650.593:461): avc: denied { append } for pid=4957 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690651.898:462): avc: denied { append } for pid=4959 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690654.257:463): avc: denied { append } for pid=4959 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690655.566:464): avc: denied { append } for pid=4961 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690657.474:465): avc: denied { append } for pid=4961 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690658.762:466): avc: denied { append } for pid=4963 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690661.082:467): avc: denied { append } for pid=4963 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690662.397:468): avc: denied { append } for pid=4965 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690664.601:469): avc: denied { append } for pid=4965 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690665.769:470): avc: denied { append } for pid=4967 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690667.716:471): avc: denied { append } for pid=4967 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690669.027:472): avc: denied { append } for pid=4969 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690671.190:473): avc: denied { append } for pid=4969 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690672.530:474): avc: denied { append } for pid=4971 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690674.438:475): avc: denied { append } for pid=4971 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690675.744:476): avc: denied { append } for pid=4974 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690677.731:477): avc: denied { append } for pid=4974 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690679.550:478): avc: denied { append } for pid=4976 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690681.753:479): avc: denied { append } for pid=4976 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690683.056:480): avc: denied { append } for pid=4978 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690684.472:481): avc: denied { append } for pid=4978 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690685.744:482): avc: denied { append } for pid=4980 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690687.772:483): avc: denied { append } for pid=4980 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690689.045:484): avc: denied { append } for pid=4983 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690690.622:485): avc: denied { append } for pid=4983 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690691.925:486): avc: denied { append } for pid=4985 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690694.108:487): avc: denied { append } for pid=4985 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690695.413:488): avc: denied { append } for pid=4987 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690697.480:489): avc: denied { append } for pid=4987 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690698.786:490): avc: denied { append } for pid=4989 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690701.266:491): avc: denied { append } for pid=4989 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690702.625:492): avc: denied { append } for pid=4991 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690704.317:493): avc: denied { append } for pid=4991 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690705.680:494): avc: denied { append } for pid=4993 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690707.783:495): avc: denied { append } for pid=4993 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690709.140:496): avc: denied { append } for pid=4995 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690711.128:497): avc: denied { append } for pid=4995 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690712.554:498): avc: denied { append } for pid=4997 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690714.953:499): avc: denied { append } for pid=4997 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690716.305:500): avc: denied { append } for pid=4999 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690718.254:501): avc: denied { append } for pid=4999 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690719.591:502): avc: denied { append } for pid=5001 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690721.619:503): avc: denied { append } for pid=5001 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690722.931:504): avc: denied { append } for pid=5003 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690725.370:505): avc: denied { append } for pid=5003 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690726.652:506): avc: denied { append } for pid=5005 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690728.641:507): avc: denied { append } for pid=5005 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690729.914:508): avc: denied { append } for pid=5007 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690731.983:509): avc: denied { append } for pid=5007 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690733.270:510): avc: denied { append } for pid=5009 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690735.554:511): avc: denied { append } for pid=5009 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690736.810:512): avc: denied { append } for pid=5011 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690738.838:513): avc: denied { append } for pid=5011 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690740.134:514): avc: denied { append } for pid=5013 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690742.378:515): avc: denied { append } for pid=5013 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690743.643:516): avc: denied { append } for pid=5015 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690745.630:517): avc: denied { append } for pid=5015 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690746.909:518): avc: denied { append } for pid=5017 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690748.977:519): avc: denied { append } for pid=5017 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690750.279:520): avc: denied { append } for pid=5020 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690752.563:521): avc: denied { append } for pid=5020 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690753.833:522): avc: denied { append } for pid=5022 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690756.527:523): avc: denied { append } for pid=5022 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690757.816:524): avc: denied { append } for pid=5024 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690760.060:525): avc: denied { append } for pid=5024 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690761.243:526): avc: denied { append } for pid=5026 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690762.705:527): avc: denied { append } for pid=5026 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690763.999:528): avc: denied { append } for pid=5029 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690766.539:529): avc: denied { append } for pid=5029 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690767.819:530): avc: denied { append } for pid=5031 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690769.436:531): avc: denied { append } for pid=5031 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690770.773:532): avc: denied { append } for pid=5033 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690772.801:533): avc: denied { append } for pid=5033 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690774.110:534): avc: denied { append } for pid=5035 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690776.022:535): avc: denied { append } for pid=5035 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690777.303:536): avc: denied { append } for pid=5037 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690779.626:537): avc: denied { append } for pid=5037 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690780.888:538): avc: denied { append } for pid=5039 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690782.955:539): avc: denied { append } for pid=5039 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690784.255:540): avc: denied { append } for pid=5041 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690786.207:541): avc: denied { append } for pid=5041 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690787.427:542): avc: denied { append } for pid=5043 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690789.790:543): avc: denied { append } for pid=5043 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690791.074:544): avc: denied { append } for pid=5045 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690792.651:545): avc: denied { append } for pid=5045 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690793.842:546): avc: denied { append } for pid=5047 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690795.694:547): avc: denied { append } for pid=5047 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690796.883:548): avc: denied { append } for pid=5049 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690798.815:549): avc: denied { append } for pid=5049 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690800.112:550): avc: denied { append } for pid=5051 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690802.261:551): avc: denied { append } for pid=5051 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690803.556:552): avc: denied { append } for pid=5053 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690805.448:553): avc: denied { append } for pid=5053 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690806.721:554): avc: denied { append } for pid=5055 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690808.694:555): avc: denied { append } for pid=5055 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690809.911:556): avc: denied { append } for pid=5057 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690811.628:557): avc: denied { append } for pid=5057 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690812.915:558): avc: denied { append } for pid=5059 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690815.043:559): avc: denied { append } for pid=5059 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690816.198:560): avc: denied { append } for pid=5061 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690817.875:561): avc: denied { append } for pid=5061 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690819.149:562): avc: denied { append } for pid=5063 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690820.907:563): avc: denied { append } for pid=5063 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690822.167:564): avc: denied { append } for pid=5065 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690824.335:565): avc: denied { append } for pid=5065 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690825.602:566): avc: denied { append } for pid=5068 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690828.181:567): avc: denied { append } for pid=5068 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690829.460:568): avc: denied { append } for pid=5070 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690830.921:569): avc: denied { append } for pid=5070 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690832.184:570): avc: denied { append } for pid=5072 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690834.724:571): avc: denied { append } for pid=5072 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690836.009:572): avc: denied { append } for pid=5074 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690838.097:573): avc: denied { append } for pid=5074 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690839.374:574): avc: denied { append } for pid=5077 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690840.876:575): avc: denied { append } for pid=5077 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690842.157:576): avc: denied { append } for pid=5079 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690844.070:577): avc: denied { append } for pid=5079 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690845.339:578): avc: denied { append } for pid=5081 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690846.996:579): avc: denied { append } for pid=5081 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690848.265:580): avc: denied { append } for pid=5083 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690850.334:581): avc: denied { append } for pid=5083 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690851.567:582): avc: denied { append } for pid=5085 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690853.048:583): avc: denied { append } for pid=5085 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690854.293:584): avc: denied { append } for pid=5087 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690856.185:585): avc: denied { append } for pid=5087 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690857.402:586): avc: denied { append } for pid=5089 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690859.374:587): avc: denied { append } for pid=5089 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690860.630:588): avc: denied { append } for pid=5091 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690862.682:589): avc: denied { append } for pid=5091 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690863.922:590): avc: denied { append } for pid=5093 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690865.052:591): avc: denied { append } for pid=5093 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690866.279:592): avc: denied { append } for pid=5095 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690867.820:593): avc: denied { append } for pid=5095 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690869.099:594): avc: denied { append } for pid=5097 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690871.051:595): avc: denied { append } for pid=5097 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690872.257:596): avc: denied { append } for pid=5099 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690874.289:597): avc: denied { append } for pid=5099 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690875.747:598): avc: denied { append } for pid=5101 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690876.858:599): avc: denied { append } for pid=5101 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690878.125:600): avc: denied { append } for pid=5103 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690879.646:601): avc: denied { append } for pid=5103 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690880.881:602): avc: denied { append } for pid=5105 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690883.676:603): avc: denied { append } for pid=5105 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690884.865:604): avc: denied { append } for pid=5107 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690886.878:605): avc: denied { append } for pid=5107 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690889.717:606): avc: denied { append } for pid=5109 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690893.138:607): avc: denied { append } for pid=5112 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690894.382:608): avc: denied { append } for pid=5115 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690895.768:609): avc: denied { append } for pid=5115 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690897.007:610): avc: denied { append } for pid=5117 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690898.804:611): avc: denied { append } for pid=5117 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690899.962:612): avc: denied { append } for pid=5120 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690901.699:613): avc: denied { append } for pid=5120 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690902.966:614): avc: denied { append } for pid=5122 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690905.114:615): avc: denied { append } for pid=5122 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690906.397:616): avc: denied { append } for pid=5124 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690907.764:617): avc: denied { append } for pid=5124 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690909.027:618): avc: denied { append } for pid=5126 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690910.804:619): avc: denied { append } for pid=5126 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690911.986:620): avc: denied { append } for pid=5128 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690914.039:621): avc: denied { append } for pid=5128 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690915.279:622): avc: denied { append } for pid=5131 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690917.547:623): avc: denied { append } for pid=5131 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690918.844:624): avc: denied { append } for pid=5133 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690920.191:625): avc: denied { append } for pid=5133 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690921.481:626): avc: denied { append } for pid=5135 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690923.238:627): avc: denied { append } for pid=5135 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690924.387:628): avc: denied { append } for pid=5137 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690925.889:629): avc: denied { append } for pid=5137 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690927.163:630): avc: denied { append } for pid=5139 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690929.412:631): avc: denied { append } for pid=5139 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690930.682:632): avc: denied { append } for pid=5141 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690932.345:633): avc: denied { append } for pid=5141 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690933.569:634): avc: denied { append } for pid=5143 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690935.643:635): avc: denied { append } for pid=5143 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690936.900:636): avc: denied { append } for pid=5145 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690938.051:637): avc: denied { append } for pid=5145 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690941.588:638): avc: denied { append } for pid=5147 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690942.867:639): avc: denied { append } for pid=5150 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690944.510:640): avc: denied { append } for pid=5150 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690945.785:641): avc: denied { append } for pid=5152 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690947.839:642): avc: denied { append } for pid=5152 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690949.138:643): avc: denied { append } for pid=5154 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690951.076:644): avc: denied { append } for pid=5154 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690952.401:645): avc: denied { append } for pid=5156 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690954.749:646): avc: denied { append } for pid=5156 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690956.044:647): avc: denied { append } for pid=5158 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690957.607:648): avc: denied { append } for pid=5158 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690958.901:649): avc: denied { append } for pid=5160 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690960.739:650): avc: denied { append } for pid=5160 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690962.022:651): avc: denied { append } for pid=5162 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690964.075:652): avc: denied { append } for pid=5162 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690965.354:653): avc: denied { append } for pid=5164 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690967.819:654): avc: denied { append } for pid=5164 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690969.101:655): avc: denied { append } for pid=5166 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690971.114:656): avc: denied { append } for pid=5166 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690972.389:657): avc: denied { append } for pid=5168 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690974.482:658): avc: denied { append } for pid=5168 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690975.780:659): avc: denied { append } for pid=5171 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690977.617:660): avc: denied { append } for pid=5171 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690978.915:661): avc: denied { append } for pid=5173 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690980.497:662): avc: denied { append } for pid=5173 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690981.744:663): avc: denied { append } for pid=5175 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690983.737:664): avc: denied { append } for pid=5175 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690985.002:665): avc: denied { append } for pid=5177 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690986.879:666): avc: denied { append } for pid=5177 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690988.153:667): avc: denied { append } for pid=5179 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690990.441:668): avc: denied { append } for pid=5179 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690991.725:669): avc: denied { append } for pid=5182 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690993.091:670): avc: denied { append } for pid=5182 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690994.390:671): avc: denied { append } for pid=5184 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690996.504:672): avc: denied { append } for pid=5184 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690997.862:673): avc: denied { append } for pid=5186 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196690999.719:674): avc: denied { append } for pid=5186 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691001.005:675): avc: denied { append } for pid=5188 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691003.078:676): avc: denied { append } for pid=5188 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691004.636:677): avc: denied { append } for pid=5190 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691006.790:678): avc: denied { append } for pid=5190 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691008.056:679): avc: denied { append } for pid=5192 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691009.758:680): avc: denied { append } for pid=5192 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691011.124:681): avc: denied { append } for pid=5194 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691013.237:682): avc: denied { append } for pid=5194 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691014.556:683): avc: denied { append } for pid=5196 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691016.413:684): avc: denied { append } for pid=5196 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691017.704:685): avc: denied { append } for pid=5198 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691019.641:686): avc: denied { append } for pid=5198 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691020.952:687): avc: denied { append } for pid=5200 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691022.634:688): avc: denied { append } for pid=5200 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691023.954:689): avc: denied { append } for pid=5202 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691026.047:690): avc: denied { append } for pid=5202 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691027.302:691): avc: denied { append } for pid=5204 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691029.279:692): avc: denied { append } for pid=5204 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691030.596:693): avc: denied { append } for pid=5206 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691032.985:694): avc: denied { append } for pid=5206 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691034.360:695): avc: denied { append } for pid=5208 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691036.298:696): avc: denied { append } for pid=5208 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691037.656:697): avc: denied { append } for pid=5210 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691040.340:698): avc: denied { append } for pid=5210 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691041.636:699): avc: denied { append } for pid=5212 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691043.870:700): avc: denied { append } for pid=5212 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691045.220:701): avc: denied { append } for pid=5214 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691047.334:702): avc: denied { append } for pid=5214 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691048.594:703): avc: denied { append } for pid=5217 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691050.788:704): avc: denied { append } for pid=5217 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691052.087:705): avc: denied { append } for pid=5219 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691053.829:706): avc: denied { append } for pid=5219 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691055.164:707): avc: denied { append } for pid=5221 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691057.318:708): avc: denied { append } for pid=5221 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691058.607:709): avc: denied { append } for pid=5223 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691060.505:710): avc: denied { append } for pid=5223 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691061.785:711): avc: denied { append } for pid=5225 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691064.429:712): avc: denied { append } for pid=5225 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691065.743:713): avc: denied { append } for pid=5228 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691067.936:714): avc: denied { append } for pid=5228 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691069.235:715): avc: denied { append } for pid=5230 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691070.978:716): avc: denied { append } for pid=5230 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691072.273:717): avc: denied { append } for pid=5232 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691074.762:718): avc: denied { append } for pid=5232 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691076.051:719): avc: denied { append } for pid=5234 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691077.753:720): avc: denied { append } for pid=5234 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691079.099:721): avc: denied { append } for pid=5236 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691081.548:722): avc: denied { append } for pid=5236 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691082.876:723): avc: denied { append } for pid=5238 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691084.738:724): avc: denied { append } for pid=5238 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691086.078:725): avc: denied { append } for pid=5240 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691087.820:726): avc: denied { append } for pid=5240 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691089.151:727): avc: denied { append } for pid=5242 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691091.304:728): avc: denied { append } for pid=5242 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691092.688:729): avc: denied { append } for pid=5244 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691094.922:730): avc: denied { append } for pid=5244 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691096.292:731): avc: denied { append } for pid=5246 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691098.742:732): avc: denied { append } for pid=5246 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691100.037:733): avc: denied { append } for pid=5248 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691102.035:734): avc: denied { append } for pid=5248 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691103.413:735): avc: denied { append } for pid=5250 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691106.157:736): avc: denied { append } for pid=5250 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691107.524:737): avc: denied { append } for pid=5252 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691109.817:738): avc: denied { append } for pid=5252 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691111.181:739): avc: denied { append } for pid=5254 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691113.354:740): avc: denied { append } for pid=5254 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691114.738:741): avc: denied { append } for pid=5256 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691117.327:742): avc: denied { append } for pid=5256 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691118.577:743): avc: denied { append } for pid=5258 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691121.047:744): avc: denied { append } for pid=5258 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691122.417:745): avc: denied { append } for pid=5260 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691124.436:746): avc: denied { append } for pid=5260 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691125.784:747): avc: denied { append } for pid=5263 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691127.882:748): avc: denied { append } for pid=5263 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691129.296:749): avc: denied { append } for pid=5265 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691131.609:750): avc: denied { append } for pid=5265 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691132.890:751): avc: denied { append } for pid=5267 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691134.949:752): avc: denied { append } for pid=5267 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691136.327:753): avc: denied { append } for pid=5269 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691138.937:754): avc: denied { append } for pid=5269 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691140.330:755): avc: denied { append } for pid=5272 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691142.152:756): avc: denied { append } for pid=5272 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691143.497:757): avc: denied { append } for pid=5274 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691145.731:758): avc: denied { append } for pid=5274 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691147.123:759): avc: denied { append } for pid=5276 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691148.574:760): avc: denied { append } for pid=5276 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691149.954:761): avc: denied { append } for pid=5278 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691152.012:762): avc: denied { append } for pid=5278 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691153.462:763): avc: denied { append } for pid=5280 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691155.736:764): avc: denied { append } for pid=5280 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691157.141:765): avc: denied { append } for pid=5282 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691159.631:766): avc: denied { append } for pid=5282 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691160.976:767): avc: denied { append } for pid=5284 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691163.546:768): avc: denied { append } for pid=5284 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691164.893:769): avc: denied { append } for pid=5286 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691167.011:770): avc: denied { append } for pid=5286 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691168.387:771): avc: denied { append } for pid=5288 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691170.385:772): avc: denied { append } for pid=5288 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691171.556:773): avc: denied { append } for pid=5290 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691173.970:774): avc: denied { append } for pid=5290 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691175.312:775): avc: denied { append } for pid=5292 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691177.605:776): avc: denied { append } for pid=5292 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691178.919:777): avc: denied { append } for pid=5294 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691180.958:778): avc: denied { append } for pid=5294 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691182.271:779): avc: denied { append } for pid=5296 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691183.527:780): avc: denied { append } for pid=5296 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691184.844:781): avc: denied { append } for pid=5298 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691187.373:782): avc: denied { append } for pid=5298 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691188.709:783): avc: denied { append } for pid=5300 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691190.787:784): avc: denied { append } for pid=5300 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691192.066:785): avc: denied { append } for pid=5302 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691194.028:786): avc: denied { append } for pid=5302 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691195.224:787): avc: denied { append } for pid=5304 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691197.597:788): avc: denied { append } for pid=5304 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691198.917:789): avc: denied { append } for pid=5307 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691201.034:790): avc: denied { append } for pid=5307 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691202.247:791): avc: denied { append } for pid=5309 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691204.249:792): avc: denied { append } for pid=5309 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691205.455:793): avc: denied { append } for pid=5311 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691207.202:794): avc: denied { append } for pid=5311 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691208.516:795): avc: denied { append } for pid=5313 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691210.674:796): avc: denied { append } for pid=5313 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691211.958:797): avc: denied { append } for pid=5315 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691214.528:798): avc: denied { append } for pid=5315 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691215.694:799): avc: denied { append } for pid=5318 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691217.481:800): avc: denied { append } for pid=5318 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691218.801:801): avc: denied { append } for pid=5320 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691221.000:802): avc: denied { append } for pid=5320 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691222.324:803): avc: denied { append } for pid=5322 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691224.402:804): avc: denied { append } for pid=5322 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691225.692:805): avc: denied { append } for pid=5324 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691227.519:806): avc: denied { append } for pid=5324 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691228.790:807): avc: denied { append } for pid=5326 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691230.362:808): avc: denied { append } for pid=5326 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691231.646:809): avc: denied { append } for pid=5328 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691233.629:810): avc: denied { append } for pid=5328 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691234.956:811): avc: denied { append } for pid=5330 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691237.350:812): avc: denied { append } for pid=5330 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691238.633:813): avc: denied { append } for pid=5332 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691240.576:814): avc: denied { append } for pid=5332 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691241.859:815): avc: denied { append } for pid=5334 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691244.212:816): avc: denied { append } for pid=5334 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691245.508:817): avc: denied { append } for pid=5336 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691248.078:818): avc: denied { append } for pid=5336 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691249.389:819): avc: denied { append } for pid=5338 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691251.177:820): avc: denied { append } for pid=5338 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691252.487:821): avc: denied { append } for pid=5340 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691254.686:822): avc: denied { append } for pid=5340 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691255.979:823): avc: denied { append } for pid=5342 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691257.922:824): avc: denied { append } for pid=5342 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691259.291:825): avc: denied { append } for pid=5344 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691261.119:826): avc: denied { append } for pid=5344 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691262.451:827): avc: denied { append } for pid=5346 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691264.022:828): avc: denied { append } for pid=5346 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691265.357:829): avc: denied { append } for pid=5348 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691268.006:830): avc: denied { append } for pid=5348 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691269.264:831): avc: denied { append } for pid=5350 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691271.131:832): avc: denied { append } for pid=5350 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691272.451:833): avc: denied { append } for pid=5352 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691274.062:834): avc: denied { append } for pid=5352 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691275.348:835): avc: denied { append } for pid=5355 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691277.371:836): avc: denied { append } for pid=5355 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691278.685:837): avc: denied { append } for pid=5357 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691280.452:838): avc: denied { append } for pid=5357 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691283.536:839): avc: denied { append } for pid=5359 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691286.339:840): avc: denied { append } for pid=5362 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691287.503:841): avc: denied { append } for pid=5365 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691289.507:842): avc: denied { append } for pid=5365 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691290.793:843): avc: denied { append } for pid=5368 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691292.209:844): avc: denied { append } for pid=5368 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691293.532:845): avc: denied { append } for pid=5370 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691295.359:846): avc: denied { append } for pid=5370 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691298.237:847): avc: denied { append } for pid=5372 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691299.530:848): avc: denied { append } for pid=5375 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691301.513:849): avc: denied { append } for pid=5375 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691302.822:850): avc: denied { append } for pid=5377 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691304.218:851): avc: denied { append } for pid=5377 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691305.540:852): avc: denied { append } for pid=5379 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691307.347:853): avc: denied { append } for pid=5379 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691308.620:854): avc: denied { append } for pid=5381 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691310.172:855): avc: denied { append } for pid=5381 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691311.430:856): avc: denied { append } for pid=5383 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691313.393:857): avc: denied { append } for pid=5383 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691314.672:858): avc: denied { append } for pid=5385 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691316.048:859): avc: denied { append } for pid=5385 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691317.361:860): avc: denied { append } for pid=5387 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691319.485:861): avc: denied { append } for pid=5387 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691320.724:862): avc: denied { append } for pid=5389 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691321.926:863): avc: denied { append } for pid=5389 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691323.261:864): avc: denied { append } for pid=5391 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691325.208:865): avc: denied { append } for pid=5391 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691326.515:866): avc: denied { append } for pid=5393 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691328.207:867): avc: denied { append } for pid=5393 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691329.531:868): avc: denied { append } for pid=5395 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691331.634:869): avc: denied { append } for pid=5395 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691332.897:870): avc: denied { append } for pid=5397 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691334.079:871): avc: denied { append } for pid=5397 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691335.343:872): avc: denied { append } for pid=5399 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691337.271:873): avc: denied { append } for pid=5399 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691338.541:874): avc: denied { append } for pid=5401 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691340.213:875): avc: denied { append } for pid=5401 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691341.494:876): avc: denied { append } for pid=5403 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691343.578:877): avc: denied { append } for pid=5403 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691344.850:878): avc: denied { append } for pid=5405 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691346.011:879): avc: denied { append } for pid=5405 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691347.277:880): avc: denied { append } for pid=5407 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691349.184:881): avc: denied { append } for pid=5407 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691352.088:882): avc: denied { append } for pid=5410 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691353.381:883): avc: denied { append } for pid=5413 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691355.444:884): avc: denied { append } for pid=5413 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691356.691:885): avc: denied { append } for pid=5415 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691358.168:886): avc: denied { append } for pid=5415 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691359.454:887): avc: denied { append } for pid=5417 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691361.342:888): avc: denied { append } for pid=5417 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691363.146:889): avc: denied { append } for pid=5419 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691364.582:890): avc: denied { append } for pid=5419 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691365.898:891): avc: denied { append } for pid=5422 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691367.942:892): avc: denied { append } for pid=5422 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691369.268:893): avc: denied { append } for pid=5424 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691371.196:894): avc: denied { append } for pid=5424 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691372.379:895): avc: denied { append } for pid=5426 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691374.717:896): avc: denied { append } for pid=5426 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691375.946:897): avc: denied { append } for pid=5428 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691377.363:898): avc: denied { append } for pid=5428 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691378.686:899): avc: denied { append } for pid=5430 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691380.850:900): avc: denied { append } for pid=5430 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691382.238:901): avc: denied { append } for pid=5432 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691383.950:902): avc: denied { append } for pid=5432 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691385.239:903): avc: denied { append } for pid=5434 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691387.362:904): avc: denied { append } for pid=5434 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691388.638:905): avc: denied { append } for pid=5436 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691390.505:906): avc: denied { append } for pid=5436 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691391.780:907): avc: denied { append } for pid=5438 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691394.394:908): avc: denied { append } for pid=5438 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691395.675:909): avc: denied { append } for pid=5440 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691397.838:910): avc: denied { append } for pid=5440 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691399.151:911): avc: denied { append } for pid=5442 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691400.863:912): avc: denied { append } for pid=5442 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691402.204:913): avc: denied { append } for pid=5444 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691404.663:914): avc: denied { append } for pid=5444 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691405.862:915): avc: denied { append } for pid=5446 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691407.398:916): avc: denied { append } for pid=5446 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691408.583:917): avc: denied { append } for pid=5448 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691410.530:918): avc: denied { append } for pid=5448 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691411.808:919): avc: denied { append } for pid=5450 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691413.500:920): avc: denied { append } for pid=5450 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691414.772:921): avc: denied { append } for pid=5452 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691417.212:922): avc: denied { append } for pid=5452 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691421.733:923): avc: denied { append } for pid=5454 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691424.133:924): avc: denied { append } for pid=5454 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691425.474:925): avc: denied { append } for pid=5457 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691427.422:926): avc: denied { append } for pid=5457 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691432.836:927): avc: denied { append } for pid=5459 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file audit(1196691434.745:928): avc: denied { append } for pid=5459 comm="sshd" name="btmp" dev=dm-0 ino=1500711 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file SELinux: initialized (dev 0:18, type nfs), uses genfs_contexts usb 1-2.1: USB disconnect, address 3 usb 1-2.1.3: USB disconnect, address 6 tun: Universal TUN/TAP device driver, 1.6 tun: (C) 1999-2004 Max Krasnyansky sixxs: Disabled Privacy Extensions sixxs: Disabled Privacy Extensions sixxs: no IPv6 routers present device sixxs entered promiscuous mode audit(1196936366.144:929): dev=sixxs prom=256 old_prom=0 auid=4294967295 device sixxs left promiscuous mode audit(1196936370.962:930): dev=sixxs prom=0 old_prom=256 auid=4294967295 device sixxs entered promiscuous mode audit(1196936376.988:931): dev=sixxs prom=256 old_prom=0 auid=4294967295 device sixxs left promiscuous mode audit(1196936387.676:932): dev=sixxs prom=0 old_prom=256 auid=4294967295 foo: module license 'unspecified' taints kernel. Unable to handle kernel paging request for data at address 0x00000000 Faulting instruction address: 0xd0000000000b5004 Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=128 NUMA PS3 Modules linked in: foo(P)(U) tun nfs lockd nfs_acl rfcomm l2cap autofs4 sunrpc sit tunnel4 ipv6 spufs dm_multipath snd_ps3 snd_seq_dummy sr_mod cdrom snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss hci_usb bluetooth ps3_gelic snd_pcm ps3rom snd_page_alloc ps3flash snd_timer snd soundcore joydev sg usb_storage sd_mod scsi_mod dm_snapshot dm_zero dm_mirror dm_mod ps3disk ps3stor_lib ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd NIP: d0000000000b5004 LR: c0000000000adce4 CTR: d0000000000b5000 REGS: c0006c005e443a10 TRAP: 0300 Tainted: P (2.6.23.1-43.fc8) MSR: 8000000000008032 CR: 24000488 XER: 00000000 DAR: 0000000000000000, DSISR: 0000000042000000 TASK = c000000004fad1a0[15585] 'insmod' THREAD: c0006c005e440000 CPU: 1 GPR00: d0000000000b5000 c0006c005e443c90 d0000000000c1710 0000000000000000 GPR04: 0000000000000001 d0000000000b5400 ffffffffffffffff 0000000000000000 GPR08: 0000000000000000 0000000000000000 c0000000007d8af0 d0000000000c1700 GPR12: 00000000000186a0 c00000000065cb00 0000000000000000 d000000000478888 GPR16: 0000000000000006 0000000000000000 00000000100d0000 000000000000001f GPR20: d000000000477f50 d0000000000b5090 0000000000000000 d000000000465000 GPR24: 0000000000000022 d0000000000b5400 0000000000000023 0000000000000001 GPR28: c000000007bd45a0 c0000000006949d8 c0000000006e8670 d0000000000b5400 NIP [d0000000000b5004] .init_module+0x4/0x40 [foo] LR [c0000000000adce4] .sys_init_module+0x1690/0x184c Call Trace: [c0006c005e443c90] [c0000000000adcbc] .sys_init_module+0x1668/0x184c (unreliable) [c0006c005e443e30] [c000000000008548] syscall_exit+0x0/0x40 Instruction dump: XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 39200000 <91290000> 0fe00000 48000000 00000000 kerneloops-0.12+git20090217/test/i386-oops-with-end-marker.txt.out0000644000175000017500000000440011174075563023303 0ustar willywillyStarting kerneloops in debug mode Scanning test/i386-oops-with-end-marker.txt Found start of oops at line 1 start line is -double fault: 0000 [1] PREEMPT SMP - Found start of oops at line 25 start line is -BUG: spinlock lockup on CPU#0, grub/2847, ffff81003c57fd50- Submit text is: ---[start of oops]--- BUG: spinlock lockup on CPU#0, grub/2847, ffff81003c57fd50 Pid: 2847, comm: grub Tainted: G D 2.6.24-rc5 #234 Call Trace: <#DF> [] _raw_spin_lock+0xfd/0x125 [] _spin_lock_irqsave+0x20/0x27 [] taskstats_exit+0xd2/0x2cf [] do_exit+0x24f/0x772 [] do_unblank_screen+0xf/0x11e [] oops_begin+0x0/0x96 [] die+0x5d/0x66 [] do_double_fault+0x63/0x65 [] double_fault+0x7d/0x90 [] do_general_protection+0x0/0x11a [] do_general_protection+0xc3/0x11a [] do_general_protection+0xc3/0x11a [] search_extable+0x0/0x64 <> ---[end of oops]--- Submit text is: ---[start of oops]--- double fault: 0000 [1] PREEMPT SMP CPU 0 Pid: 2847, comm: grub Not tainted 2.6.24-rc5 #234 RIP: 0010:[] [] search_extable+0x0/0x64 RSP: 0000:ffff810008000000 EFLAGS: 00010046 RAX: ffffffff8020e66f RBX: 080e050809993830 RCX: ffffffff8020e732 RDX: ffffffff8020e732 RSI: ffffffff80870460 RDI: ffffffff8086c370 RBP: ffff810008000008 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000200 R12: ffff810008000048 R13: 0000000000000000 R14: 0000000000000000 R15: ffff81003c913e78 FS: 00007f80aed7f780(0000) GS:ffffffff80be4000(0063) knlGS:0000000009993830 CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b CR2: ffff810007fffff8 CR3: 000000003cddc000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process grub (pid: 2847, threadinfo ffff81003c912000, task ffff81003fabade0) Stack: Call Trace: Code: 55 48 89 d0 48 89 d1 48 c1 e8 20 48 89 e5 53 75 46 48 b8 00 RIP [] search_extable+0x0/0x64 RSP ---[ end trace a28726ab5968e532 ]--- ---[end of oops]--- kerneloops-0.12+git20090217/test/i386-softlockup.txt.out0000644000175000017500000000143311174075563021523 0ustar willywillyStarting kerneloops in debug mode Scanning test/i386-softlockup.txt Found start of oops at line 170 start line is -BUG: soft lockup detected on CPU#0!- Submit text is: ---[start of oops]--- BUG: soft lockup detected on CPU#0! [] softlockup_tick+0xbb/0x100 [] update_process_times+0x32/0x80 [] tick_sched_timer+0x7f/0x110 [] tick_sched_timer+0x0/0x110 [] hrtimer_interrupt+0x17f/0x210 [] tick_sched_timer+0x0/0x110 [] tick_do_broadcast+0x43/0x50 [] tick_handle_oneshot_broadcast+0x58/0xd0 [] timer_interrupt+0x14/0x50 [] handle_IRQ_event+0x25/0x60 [] handle_edge_irq+0xbf/0x170 [] do_IRQ+0x45/0x80 [] common_interrupt+0x23/0x28 ---[end of oops]--- kerneloops-0.12+git20090217/test/powerpc-ps3-oops.txt.out0000644000175000017500000000404511174075563022005 0ustar willywillyStarting kerneloops in debug mode Scanning test/powerpc-ps3-oops.txt Found start of oops at line 613 start line is -Unable to handle kernel paging request for data at address 0x00000000- Submit text is: ---[start of oops]--- Unable to handle kernel paging request for data at address 0x00000000 Faulting instruction address: 0xd0000000000b5004 Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=128 NUMA PS3 Modules linked in: foo(P)(U) tun nfs lockd nfs_acl rfcomm l2cap autofs4 sunrpc sit tunnel4 ipv6 spufs dm_multipath snd_ps3 snd_seq_dummy sr_mod cdrom snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss hci_usb bluetooth ps3_gelic snd_pcm ps3rom snd_page_alloc ps3flash snd_timer snd soundcore joydev sg usb_storage sd_mod scsi_mod dm_snapshot dm_zero dm_mirror dm_mod ps3disk ps3stor_lib ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd NIP: d0000000000b5004 LR: c0000000000adce4 CTR: d0000000000b5000 REGS: c0006c005e443a10 TRAP: 0300 Tainted: P (2.6.23.1-43.fc8) MSR: 8000000000008032 CR: 24000488 XER: 00000000 DAR: 0000000000000000, DSISR: 0000000042000000 TASK = c000000004fad1a0[15585] 'insmod' THREAD: c0006c005e440000 CPU: 1 GPR00: d0000000000b5000 c0006c005e443c90 d0000000000c1710 0000000000000000 GPR04: 0000000000000001 d0000000000b5400 ffffffffffffffff 0000000000000000 GPR08: 0000000000000000 0000000000000000 c0000000007d8af0 d0000000000c1700 GPR12: 00000000000186a0 c00000000065cb00 0000000000000000 d000000000478888 GPR16: 0000000000000006 0000000000000000 00000000100d0000 000000000000001f GPR20: d000000000477f50 d0000000000b5090 0000000000000000 d000000000465000 GPR24: 0000000000000022 d0000000000b5400 0000000000000023 0000000000000001 GPR28: c000000007bd45a0 c0000000006949d8 c0000000006e8670 d0000000000b5400 NIP [d0000000000b5004] .init_module+0x4/0x40 [foo] LR [c0000000000adce4] .sys_init_module+0x1690/0x184c Call Trace: [c0006c005e443c90] [c0000000000adcbc] .sys_init_module+0x1668/0x184c (unreliable) [c0006c005e443e30] [c000000000008548] syscall_exit+0x0/0x40 ---[end of oops]--- kerneloops-0.12+git20090217/test/i386-softlockup.txt0000755000175000017500000003612311174075563020724 0ustar willywillyscsi0 : ata_piix scsi1 : ata_piix ata1: SATA max UDMA/133 cmd 0x000101f0 ctl 0x000103f6 bmdma 0x000118c0 irq 14 ata2: PATA max UDMA/100 cmd 0x00010170 ctl 0x00010376 bmdma 0x000118c8 irq 15 ata1.00: ATA-6: TOSHIBA MK8032GAX, AB311E, max UDMA/100 ata1.00: 156301488 sectors, multi 16: LBA48 ata1.00: applying bridge limits ata1.00: configured for UDMA/100 ata2.00: ATAPI: UJDA765 DVD/CDRW, 1.70, max UDMA/33 ata2.00: configured for UDMA/33 scsi 0:0:0:0: Direct-Access ATA TOSHIBA MK8032GA AB31 PQ: 0 ANSI: 5 sd 0:0:0:0: [sda] 156301488 512-byte hardware sectors (80026 MB) sd 0:0:0:0: [sda] Write Protect is off sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA sd 0:0:0:0: [sda] 156301488 512-byte hardware sectors (80026 MB) sd 0:0:0:0: [sda] Write Protect is off sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA sda: sda1 sda2 sda3 sda4 sd 0:0:0:0: [sda] Attached SCSI disk sd 0:0:0:0: Attached scsi generic sg0 type 0 scsi 1:0:0:0: CD-ROM MATSHITA UJDA765 DVD/CDRW 1.70 PQ: 0 ANSI: 5 sr0: scsi3-mmc drive: 24x/24x writer cd/rw xa/form2 cdda tray Uniform CD-ROM driver Revision: 3.20 sr 1:0:0:0: Attached scsi CD-ROM sr0 sr 1:0:0:0: Attached scsi generic sg1 type 5 Yenta: CardBus bridge found at 0000:04:00.0 [1014:056c] Clocksource tsc unstable (delta = -441916489 ns) Yenta: ISA IRQ mask 0x04b8, PCI irq 16 Socket status: 30000006 pcmcia: parent PCI bridge I/O window: 0x5000 - 0x8fff pcmcia: parent PCI bridge Memory window: 0xa8400000 - 0xb7ffffff pcmcia: parent PCI bridge Memory window: 0xd0000000 - 0xd7ffffff usbmon: debugfs is not available Initializing USB Mass Storage driver... usbcore: registered new interface driver usb-storage USB Mass Storage support registered. PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 serio: i8042 KBD port at 0x60,0x64 irq 1 serio: i8042 AUX port at 0x60,0x64 irq 12 mice: PS/2 mouse device common for all mice input: AT Translated Set 2 keyboard as /class/input/input4 device-mapper: ioctl: 4.11.0-ioctl (2006-10-12) initialised: dm-devel@redhat.com usbcore: registered new interface driver usbhid drivers/hid/usbhid/hid-core.c: v2.6:USB HID core driver Advanced Linux Sound Architecture Driver Version 1.0.14 (Fri Jul 20 09:12:58 2007 UTC). ALSA device list: No soundcards found. TCP cubic registered NET: Registered protocol family 1 NET: Registered protocol family 17 ieee80211: 802.11 data/management/control stack, git-1.1.13 ieee80211: Copyright (C) 2004-2005 Intel Corporation ieee80211_crypt: registered algorithm 'NULL' Using IPI Shortcut mode drivers/rtc/hctosys.c: unable to open rtc device (rtc0) Synaptics Touchpad, model: 1, fw: 5.9, id: 0x2c6ab1, caps: 0x884793/0x0 serio: Synaptics pass-through port at isa0060/serio1/input0 input: SynPS/2 Synaptics TouchPad as /class/input/input5 IBM TrackPoint firmware: 0x0e, buttons: 3/3 input: TPPS/2 IBM TrackPoint as /class/input/input6 kjournald starting. Commit interval 5 seconds EXT3-fs: mounted filesystem with ordered data mode. VFS: Mounted root (ext3 filesystem) readonly. Freeing unused kernel memory: 228k freed EXT3 FS on sda2, internal journal Adding 1958032k swap on /dev/sda4. Priority:-1 extents:1 across:1958032k kjournald starting. Commit interval 5 seconds EXT3 FS on sda1, internal journal EXT3-fs: mounted filesystem with ordered data mode. kjournald starting. Commit interval 5 seconds EXT3 FS on sda3, internal journal EXT3-fs: mounted filesystem with ordered data mode. pcmcia: Detected deprecated PCMCIA ioctl usage from process: discover. pcmcia: This interface will soon be removed from the kernel; please expect breakage unless you upgrade to new tools. pcmcia: see http://www.kernel.org/pub/linux/utils/kernel/pcmcia/pcmcia.html for details. Linux agpgart interface v0.102 USB Universal Host Controller Interface driver v3.0 ACPI: PCI Interrupt 0000:00:1d.0[A] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:00:1d.0 to 64 uhci_hcd 0000:00:1d.0: UHCI Host Controller uhci_hcd 0000:00:1d.0: new USB bus registered, assigned bus number 1 uhci_hcd 0000:00:1d.0: irq 16, io base 0x00001800 usb usb1: configuration #1 chosen from 1 choice hub 1-0:1.0: USB hub found hub 1-0:1.0: 2 ports detected ACPI: PCI Interrupt 0000:00:1d.1[B] -> GSI 17 (level, low) -> IRQ 20 PCI: Setting latency timer of device 0000:00:1d.1 to 64 uhci_hcd 0000:00:1d.1: UHCI Host Controller uhci_hcd 0000:00:1d.1: new USB bus registered, assigned bus number 2 uhci_hcd 0000:00:1d.1: irq 20, io base 0x00001820 usb usb2: configuration #1 chosen from 1 choice hub 2-0:1.0: USB hub found hub 2-0:1.0: 2 ports detected ACPI: PCI Interrupt 0000:00:1d.2[C] -> GSI 18 (level, low) -> IRQ 21 PCI: Setting latency timer of device 0000:00:1d.2 to 64 uhci_hcd 0000:00:1d.2: UHCI Host Controller uhci_hcd 0000:00:1d.2: new USB bus registered, assigned bus number 3 uhci_hcd 0000:00:1d.2: irq 21, io base 0x00001840 usb usb3: configuration #1 chosen from 1 choice hub 3-0:1.0: USB hub found hub 3-0:1.0: 2 ports detected usb 1-1: new full speed USB device using uhci_hcd and address 2 ACPI: PCI Interrupt 0000:00:1d.3[D] -> GSI 19 (level, low) -> IRQ 22 PCI: Setting latency timer of device 0000:00:1d.3 to 64 uhci_hcd 0000:00:1d.3: UHCI Host Controller uhci_hcd 0000:00:1d.3: new USB bus registered, assigned bus number 4 uhci_hcd 0000:00:1d.3: irq 22, io base 0x00001860 usb usb4: configuration #1 chosen from 1 choice hub 4-0:1.0: USB hub found hub 4-0:1.0: 2 ports detected usb 1-1: configuration #1 chosen from 1 choice hub 1-1:1.0: USB hub found hub 1-1:1.0: 4 ports detected ACPI: PCI Interrupt 0000:00:1d.7[D] -> GSI 19 (level, low) -> IRQ 22 PCI: Setting latency timer of device 0000:00:1d.7 to 64 ehci_hcd 0000:00:1d.7: EHCI Host Controller ehci_hcd 0000:00:1d.7: new USB bus registered, assigned bus number 5 ehci_hcd 0000:00:1d.7: debug port 1 PCI: cache line size of 32 is not supported by device 0000:00:1d.7 ehci_hcd 0000:00:1d.7: irq 22, io mem 0xa8000000 ehci_hcd 0000:00:1d.7: USB 2.0 started, EHCI 1.00, driver 10 Dec 2004 usb usb5: configuration #1 chosen from 1 choice hub 5-0:1.0: USB hub found hub 5-0:1.0: 8 ports detected hub 1-1:1.0: hub_port_status failed (err = -71) hub 1-1:1.0: hub_port_status failed (err = -71) hub 1-1:1.0: hub_port_status failed (err = -71) hub 1-1:1.0: hub_port_status failed (err = -71) ACPI: PCI Interrupt 0000:00:1e.2[A] -> GSI 22 (level, low) -> IRQ 18 PCI: Setting latency timer of device 0000:00:1e.2 to 64 usb 5-1: new high speed USB device using ehci_hcd and address 2 usb 5-1: configuration #1 chosen from 1 choice hub 5-1:1.0: USB hub found hub 5-1:1.0: 4 ports detected usb 1-1: USB disconnect, address 2 AC'97 0 analog subsections not ready usb 5-1.1: new full speed USB device using ehci_hcd and address 3 usb 5-1.1: configuration #1 chosen from 1 choice hub 5-1.1:1.0: USB hub found hub 5-1.1:1.0: 3 ports detected usb 5-1.3: new low speed USB device using ehci_hcd and address 4 intel8x0_measure_ac97_clock: measured 50504 usecs intel8x0: clocking to 48000 usb 5-1.3: configuration #1 chosen from 1 choice input: HID 04b3:310b as /class/input/input7 input: USB HID v1.00 Mouse [HID 04b3:310b] on usb-0000:00:1d.7-1.3 usb 5-1.1.1: new full speed USB device using ehci_hcd and address 5 usb 5-1.1.1: configuration #1 chosen from 1 choice input: Lite-On Technology USB Productivity Option Keyboard( has the hub in # 1 ) as /class/input/input8 input: USB HID v1.10 Keyboard [Lite-On Technology USB Productivity Option Keyboard( has the hub in # 1 )] on usb-0000:00:1d.7-1.1.1 input: Lite-On Technology USB Productivity Option Keyboard( has the hub in # 1 ) as /class/input/input9 input: USB HID v1.10 Device [Lite-On Technology USB Productivity Option Keyboard( has the hub in # 1 )] on usb-0000:00:1d.7-1.1.1 ACPI: PCI Interrupt 0000:00:1e.3[B] -> GSI 23 (level, low) -> IRQ 19 PCI: Setting latency timer of device 0000:00:1e.3 to 64 MC'97 1 converters and GPIO not ready (0xff00) ACPI: PCI Interrupt 0000:00:1f.3[A] -> GSI 23 (level, low) -> IRQ 19 tg3.c:v3.81.1 (October 18, 2007) ACPI: PCI Interrupt 0000:02:00.0[A] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:02:00.0 to 64 eth0: Tigon3 [partno(BCM95751M) rev 4101 PHY(5750)] (PCI Express) 10/100/1000Base-T Ethernet 00:16:41:11:10:17 eth0: RXcsums[1] LinkChgREG[0] MIirq[0] ASF[0] WireSpeed[1] TSOcap[1] eth0: dma_rwctrl[76180000] dma_mask[64-bit] ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.2kmq ipw2200: Copyright(c) 2003-2006 Intel Corporation ACPI: PCI Interrupt 0000:04:02.0[A] -> GSI 21 (level, low) -> IRQ 23 ipw2200: Detected Intel PRO/Wireless 2915ABG Network Connection ipw2200: Detected geography ZZA (11 802.11bg channels, 13 802.11a channels) fuse init (API version 7.8) BUG: soft lockup detected on CPU#0! [] softlockup_tick+0xbb/0x100 [] update_process_times+0x32/0x80 [] tick_sched_timer+0x7f/0x110 [] tick_sched_timer+0x0/0x110 [] hrtimer_interrupt+0x17f/0x210 [] tick_sched_timer+0x0/0x110 [] tick_do_broadcast+0x43/0x50 [] tick_handle_oneshot_broadcast+0x58/0xd0 [] timer_interrupt+0x14/0x50 [] handle_IRQ_event+0x25/0x60 [] handle_edge_irq+0xbf/0x170 [] do_IRQ+0x45/0x80 [] common_interrupt+0x23/0x28 ======================= ip_tables: (C) 2000-2006 Netfilter Core Team NET: Registered protocol family 10 lo: Disabled Privacy Extensions ADDRCONF(NETDEV_UP): eth0: link is not ready ADDRCONF(NETDEV_UP): eth1: link is not ready tg3: eth0: Link is up at 1000 Mbps, full duplex. tg3: eth0: Flow control is on for TX and on for RX. ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [drm] Initialized drm 1.1.0 20060810 ACPI: PCI Interrupt 0000:01:00.0[A] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:01:00.0 to 64 [drm] Initialized radeon 1.28.0 20060524 on minor 0 ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/d2:f1:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 123392 in res 50/00:f1:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete sd 0:0:0:0: [sda] 156301488 512-byte hardware sectors (80026 MB) sd 0:0:0:0: [sda] Write Protect is off sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x2 frozen ata1.00: cmd b0/db:f8:00:4f:c2/00:00:00:00:00/00 tag 0 cdb 0x0 data 126976 in res 50/00:f8:00:4f:c2/00:00:00:00:00/00 Emask 0x202 (HSM violation) ata1: soft resetting port ata1.00: configured for UDMA/100 ata1: EH complete sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA sd 0:0:0:0: [sda] 156301488 512-byte hardware sectors (80026 MB) sd 0:0:0:0: [sda] Write Protect is off sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 [drm] Setting GART location based on new memory map [drm] Loading R300 Microcode [drm] writeback test succeeded in 1 usecs sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA eth0: no IPv6 routers present eth1: no IPv6 routers present process `host' is using obsolete setsockopt SO_BSDCOMPAT ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Firmware error detected. Restarting. ipw2200: Failed to send SYSTEM_CONFIG: Already sending a command. ipw2200: Failed to send SYSTEM_CONFIG: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. ipw2200: Failed to send ASSOCIATE: Already sending a command. kerneloops-0.12+git20090217/test/power5-with-machinecheck.txt.out0000644000175000017500000000745311174075563023445 0ustar willywillyStarting kerneloops in debug mode Scanning test/power5-with-machinecheck.txt Found start of oops at line 9 start line is ---- Exception: c01 (System Call) at 000000001fa473c4- trigger line is -Oops: Machine check, sig: 7 [#1]- Found start of oops at line 40 start line is -BUG: sleeping function called from invalid context at kernel/rwsem.c:20- Submit text is: ---[start of oops]--- BUG: sleeping function called from invalid context at kernel/rwsem.c:20 in_atomic():0, irqs_disabled():1 Call Trace: [c000000008c730b0] [c000000000010594] .show_stack+0x68/0x1b0 (unreliable) [c000000008c73150] [c000000000076ae0] .__might_sleep+0xec/0x108 [c000000008c731d0] [c00000000009fc7c] .down_read+0x28/0x78 [c000000008c73260] [c000000000091bf0] .__blocking_notifier_call_chain+0x4c/0xa4 [c000000008c73310] [c0000000000820b0] .profile_task_exit+0x24/0x3c [c000000008c73390] [c000000000084ae4] .do_exit+0x3c/0x9bc [c000000008c73440] [c000000000027c94] .die+0x238/0x264 [c000000008c734e0] [c0000000000286d0] .machine_check_exception+0x21c/0x24c [c000000008c73560] [c000000000003a24] machine_check_common+0x124/0x180 --- Exception: 200 at ._spin_lock+0x20/0x88 LR = .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73850] [c0000000001971c4] .avc_has_perm+0x6c/0x9c (unreliable) [c000000008c738d0] [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73a20] [c0000000003972e4] .sock_aio_read+0x154/0x18c [c000000008c73b50] [c00000000010e5e4] .do_sync_read+0xc4/0x124 [c000000008c73cf0] [c00000000010f060] .vfs_read+0x13c/0x208 [c000000008c73d90] [c00000000010f830] .sys_read+0x4c/0x8c [c000000008c73e30] [c0000000000086c8] syscall_exit+0x0/0x40 ---[end of oops]--- Submit text is: ---[start of oops]--- --- Exception: c01 (System Call) at 000000001fa473c4 SP (ffafe0d0) is in userspace 1:mon> X Oops: Machine check, sig: 7 [#1] SMP NR_CPUS=128 NUMA pSeries Modules linked in: oprofile autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns nf_conntrack_ipv4 ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state nf_conntrack nfnetlink xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 dm_multipath snd_powermac snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc snd_timer snd soundcore parport_pc lp parport sg ibmveth dm_snapshot dm_zero dm_mirror dm_mod ibmvscsic sd_mod scsi_mod ext3 jbd mbcache ehci_hcd ohci_hcd uhci_hcd NIP: c000000000441188 LR: c000000000432060 CTR: c000000000073cfc REGS: c000000008c735d0 TRAP: 0200 Not tainted (2.6.22.9-61.fc6) MSR: 8000000000109032 CR: 24000448 XER: 00000010 TASK = c000000033b12000[28081] 'scp' THREAD: c000000008c70000 CPU: 1 GPR00: 0000000080000001 c000000008c73850 c000000000741920 c000000018561584 GPR04: c000000033b12360 0000000000000e0c 0000000024000442 0000000000e98000 GPR08: 0000000000000000 0000000000000000 c0000000005fc080 0000000000000000 GPR12: 000000000000d032 c000000000625100 00000000ffafe9cb 0000000000000000 GPR16: 0000000000000000 c000000018aa1300 0000000000000000 0000000000000000 GPR20: 7fffffffffffffff 0000000000000000 0000000000001000 0000000000000001 GPR24: c000000008c73ac8 ffffffffffffffa1 c000000018561584 c000000008c73a90 GPR28: c000000018561300 c0000000185613b0 c000000000707988 c000000018561584 NIP [c000000000441188] ._spin_lock+0x20/0x88 LR [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 Call Trace: [c000000008c73850] [c0000000001971c4] .avc_has_perm+0x6c/0x9c (unreliable) [c000000008c738d0] [c000000000432060] .unix_stream_recvmsg+0x2b4/0x6e0 [c000000008c73a20] [c0000000003972e4] .sock_aio_read+0x154/0x18c [c000000008c73b50] [c00000000010e5e4] .do_sync_read+0xc4/0x124 [c000000008c73cf0] [c00000000010f060] .vfs_read+0x13c/0x208 [c000000008c73d90] [c00000000010f830] .sys_read+0x4c/0x8c [c000000008c73e30] [c0000000000086c8] syscall_exit+0x0/0x40 ---[end of oops]--- kerneloops-0.12+git20090217/test/i386-bug-on.txt0000644000175000017500000005274011174075563017722 0ustar willywillyInitializing cgroup subsys cpuset Linux version 2.6.24-0.77.rc4.git4.fc9 (kojibuilder@) (gcc version 4.1.2 20071124 (Red Hat 4.1.2-35)) #1 SMP Thu Dec 6 16:50:13 EST 2007 BIOS-provided physical RAM map: BIOS-e820: 0000000000000000 - 000000000009fc00 (usable) BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved) BIOS-e820: 00000000000e4000 - 0000000000100000 (reserved) BIOS-e820: 0000000000100000 - 000000001f780000 (usable) BIOS-e820: 000000001f780000 - 000000001f790000 (ACPI data) BIOS-e820: 000000001f790000 - 000000001f7d0000 (ACPI NVS) BIOS-e820: 000000001f7d0000 - 000000001f7de000 (reserved) BIOS-e820: 000000001f7e0000 - 000000001f800000 (reserved) BIOS-e820: 00000000fee00000 - 00000000fee01000 (reserved) BIOS-e820: 00000000fff80000 - 0000000100000000 (reserved) 0MB HIGHMEM available. 503MB LOWMEM available. found SMP MP-table at 000ff780 Using x86 segment limits to approximate NX protection Entering add_active_range(0, 0, 128896) 0 entries of 256 used Zone PFN ranges: DMA 0 -> 4096 Normal 4096 -> 128896 HighMem 128896 -> 128896 Movable zone start PFN for each node early_node_map[1] active PFN ranges 0: 0 -> 128896 On node 0 totalpages: 128896 DMA zone: 56 pages used for memmap DMA zone: 0 pages reserved DMA zone: 4040 pages, LIFO batch:0 Normal zone: 1706 pages used for memmap Normal zone: 123094 pages, LIFO batch:31 HighMem zone: 0 pages used for memmap Movable zone: 0 pages used for memmap DMI present. Using APIC driver default ACPI: RSDP 000FBE60, 0014 (r0 ACPIAM) ACPI: RSDT 1F780000, 0034 (r1 A M I OEMRSDT 10000717 MSFT 97) ACPI: FACP 1F780200, 0081 (r1 A M I OEMFACP 10000717 MSFT 97) ACPI: DSDT 1F780400, 5F17 (r1 A0797 A0797000 0 INTL 20051117) ACPI: FACS 1F790000, 0040 ACPI: APIC 1F780390, 0068 (r1 A M I OEMAPIC 10000717 MSFT 97) ACPI: OEMB 1F790040, 0046 (r1 A M I AMI_OEM 10000717 MSFT 97) ACPI: MCFG 1F786320, 003C (r1 A M I OEMMCFG 10000717 MSFT 97) ACPI: PM-Timer IO Port: 0x808 ACPI: Local APIC address 0xfee00000 ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled) Processor #0 6:13 APIC version 20 ACPI: IOAPIC (id[0x01] address[0xfec00000] gsi_base[0]) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23 ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) ACPI: IRQ0 used by override. ACPI: IRQ2 used by override. ACPI: IRQ9 used by override. Enabling APIC mode: Flat. Using 1 I/O APICs Using ACPI (MADT) for SMP configuration information Allocating PCI resources starting at 20000000 (gap: 1f800000:df600000) swsusp: Registered nosave memory region: 000000000009f000 - 00000000000a0000 swsusp: Registered nosave memory region: 00000000000a0000 - 00000000000e4000 swsusp: Registered nosave memory region: 00000000000e4000 - 0000000000100000 Built 1 zonelists in Zone order, mobility grouping on. Total pages: 127134 Kernel command line: ro root=/dev/VolGroup00/LogVol00 selinux=off mapped APIC to ffffb000 (fee00000) mapped IOAPIC to ffffa000 (fec00000) Enabling fast FPU save and restore... done. Enabling unmasked SIMD FPU exception support... done. Initializing CPU#0 CPU 0 irqstacks, hard=c0826000 soft=c0806000 PID hash table entries: 2048 (order: 11, 8192 bytes) Detected 630.085 MHz processor. Console: colour VGA+ 80x25 console [tty0] enabled Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar ... MAX_LOCKDEP_SUBCLASSES: 8 ... MAX_LOCK_DEPTH: 30 ... MAX_LOCKDEP_KEYS: 2048 ... CLASSHASH_SIZE: 1024 ... MAX_LOCKDEP_ENTRIES: 8192 ... MAX_LOCKDEP_CHAINS: 16384 ... CHAINHASH_SIZE: 8192 memory used by lock dependency info: 1024 kB per task-struct memory footprint: 1680 bytes Dentry cache hash table entries: 65536 (order: 6, 262144 bytes) Inode-cache hash table entries: 32768 (order: 5, 131072 bytes) Memory: 496588k/515584k available (2325k kernel code, 18484k reserved, 1184k data, 576k init, 0k highmem) virtual kernel memory layout: fixmap : 0xffc53000 - 0xfffff000 (3760 kB) pkmap : 0xff800000 - 0xffc00000 (4096 kB) vmalloc : 0xe0000000 - 0xff7fe000 ( 503 MB) lowmem : 0xc0000000 - 0xdf780000 ( 503 MB) .init : 0xc0773000 - 0xc0803000 ( 576 kB) .data : 0xc0645577 - 0xc076d924 (1184 kB) .text : 0xc0400000 - 0xc0645577 (2325 kB) Checking if this processor honours the WP bit even in supervisor mode... Ok. SLUB: Genslabs=11, HWalign=64, Order=0-1, MinObjects=4, CPUs=1, Nodes=1 Calibrating delay using timer specific routine.. 1262.52 BogoMIPS (lpj=631262) Security Framework initialized SELinux: Disabled at boot. Capability LSM initialized Mount-cache hash table entries: 512 Initializing cgroup subsys ns Initializing cgroup subsys cpuacct CPU: After generic identify, caps: afe9fbbf 00000000 00000000 00000000 00000000 00000000 00000000 00000000 CPU: L1 I cache: 32K, L1 D cache: 32K CPU: L2 cache: 512K CPU: After all inits, caps: afe9f3bf 00000000 00000000 00002040 00000000 00000000 00000000 00000000 Intel machine check architecture supported. Intel machine check reporting enabled on CPU#0. Compat vDSO mapped to ffffe000. Checking 'hlt' instruction... OK. SMP alternatives: switching to UP code Freeing SMP alternatives: 12k freed ACPI: Core revision 20070126 CPU0: Intel(R) Celeron(R) M processor 900MHz stepping 06 Total of 1 processors activated (1262.52 BogoMIPS). ENABLING IO-APIC IRQs ..TIMER: vector=0x31 apic1=0 pin1=2 apic2=-1 pin2=-1 APIC calibration not consistent with PM Timer: 119ms instead of 100ms APIC delta adjusted to PM-Timer: 437545 (524973) Brought up 1 CPUs sizeof(vma)=84 bytes sizeof(page)=56 bytes sizeof(inode)=604 bytes sizeof(dentry)=160 bytes sizeof(ext3inode)=856 bytes sizeof(buffer_head)=56 bytes sizeof(skbuff)=176 bytes sizeof(task_struct)=3552 bytes CPU0 attaching sched-domain: domain 0: span 00000001 groups: 00000001 khelper used greatest stack depth: 3104 bytes left net_namespace: 80 bytes Booting paravirtualized kernel on bare hardware Time: 19:23:47 Date: 12/18/07 NET: Registered protocol family 16 No dock devices found. ACPI: bus type pci registered PCI: BIOS Bug: MCFG area at e0000000 is not E820-reserved PCI: Not using MMCONFIG. PCI: PCI BIOS revision 3.00 entry at 0xf0031, last bus=4 PCI: Using configuration type 1 Setting up standard PCI resources khelper used greatest stack depth: 2844 bytes left ACPI: EC: Look up EC in DSDT ACPI: Interpreter enabled ACPI: (supports S0 S1 S3 S4 S5) ACPI: Using IOAPIC for interrupt routing ACPI: EC: GPE = 0x18, I/O: command/status = 0x66, data = 0x62 ACPI: EC: driver started in poll mode ACPI: PCI Root Bridge [PCI0] (0000:00) Force enabled HPET at base address 0xfed00000 PCI quirk: region 0800-087f claimed by ICH6 ACPI/GPIO/TCO PCI quirk: region 0480-04bf claimed by ICH6 GPIO PCI: Transparent bridge - 0000:00:1e.0 ACPI: PCI Interrupt Routing Table [\_SB_.PCI0._PRT] ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.P0P3._PRT] ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.P0P6._PRT] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 10 *11 12 14 15) ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 7 *10 11 12 14 15) ACPI: PCI Interrupt Link [LNKD] (IRQs *3 4 5 6 7 10 11 12 14 15) ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled. ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 *5 6 7 10 11 12 14 15) Linux Plug and Play Support v0.97 (c) Adam Belay pnp: PnP ACPI init ACPI: bus type pnp registered pnp: PnP ACPI: found 13 devices ACPI: ACPI bus type pnp unregistered usbcore: registered new interface driver usbfs usbcore: registered new interface driver hub usbcore: registered new device driver usb PCI: Using ACPI for IRQ routing PCI: If a device doesn't work, try "pci=routeirq". If it helps, post a report NetLabel: Initializing NetLabel: domain hash size = 128 NetLabel: protocols = UNLABELED CIPSOv4 NetLabel: unlabeled traffic allowed by default hpet clockevent registered hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 hpet0: 3 64-bit timers, 14318180 Hz ACPI: RTC can wake from S4 Time: tsc clocksource has been installed. system 00:01: iomem range 0xfed13000-0xfed19fff has been reserved system 00:08: ioport range 0x4d0-0x4d1 has been reserved system 00:08: ioport range 0x800-0x87f has been reserved system 00:08: ioport range 0x480-0x4bf has been reserved system 00:08: iomem range 0xfed1c000-0xfed1ffff has been reserved system 00:08: iomem range 0xfed20000-0xfed8ffff has been reserved system 00:09: iomem range 0xfec00000-0xfec00fff has been reserved system 00:09: iomem range 0xfee00000-0xfee00fff could not be reserved system 00:0a: iomem range 0xe0000000-0xefffffff has been reserved system 00:0b: iomem range 0xe0000000-0xefffffff has been reserved system 00:0c: iomem range 0x0-0x9ffff could not be reserved system 00:0c: iomem range 0xc0000-0xcffff could not be reserved system 00:0c: iomem range 0xe0000-0xfffff could not be reserved system 00:0c: iomem range 0x100000-0x1f7fffff could not be reserved system 00:0c: iomem range 0x0-0x0 could not be reserved PCI: Bridge: 0000:00:1c.0 IO window: disabled. MEM window: disabled. PREFETCH window: disabled. PCI: Bridge: 0000:00:1c.2 IO window: disabled. MEM window: fa000000-fbffffff PREFETCH window: f4000000-f8ffffff PCI: Bridge: 0000:00:1e.0 IO window: disabled. MEM window: disabled. PREFETCH window: disabled. ACPI: PCI Interrupt 0000:00:1c.0[A] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:00:1c.0 to 64 ACPI: PCI Interrupt 0000:00:1c.2[C] -> GSI 18 (level, low) -> IRQ 17 PCI: Setting latency timer of device 0000:00:1c.2 to 64 PCI: Setting latency timer of device 0000:00:1e.0 to 64 NET: Registered protocol family 2 IP route cache hash table entries: 4096 (order: 2, 16384 bytes) TCP established hash table entries: 16384 (order: 5, 131072 bytes) TCP bind hash table entries: 16384 (order: 7, 589824 bytes) TCP: Hash tables configured (established 16384 bind 16384) TCP reno registered checking if image is initramfs...<7>Switched to high resolution mode on CPU 0 it is Freeing initrd memory: 3645k freed ACPI: EC: non-query interrupt received, switching to interrupt mode khelper used greatest stack depth: 2760 bytes left khelper used greatest stack depth: 2740 bytes left apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16ac) apm: overridden by ACPI. audit: initializing netlink socket (disabled) audit(1198005827.694:1): initialized Total HugeTLB memory allocated, 0 VFS: Disk quotas dquot_6.5.1 Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) io scheduler noop registered io scheduler anticipatory registered io scheduler deadline registered io scheduler cfq registered (default) Boot video device is 0000:00:02.0 PCI: Setting latency timer of device 0000:00:1c.0 to 64 assign_interrupt_mode Found MSI capability Allocate Port Service[0000:00:1c.0:pcie00] Allocate Port Service[0000:00:1c.0:pcie02] PCI: Setting latency timer of device 0000:00:1c.2 to 64 assign_interrupt_mode Found MSI capability Allocate Port Service[0000:00:1c.2:pcie00] Allocate Port Service[0000:00:1c.2:pcie02] pci_hotplug: PCI Hot Plug PCI Core version: 0.5 ACPI: CPU0 (power states: C1[C1] C2[C2] C3[C3]) ACPI: Processor [CPU1] (supports 8 throttling states) ACPI: Thermal Zone [TZ00] (35 C) isapnp: Scanning for PnP cards... isapnp: No Plug & Play device found khelper used greatest stack depth: 2732 bytes left Non-volatile memory driver v1.2 Linux agpgart interface v0.103 agpgart: Detected an Intel 915GM Chipset. agpgart: Detected 7932K stolen memory. agpgart: AGP aperture is 256M @ 0xd0000000 Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled RAMDISK driver initialized: 16 RAM disks of 16384K size 4096 blocksize input: Macintosh mouse button emulation as /class/input/input0 PNP: PS/2 Controller [PNP0303:PS2K,PNP0f13:PS2M] at 0x60,0x64 irq 1,12 serio: i8042 KBD port at 0x60,0x64 irq 1 serio: i8042 AUX port at 0x60,0x64 irq 12 khelper used greatest stack depth: 2580 bytes left mice: PS/2 mouse device common for all mice input: AT Translated Set 2 keyboard as /class/input/input1 cpuidle: using governor ladder Synaptics Touchpad, model: 1, fw: 6.3, id: 0x180b1, caps: 0xa04713/0x200000 cpuidle: using governor menu usbcore: registered new interface driver hiddev usbcore: registered new interface driver usbhid drivers/hid/usbhid/hid-core.c: v2.6:USB HID core driver TCP cubic registered Initializing XFRM netlink socket NET: Registered protocol family 1 NET: Registered protocol family 17 Using IPI No-Shortcut mode registered taskstats version 1 Magic number: 3:229:395 Freeing unused kernel memory: 576k freed Write protecting the kernel read-only data: 919k input: SynPS/2 Synaptics TouchPad as /class/input/input2 ACPI: PCI Interrupt 0000:00:1d.7[A] -> GSI 23 (level, low) -> IRQ 18 PCI: Setting latency timer of device 0000:00:1d.7 to 64 ehci_hcd 0000:00:1d.7: EHCI Host Controller ehci_hcd 0000:00:1d.7: new USB bus registered, assigned bus number 1 ehci_hcd 0000:00:1d.7: debug port 1 PCI: cache line size of 32 is not supported by device 0000:00:1d.7 ehci_hcd 0000:00:1d.7: irq 18, io mem 0xf9ebbc00 ehci_hcd 0000:00:1d.7: USB 2.0 started, EHCI 1.00, driver 10 Dec 2004 usb usb1: configuration #1 chosen from 1 choice hub 1-0:1.0: USB hub found hub 1-0:1.0: 8 ports detected insmod used greatest stack depth: 1892 bytes left ohci_hcd: 2006 August 04 USB 1.1 'Open' Host Controller (OHCI) Driver USB Universal Host Controller Interface driver v3.0 ACPI: PCI Interrupt 0000:00:1d.0[A] -> GSI 23 (level, low) -> IRQ 18 PCI: Setting latency timer of device 0000:00:1d.0 to 64 uhci_hcd 0000:00:1d.0: UHCI Host Controller uhci_hcd 0000:00:1d.0: new USB bus registered, assigned bus number 2 uhci_hcd 0000:00:1d.0: irq 18, io base 0x0000e400 usb usb2: configuration #1 chosen from 1 choice hub 2-0:1.0: USB hub found hub 2-0:1.0: 2 ports detected ACPI: PCI Interrupt 0000:00:1d.1[B] -> GSI 19 (level, low) -> IRQ 19 PCI: Setting latency timer of device 0000:00:1d.1 to 64 uhci_hcd 0000:00:1d.1: UHCI Host Controller uhci_hcd 0000:00:1d.1: new USB bus registered, assigned bus number 3 uhci_hcd 0000:00:1d.1: irq 19, io base 0x0000e480 usb usb3: configuration #1 chosen from 1 choice hub 3-0:1.0: USB hub found hub 3-0:1.0: 2 ports detected usb 1-5: new high speed USB device using ehci_hcd and address 2 ACPI: PCI Interrupt 0000:00:1d.2[C] -> GSI 18 (level, low) -> IRQ 17 PCI: Setting latency timer of device 0000:00:1d.2 to 64 uhci_hcd 0000:00:1d.2: UHCI Host Controller uhci_hcd 0000:00:1d.2: new USB bus registered, assigned bus number 4 uhci_hcd 0000:00:1d.2: irq 17, io base 0x0000e800 usb usb4: configuration #1 chosen from 1 choice hub 4-0:1.0: USB hub found hub 4-0:1.0: 2 ports detected usb 1-5: configuration #1 chosen from 1 choice ACPI: PCI Interrupt 0000:00:1d.3[D] -> GSI 16 (level, low) -> IRQ 16 PCI: Setting latency timer of device 0000:00:1d.3 to 64 uhci_hcd 0000:00:1d.3: UHCI Host Controller uhci_hcd 0000:00:1d.3: new USB bus registered, assigned bus number 5 uhci_hcd 0000:00:1d.3: irq 16, io base 0x0000e880 usb usb5: configuration #1 chosen from 1 choice hub 5-0:1.0: USB hub found hub 5-0:1.0: 2 ports detected insmod used greatest stack depth: 1672 bytes left SCSI subsystem initialized libata version 3.00 loaded. ata_piix 0000:00:1f.2: version 2.12 ata_piix 0000:00:1f.2: MAP [ P0 P2 IDE IDE ] ACPI: PCI Interrupt 0000:00:1f.2[B] -> GSI 19 (level, low) -> IRQ 19 PCI: Setting latency timer of device 0000:00:1f.2 to 64 scsi0 : ata_piix scsi1 : ata_piix ata1: SATA max UDMA/133 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14 ata2: PATA max UDMA/100 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15 ata2.00: ATA-4: SILICONMOTION SM223AC, , max UDMA/66 ata2.00: 7815024 sectors, multi 0: LBA ata2.00: limited to UDMA/33 due to 40-wire cable ata2.00: configured for UDMA/33 scsi 1:0:0:0: Direct-Access ATA SILICONMOTION SM n/a PQ: 0 ANSI: 5 sd 1:0:0:0: [sda] 7815024 512-byte hardware sectors (4001 MB) sd 1:0:0:0: [sda] Write Protect is off sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA sd 1:0:0:0: [sda] 7815024 512-byte hardware sectors (4001 MB) sd 1:0:0:0: [sda] Write Protect is off sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA sda: sda1 sda2 sd 1:0:0:0: [sda] Attached SCSI disk insmod used greatest stack depth: 812 bytes left device-mapper: uevent: version 1.0.3 device-mapper: ioctl: 4.12.0-ioctl (2007-10-02) initialised: dm-devel@redhat.com Initializing USB Mass Storage driver... scsi2 : SCSI emulation for USB Mass Storage devices usbcore: registered new interface driver usb-storage USB Mass Storage support registered. usb-storage: device found at 2 usb-storage: waiting for device to settle before scanning kjournald starting. Commit interval 5 seconds EXT3-fs: mounted filesystem with ordered data mode. Marking TSC unstable due to: TSC halts in idle. Time: hpet clocksource has been installed. sd 1:0:0:0: Attached scsi generic sg0 type 0 usb-storage: device scan complete scsi 2:0:0:0: Direct-Access USB2.0 CardReader SD0 0100 PQ: 0 ANSI: 0 sd 2:0:0:0: [sdb] 7903232 512-byte hardware sectors (4046 MB) sd 2:0:0:0: [sdb] Write Protect is off sd 2:0:0:0: [sdb] Mode Sense: 03 00 00 00 sd 2:0:0:0: [sdb] Assuming drive cache: write through sd 2:0:0:0: [sdb] 7903232 512-byte hardware sectors (4046 MB) sd 2:0:0:0: [sdb] Write Protect is off sd 2:0:0:0: [sdb] Mode Sense: 03 00 00 00 sd 2:0:0:0: [sdb] Assuming drive cache: write through sdb: sdb1 sd 2:0:0:0: [sdb] Attached SCSI removable disk sd 2:0:0:0: Attached scsi generic sg1 type 0 input: Power Button (FF) as /class/input/input3 ACPI: Power Button (FF) [PWRF] input: Lid Switch as /class/input/input4 ACPI: Lid Switch [LID] input: Sleep Button (CM) as /class/input/input5 ACPI: Sleep Button (CM) [SLPB] input: Power Button (CM) as /class/input/input6 ACPI: Power Button (CM) [PWRB] ACPI: AC Adapter [AC0] (off-line) input: Video Bus as /class/input/input7 ACPI: Video Device [VGA] (multi-head: yes rom: no post: no) intel_rng: FWH not detected ACPI: PCI Interrupt 0000:00:1f.3[B] -> GSI 19 (level, low) -> IRQ 19 input: PC Speaker as /class/input/input8 iTCO_vendor_support: vendor-support=0 iTCO_wdt: Intel TCO WatchDog Timer Driver v1.02 (26-Jul-2007) iTCO_wdt: Found a ICH6-M TCO device (Version=2, TCOBASE=0x0860) iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) rtc_cmos 00:03: rtc core: registered rtc_cmos as rtc0 rtc0: alarms up to one month ACPI: Battery Slot [BAT0] (battery present) device-mapper: multipath: version 1.0.5 loaded Clocksource tsc unstable (delta = -67429974 ns) loop: module loaded EXT3 FS on dm-0, internal journal kjournald starting. Commit interval 5 seconds EXT3 FS on sda1, internal journal EXT3-fs: mounted filesystem with ordered data mode. IA-32 Microcode Update Driver: v1.14a NET: Registered protocol family 10 lo: Disabled Privacy Extensions ip6_tables: (C) 2000-2006 Netfilter Core Team nf_conntrack version 0.5.0 (8192 buckets, 32768 max) ip_tables: (C) 2000-2006 Netfilter Core Team ACPI: PCI Interrupt 0000:00:02.0[A] -> GSI 16 (level, low) -> IRQ 16 [drm] Initialized drm 1.1.0 20060810 [drm] Initialized i915 1.11.0 20071122 on minor 0 EXT2-fs warning: mounting unchecked fs, running e2fsck is recommended WARNING: at /tmp/oops.c:5 modinit() (Not tainted) Pid: 8190, comm: insmod Not tainted 2.6.24-0.77.rc4.git4.fc9 #1 [] show_trace_log_lvl+0x1a/0x2f [] show_trace+0x12/0x14 [] dump_stack+0x6c/0x72 [] modinit+0x38/0x3f [oops] [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ======================= ------------[ cut here ]------------ kernel BUG at /tmp/oops.c:5! invalid opcode: 0000 [#1] SMP Modules linked in: oops cpufreq_stats ext2 i915 drm nf_conntrack_ipv4 ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state nf_conntrack xt_tcpudp ip6t_ipv6header ip6t_REJECT ip6table_filter ip6_tables x_tables ipv6 loop dm_multipath rtc_cmos iTCO_wdt iTCO_vendor_support pcspkr i2c_i801 i2c_core battery video ac output power_supply button sg joydev usb_storage dm_snapshot dm_zero dm_mirror dm_mod ahci pata_acpi ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd Pid: 8369, comm: insmod Not tainted (2.6.24-0.77.rc4.git4.fc9 #1) EIP: 0060:[] EFLAGS: 00210286 CPU: 0 EIP is at modinit+0x3/0x7 [oops] EAX: e024e000 EBX: d434d9c8 ECX: e024e300 EDX: 00000001 ESI: e024e300 EDI: e024e300 EBP: d4347eb0 ESP: d4347eb0 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process insmod (pid: 8369, ti=d4347000 task=d4222e10 task.ti=d4347000) Stack: d4347fb0 c0455445 00000000 00000000 d4347ee0 c0423edd 0000001c d434d9a8 00795000 c16df1e8 d41a6af0 0000be7f 00000000 e024e300 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call Trace: [] show_trace_log_lvl+0x1a/0x2f [] show_stack_log_lvl+0x9b/0xa3 [] show_registers+0xa7/0x178 [] die+0x121/0x20c [] do_trap+0x8a/0xa3 [] do_invalid_op+0x88/0x92 [] error_code+0x72/0x78 [] sys_init_module+0x1430/0x155c [] syscall_call+0x7/0xb ======================= Code: <0f> 0b eb fe 55 89 e5 5d c3 04 00 00 00 14 00 00 00 03 00 00 00 47 EIP: [] modinit+0x3/0x7 [oops] SS:ESP 0068:d4347eb0 kerneloops-0.12+git20090217/icon.png0000644000175000017500000000563111174075563015757 0ustar willywillyPNG  IHDR00WsRGBbKGD pHYs  tIME  8 nQtEXtCommentCreated with GIMPW IDAThYkp~~ &4 ``䢢&/bQGGiZvdvpZz-Sѩ)mĂx!p ͐M6^GN0V339s7M|XQ}̙|>>z s̟|IeifZُl877+nw9۶m#pgΜK.eoW1E`W ~ٳxUc@FF3u%IJ9իQ ˵XUUVUuUUp6>ugE'lrI2̙Yu-BII Bz{{aY@Qw1v7uuuϳ$ILD\^^·zްa˲܁5ctݱkƍ\ZZGqdil7X9( 7w"xjeZM@sC j@v pL3 N\ X\rwc$Qw Al2dF8҂dtԩ`ҤI;w. #QY6&Ȳwiw8#Dl ҂bL@͛_/]ݻ8qo"𢻥 eBΔ/@x|B|F۹*+wsSSB+N./w|-M~f/_B,>{Ẻ:,[o 1|_9k]6n4M$@!q)gffF@7閯 U陙YNf4MFlY !˲8rWW/]tj_po%" I@'nڝ44M@EE`OpnGaa!4MLp(#\TO K$x<Σݻj(]Qdgg#++kf ZQѐBH)̯B(aLDss3^Y!`&~? ÀL'X*bJť%or{.BCñOԴg[p ]G{{;Bz-0)ܔl*]+SO${l2/ W) xE{ }l-)RKh]rܵɏy %^-@ .cRW6bXa`0O}Z'~rKvTnDb9Y2"{ 3ҭ4.G3e<WKrу#@IΒ A=i[38 !p e. vE>%S.(lI`3, ch-@\_K$3Q*P1a8F߬'A1ʖoT0kRe^n]Ju}Ba. 7WB~!Od%^;W^̎џt +bj1 `Ԟ > *ap:ZxI< Ȳ[Ezq>&$uT|K- m`c#>pyJD3ן[aػw/,Y dIDsi#̝ }ͥ3h$$d*o`FՅr,XH7ZHO;*3?̡ۨvB@H,A St rrrDֆرAZq?% Si Oo3ٹq ,Woi&F$}xkhAE<.{7x_gԁNEF‚,3,fD#>wݺ" h F oc3n͂LW̯L xhj!^~4MSm&Ou G<ۥ9)fS0530.p9H- 8d_Qy#/S</.,-EhTĮg7ٲA˲kQRwKќ@= WP ɳݿfCJۯ(;/u(̈́R?۾̋xU3q,IENDB`kerneloops-0.12+git20090217/COPYING0000644000175000017500000004311011174075563015346 0ustar willywilly GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. kerneloops-0.12+git20090217/push.sh0000755000175000017500000000030011174075563015623 0ustar willywilly#!/bin/sh git gc git-push -f ssh://git.infradead.org/srv/git/kerneloops.git master:refs/heads/master git-push --tags -f ssh://git.infradead.org/srv/git/kerneloops.git master:refs/heads/master kerneloops-0.12+git20090217/po/0000755000175000017500000000000011174075563014732 5ustar willywillykerneloops-0.12+git20090217/po/cs.po0000644000175000017500000000447711174075563015713 0ustar willywilly# Czech Translation # Copyright (C) 2009, Arjan van de Ven # This file is distributed under the same license as the kerneloops package. # Michal Nowak , 2009. # msgid "" msgstr "" "Project-Id-Version: 0.12\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2008-01-01 06:36-0800\n" "PO-Revision-Date: 2009-01-05 18:46+0100\n" "Last-Translator: Michal Nowak \n" "Language-Team: LANGUAGE \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #: kerneloops-applet.c:170 kerneloops-applet.c:212 msgid "Always" msgstr "Vždy" #: kerneloops-applet.c:332 #, c-format msgid "Connecting to system bus failed: %s\n" msgstr "Připojování k D-BUS selhalo: %s\n" #: kerneloops-applet.c:190 msgid "" "Diagnostic information from your Linux kernel has been sent to www.kerneloops.org for the Linux kernel " "developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n" msgstr "" "Diagnostické informace z Linuxového jádra byly odeslány na " "www.kerneloops.org, vývojáři" "je dále využijí při své práci.\n" "Děkujeme za přispění k vyšší kvalitě Linuxového jádra.\n" #: kerneloops-applet.c:188 msgid "Kernel bug diagnostic information sent" msgstr "Diagnostické informace o selhání jádra byly odeslány" #: kerneloops-applet.c:176 msgid "Never" msgstr "Nikdy" #: kerneloops-applet.c:214 msgid "Never again" msgstr "Už nikdy" #: kerneloops-applet.c:174 msgid "No" msgstr "Ne" #: kerneloops-applet.c:143 msgid "" "There is diagnostic information available for this failure. Do you want to " "submit this information to the www." "kerneloops.org website for use by the Linux kernel developers?\n" msgstr "" "Diagnostické informace pro toto selhání jsou dostupné. Chcete je odeslat " "na stránku www.kerneloops.org, " "aby byly dále využity jadernými vývojáři?\n" #: kerneloops-applet.c:172 msgid "Yes" msgstr "Ano" #: kerneloops-applet.c:141 msgid "Your system had a kernel failure" msgstr "V tomto systému se vyskytla chyba v jádře" #: kerneloops-applet.c:343 msgid "kerneloops client" msgstr "Klient kerneloops" kerneloops-0.12+git20090217/po/nl.po0000644000175000017500000000453211174075563015707 0ustar willywilly# SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # FIRST AUTHOR , YEAR. # msgid "" msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2008-01-01 06:33-0800\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #: kerneloops-applet.c:170 kerneloops-applet.c:212 msgid "Always" msgstr "Altijd" #: kerneloops-applet.c:332 #, c-format msgid "Connecting to system bus failed: %s\n" msgstr "Er was een probleem met D-BUS: %s\n" #: kerneloops-applet.c:190 msgid "" "Diagnostic information from your Linux kernel has been sent to www.kerneloops.org for the Linux kernel " "developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n" msgstr "Bug informatie van uw Linux kernel is verstuurd naar " "www.kerneloops.org zodat " "de Linux kernel developers dit kunnen gebruiken. \n" "Hartelijk bedankt voor uw bijdrage aan de kwaliteit van de Linux kernel.\n" #: kerneloops-applet.c:188 msgid "Kernel bug diagnostic information sent" msgstr "Kernel bug informatie verzonden" #: kerneloops-applet.c:176 msgid "Never" msgstr "Nooit" #: kerneloops-applet.c:214 msgid "Never again" msgstr "Niet meer" #: kerneloops-applet.c:174 msgid "No" msgstr "Nee" #: kerneloops-applet.c:143 msgid "" "There is diagnostic information available for this failure. Do you want to " "submit this information to the www." "kerneloops.org website for use by the Linux kernel developers?\n" msgstr "" "Er is diagnose-informatie beschikbaar voor het probleem. Wilt U deze " "informatie uploaden naar de www." "kerneloops.org webite zodat de Linux kernel ontwikkelaars hier gebruik " "van kunnen maken?\n" #: kerneloops-applet.c:172 msgid "Yes" msgstr "Ja" #: kerneloops-applet.c:141 msgid "Your system had a kernel failure" msgstr "Uw systeem heeft een kernel probleem gehad" #: kerneloops-applet.c:343 msgid "kerneloops client" msgstr "kerneloops applicatie" kerneloops-0.12+git20090217/po/fr.po0000644000175000017500000000462111174075563015704 0ustar willywilly# SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # EMMANUEL ANDRY , 2008. # msgid "" msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2008-01-01 06:33-0800\n" "PO-Revision-Date: 2008-11-21 23:13+0100\n" "Last-Translator: Emmanuel Andry \n" "Language-Team: LANGUAGE \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #: kerneloops-applet.c:170 #: kerneloops-applet.c:212 msgid "Always" msgstr "Toujours" #: kerneloops-applet.c:332 #, c-format msgid "Connecting to system bus failed: %s\n" msgstr "Échec de la connexion à D-BUS : %s\n" #: kerneloops-applet.c:190 msgid "" "Diagnostic information from your Linux kernel has been sent to www.kerneloops.org for the Linux kernel developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n" msgstr "" "Les informations de diagnostic de votre noyau Linux ont été envoyées à www.kerneloops.org afin que les développeurs du noyau Linux travaillent dessus. \n" "Merci d'avoir contribué à l'amélioration de la qualité du noyau Linux.\n" #: kerneloops-applet.c:188 msgid "Kernel bug diagnostic information sent" msgstr "Informations de diagnostic du bogue du noyau envoyées" #: kerneloops-applet.c:176 msgid "Never" msgstr "Jamais" #: kerneloops-applet.c:214 msgid "Never again" msgstr "Plus jamais" #: kerneloops-applet.c:174 msgid "No" msgstr "Non" #: kerneloops-applet.c:143 msgid "There is diagnostic information available for this failure. Do you want to submit this information to the www.kerneloops.org website for use by the Linux kernel developers?\n" msgstr "Il y a des informations de diagnostic disponibles pour ce problème. Voulez-vous soumettre ces informations au site web www.kerneloops.org pour l'usage des développeurs du noyau Linux ?\n" #: kerneloops-applet.c:172 msgid "Yes" msgstr "Oui" #: kerneloops-applet.c:141 msgid "Your system had a kernel failure" msgstr "Votre système a subi un problème de noyau" #: kerneloops-applet.c:343 msgid "kerneloops client" msgstr "Client kerneloops" kerneloops-0.12+git20090217/po/kerneloops.pot0000644000175000017500000000332711174075563017644 0ustar willywilly# SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # FIRST AUTHOR , YEAR. # #, fuzzy msgid "" msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2008-01-01 06:36-0800\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=CHARSET\n" "Content-Transfer-Encoding: 8bit\n" #: kerneloops-applet.c:170 kerneloops-applet.c:212 msgid "Always" msgstr "" #: kerneloops-applet.c:332 #, c-format msgid "Connecting to system bus failed: %s\n" msgstr "" #: kerneloops-applet.c:190 msgid "" "Diagnostic information from your Linux kernel has been sent to www.kerneloops.org for the Linux kernel " "developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n" msgstr "" #: kerneloops-applet.c:188 msgid "Kernel bug diagnostic information sent" msgstr "" #: kerneloops-applet.c:176 msgid "Never" msgstr "" #: kerneloops-applet.c:214 msgid "Never again" msgstr "" #: kerneloops-applet.c:174 msgid "No" msgstr "" #: kerneloops-applet.c:143 msgid "" "There is diagnostic information available for this failure. Do you want to " "submit this information to the www." "kerneloops.org website for use by the Linux kernel developers?\n" msgstr "" #: kerneloops-applet.c:172 msgid "Yes" msgstr "" #: kerneloops-applet.c:141 msgid "Your system had a kernel failure" msgstr "" #: kerneloops-applet.c:343 msgid "kerneloops client" msgstr "" kerneloops-0.12+git20090217/po/Makefile0000644000175000017500000000151311174075563016372 0ustar willywilly# # Request to translators: Please don't send me patches agaist .po files; # experience has shown that this gets too mangled by email clients due # to UTF-8 and such. What works best is just attaching the full .po file # to an email. # SRC=$(wildcard *.po) OBJ= $(SRC:.po=.mo) INST= $(SRC:.po=.inst) translations: $(OBJ) %.mo: %.po -@msgfmt -o $@ $< clean: rm -f *.mo *~ # hack to automate installation dynamicaly, without previous knowledge of # the po/mo file list (we fool make by pretending the need for .inst files). install: $(OBJ) $(INST) %.inst: %.mo mkdir -p $(DESTDIR)$(LOCALESDIR)/$*/LC_MESSAGES/ -cp -f $< $(DESTDIR)$(LOCALESDIR)/$*/LC_MESSAGES/kerneloops.mo uptrans: $(LG).po $(LG).po: kerneloops.pot ifdef LG msgmerge -U $@ $< else @echo "Usage : make uptrans LG=xx # with xx = de, es, fi ..." @exit 1 endif kerneloops-0.12+git20090217/kerneloops-applet.c0000644000175000017500000003301011174075563020121 0ustar willywilly/* * * Kerneloops UI applet. * * Copyright (C) 2007 Intel Corporation * * Authors: * Arjan van de Ven * * * Based on the very useful example from bluez-gnome; many thanks: * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2005-2007 Marcel Holtmann * Copyright (C) 2006-2007 Bastien Nocera * * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static DBusConnection *bus; static GtkStatusIcon *statusicon; static NotifyNotification *notify; #define __unused __attribute__ ((__unused__)) /* 0 = ask positive = always negative = never */ int user_preference; static char *detail_file_name; static void write_config(char *permission) { FILE *file; char filename[2*PATH_MAX]; sprintf(filename, "%s/.kerneloops", getenv("HOME")); file = fopen(filename, "w"); if (!file) { printf("error is %s \n", strerror(errno)); return; } fprintf(file, "allow-submit = %s\n", permission); fclose(file); } /* * send a dbus message to signal the users answer to the permission * question. */ static void send_permission(char *answer) { DBusMessage *message; message = dbus_message_new_signal("/org/kerneloops/submit/permission", "org.kerneloops.submit.permission", answer); dbus_connection_send(bus, message, NULL); dbus_message_unref(message); detail_file_name = NULL; } /* * remove an existing notification */ static void close_notification(void) { if (notify) { g_signal_handlers_destroy(notify); notify_notification_close(notify, NULL); notify = NULL; } } /* * the notify_action_* functions get called when the user clicks on * the respective buttons we put in the notification window. * user_data contains the string we pass, so "yes" "no" "always" or "never". */ static void notify_action(NotifyNotification __unused *notify, gchar __unused *action, gpointer user_data) { char *answer = (char *) user_data; send_permission(answer); detail_file_name = NULL; if (strcmp(answer, "always") == 0) write_config("always"); if (strcmp(answer, "never") == 0) write_config("never"); gtk_status_icon_set_visible(statusicon, FALSE); } /* Called only from the detail window */ static void send_action(GtkWidget __unused *button, GtkWidget *dialog) { send_permission("yes"); gtk_widget_destroy(dialog); } /* Called only to display details */ static void detail_action(NotifyNotification __unused *notify, gchar __unused *action, gpointer __unused user_data) { GtkWidget *dialog; GtkWidget *scrollwindow; GtkWidget *view; GtkTextBuffer *buffer; GtkWidget *button_cancel; GtkWidget *button_send; GtkTextTag *fixed; GtkTextIter iter; char *detail_data; struct stat statb; int detail_fd; int ret; /* If anything goes wrong, return as early as possible... */ if (!detail_file_name) return; memset(&statb, 0, sizeof(statb)); ret = stat(detail_file_name, &statb); if (statb.st_size < 1 || ret != 0) return; detail_fd = open(detail_file_name, O_RDONLY); if (detail_fd < 0) return; detail_data = malloc(statb.st_size+1); if (!detail_data) return; if (read(detail_fd, detail_data, statb.st_size) != statb.st_size) { free(detail_data); return; } close(detail_fd); detail_data[statb.st_size] = '\0'; dialog = gtk_dialog_new(); gtk_window_set_title(GTK_WINDOW(dialog), _("Kernel failure details")); gtk_widget_set_size_request(dialog, 600, 400); scrollwindow = gtk_scrolled_window_new(NULL, NULL); gtk_scrolled_window_set_policy(GTK_SCROLLED_WINDOW (scrollwindow), GTK_POLICY_AUTOMATIC, GTK_POLICY_AUTOMATIC); gtk_box_pack_start(GTK_BOX(GTK_DIALOG(dialog)->vbox), scrollwindow, TRUE, TRUE, 0); view = gtk_text_view_new(); buffer = gtk_text_view_get_buffer(GTK_TEXT_VIEW (view)); fixed = gtk_text_buffer_create_tag (buffer, "font", "font", "monospace", NULL); gtk_text_buffer_get_iter_at_line_offset(buffer, &iter, 0, 0); gtk_text_buffer_insert_with_tags(buffer, &iter, detail_data, -1, fixed, NULL); free(detail_data); gtk_container_add (GTK_CONTAINER (scrollwindow), view); gtk_text_view_set_editable(GTK_TEXT_VIEW(view), FALSE); button_send = gtk_button_new_with_label (_("Send")); GTK_WIDGET_SET_FLAGS(button_send, GTK_CAN_DEFAULT); button_cancel = gtk_button_new_with_label (_("Cancel")); g_signal_connect(G_OBJECT(dialog), "delete_event", G_CALLBACK(gtk_widget_destroy), dialog); g_signal_connect_swapped(G_OBJECT(button_cancel), "clicked", G_CALLBACK(gtk_widget_destroy), G_OBJECT(dialog)); g_signal_connect(G_OBJECT(button_send), "clicked", G_CALLBACK(send_action), dialog); gtk_box_pack_start(GTK_BOX(GTK_DIALOG(dialog)->action_area), button_send, TRUE, TRUE, 0); gtk_box_pack_start(GTK_BOX(GTK_DIALOG(dialog)->action_area), button_cancel, TRUE, TRUE, 0); gtk_widget_grab_default(button_send); gtk_widget_show(view); gtk_widget_show(button_send); gtk_widget_show(button_cancel); gtk_widget_show(scrollwindow); gtk_widget_show(dialog); } static void got_a_message(void) { char *summary = _("Your system had a kernel failure"); char *message = _("There is diagnostic information available for this failure." " Do you want to submit this information to the www.kerneloops.org" " website for use by the Linux kernel developers?\n"); NotifyActionCallback callback = notify_action; /* if there's a notification active already, close it first */ close_notification(); notify = notify_notification_new(summary, message, "/usr/share/kerneloops/icon.png", NULL); notify_notification_set_timeout(notify, 0); notify_notification_set_urgency(notify, NOTIFY_URGENCY_CRITICAL); /* * add the buttons and default action */ notify_notification_add_action(notify, "default", "action", callback, "default", NULL); notify_notification_add_action(notify, "always", _("Always"), callback, "always", NULL); notify_notification_add_action(notify, "yes", _("Yes"), callback, "yes", NULL); notify_notification_add_action(notify, "no", _("No"), callback, "no", NULL); notify_notification_add_action(notify, "never", _("Never"), callback, "never", NULL); if (detail_file_name) { notify_notification_add_action(notify, "details", _("Show Details"), detail_action, "details", NULL); } notify_notification_show(notify, NULL); } char url_to_oops[4095]; /* * open a notification window (expires in 5 seconds) to say thank you * to the user for his bug feedback. */ static void sent_an_oops(void) { char *summary = _("Kernel bug diagnostic information sent"); char *message = NULL; char *message_1 = _("Diagnostic information from your Linux kernel has been " "sent to www.kerneloops.org " "for the Linux kernel developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n"); char *message_2 = _("Diagnostic information from your Linux kernel has been " "sent to www.kerneloops.org " "for the Linux kernel developers to work on. \n" "Thank you for contributing to improve the quality of the Linux kernel.\n" "You can view your submitted oops here\n"); NotifyActionCallback callback = notify_action; close_notification(); if (strlen(url_to_oops)==0) message = g_strdup_printf("%s", message_1); else message = g_strdup_printf(message_2, url_to_oops); url_to_oops[0] = 0; notify = notify_notification_new(summary, message, "/usr/share/kerneloops/icon.png", NULL); notify_notification_set_timeout(notify, 5000); notify_notification_set_urgency(notify, NOTIFY_URGENCY_LOW); notify_notification_add_action(notify, "default", "action", callback, "default", NULL); if (user_preference <= 0) notify_notification_add_action(notify, "always", _("Always"), callback, "always", NULL); notify_notification_add_action(notify, "never", _("Never again"), callback, "never", NULL); notify_notification_show(notify, NULL); g_free(message); } /* * store the URL for the user */ static void got_an_url(DBusMessage *message) { char *string = NULL; dbus_message_get_args(message, NULL, DBUS_TYPE_STRING, &string, DBUS_TYPE_INVALID); if (string) strncpy(url_to_oops, string, 4095); } /* * When we start up, the daemon may already have collected some oopses * so we send it a ping message to let it know someone is listening * now. */ static void trigger_daemon(void) { DBusMessage *message; message = dbus_message_new_signal("/org/kerneloops/submit/ping", "org.kerneloops.submit.ping", "ping"); dbus_connection_send(bus, message, NULL); dbus_message_unref(message); } /* * This function gets called if a dbus message arrives that we have * subscribed to. */ static DBusHandlerResult dbus_gotmessage(DBusConnection __unused *connection, DBusMessage *message, void __unused *user_data) { /* handle disconnect events first */ if (dbus_message_is_signal(message, DBUS_ERROR_DISCONNECTED, "Disconnected")) { /* FIXME: need to exit the gtk main loop here */ return DBUS_HANDLER_RESULT_HANDLED; } /* check if it's the daemon that asks for permission */ if (dbus_message_is_signal(message, "org.kerneloops.submit.permission", "ask")) { if (user_preference > 0) { /* the user / config file says "always" */ send_permission("always"); } else if (user_preference < 0) { /* the user / config file says "never" */ send_permission("never"); } else { /* ok time to ask the user */ gtk_status_icon_set_visible(statusicon, TRUE); dbus_message_get_args(message, NULL, DBUS_TYPE_STRING, &detail_file_name, DBUS_TYPE_INVALID); got_a_message(); gtk_status_icon_set_visible(statusicon, FALSE); } return DBUS_HANDLER_RESULT_HANDLED; } /* check if it's the daemon that asks for permission */ if (dbus_message_is_signal(message, "org.kerneloops.submit.sent", "sent")) { gtk_status_icon_set_visible(statusicon, TRUE); sent_an_oops(); gtk_status_icon_set_visible(statusicon, FALSE); return DBUS_HANDLER_RESULT_HANDLED; } /* check if it's the daemon that asks for permission */ if (dbus_message_is_signal(message, "org.kerneloops.submit.url", "url")) { got_an_url(message); return DBUS_HANDLER_RESULT_HANDLED; } return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; } /* * read the ~/.kerneloops config file to see if the user pressed * "always" or "never" before, and then honor that. */ static void read_config(void) { char filename[2*PATH_MAX]; size_t dummy; FILE *file; char *line = NULL; sprintf(filename, "%s/.kerneloops", getenv("HOME")); file = fopen(filename, "r"); if (!file) return; if (getline(&line, &dummy, file) <= 0) { free(line); fclose(file); return; } if (strstr(line, "always")) user_preference = 1; if (strstr(line, "never")) user_preference = -1; if (strstr(line, "ask")) user_preference = 0; free(line); fclose(file); } int main(int argc, char *argv[]) { DBusError error; /* Initialize translation stuff */ setlocale(LC_ALL, ""); bindtextdomain("kerneloops", "/usr/share/locale"); textdomain("kerneloops"); gtk_init(&argc, &argv); /* read the config file early; we may be able to bug out of stuff */ read_config(); /* * initialize the dbus connection; we want to listen to the system * bus (which is where all daemons send their messages */ dbus_error_init(&error); bus = dbus_bus_get(DBUS_BUS_SYSTEM, &error); if (bus == NULL) { g_printerr(_("Connecting to system bus failed: %s\n"), error.message); dbus_error_free(&error); exit(EXIT_FAILURE); } /* hook dbus into the main loop */ dbus_connection_setup_with_g_main(bus, NULL); statusicon = gtk_status_icon_new_from_file("/usr/share/kerneloops/icon.png"); gtk_status_icon_set_tooltip(statusicon, _("kerneloops client")); notify_init("kerneloops-ui"); /* by default, don't show our icon */ gtk_status_icon_set_visible(statusicon, FALSE); /* set the dbus message to listen for */ dbus_bus_add_match(bus, "type='signal',interface='org.kerneloops.submit.permission'", &error); dbus_bus_add_match(bus, "type='signal',interface='org.kerneloops.submit.sent'", &error); dbus_bus_add_match(bus, "type='signal',interface='org.kerneloops.submit.url'", &error); dbus_connection_add_filter(bus, dbus_gotmessage, NULL, NULL); /* * if the user said always/never in the config file, let the daemon * know right away */ if (user_preference < 0) send_permission("never"); if (user_preference > 0) send_permission("always"); /* send a ping to the userspace daemon to see if it has pending oopses */ trigger_daemon(); gtk_main(); close_notification(); return 0; } kerneloops-0.12+git20090217/kerneloops.80000644000175000017500000000310311174075563016563 0ustar willywilly.\" Hey, EMACS: -*- nroff -*- .\" First parameter, NAME, should be all caps .\" Second parameter, SECTION, should be 1-8, maybe w/ subsection .\" other parameters are allowed: see man(7), man(1) .TH KERNELOOPS 8 "Dec 5, 2007" .\" Please adjust this date whenever revising the manpage. .\" .\" Some roff macros, for reference: .\" .nh disable hyphenation .\" .hy enable hyphenation .\" .ad l left justify .\" .ad b justify to both left and right margins .\" .nf disable filling .\" .fi enable filling .\" .br insert line break .\" .sp insert n+1 empty lines .\" for manpage-specific macros, see man(7) .SH NAME kerneloops \- program to collect and submit kernel oopses to kerneloops.org .SH SYNOPSIS .B kerneloops .SH DESCRIPTION This manual page documents briefly the .B kerneloops commands. .PP .\" TeX users may be more comfortable with the \fB\fP and .\" \fI\fP escape sequences to invode bold face and italics, .\" respectively. \fBkerneloops\fP is a program that collects kernel crash information and then submits the extracted signature to the kerneloops.org website for statistical analysis and presentation to the Linux kernel developers. .br .SH OPTIONS .LP .TP \fB\-\-file filename\fR Parse the file denoted with filename as if it were /var/log/messages .TP \fB\-\-debug\fR Enable debug mode .TP \fB\-\-nodaemon\fR Do not daemonize .SH FILES /etc/kerneloops.conf .SH AUTHOR kerneloops was written by Arjan van de Ven . .PP kerneloops-0.12+git20090217/kerneloops.conf0000644000175000017500000000223411174075563017345 0ustar willywilly# # Configuration file for the kerneloops.org kernel crash collector # # # Set the following variable to "yes" if you want to automatically # submit your oopses to the database for use by your distribution or the # Linux kernel developers # # # PRIVACY NOTE # Enabling this option will cause your system to submit certain kernel # output to the kerneloops.org website, where it will be available via # this website to developers and everyone else. # The submitted info are so-called "oopses", kernel crash signature. # However, due to the nature of oopses, it may happen that a few # surrounding lines of the oops in the "dmesg" are being sent together # with the oops. # # Default is "ask" which uses a UI application t ask the user for permission # allow-submit = ask # # Set the following variable to "yes" if you want to allow your # Linux distribution vendor to pass the oops on to the central kerneloops.org # database as used by the Linux kernel developers # allow-pass-on = yes # # URL for submitting the oopses # submit-url = http://submit.kerneloops.org/submitoops.php # # Path to syslog file containing full kernel logging output # log-file = /var/log/messages kerneloops-0.12+git20090217/kerneloops.h0000644000175000017500000000307411174075563016652 0ustar willywilly/* * Copyright 2007, Intel Corporation * * This file is part of kerneloops.org * * This program file is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * You should have received a copy of the GNU General Public License * along with this program in a file named COPYING; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301 USA * * Authors: * Arjan van de Ven */ #ifndef __INCLUDE_GUARD_KERNELOOPS_H_ #define __INCLUDE_GUARD_KERNELOOPS_H_ /* borrowed from the kernel */ #define barrier() __asm__ __volatile__("": : :"memory") #define __unused __attribute__ ((__unused__)) extern void queue_oops(char *oops); extern void submit_queue(void); extern void clear_queue(void); extern int scan_dmesg(void * unused); extern void scan_filename(char *filename, int issyslog); extern void read_config_file(char *filename); extern void ask_permission(void); extern void dbus_ask_permission(char * detail_file_name); extern void dbus_say_thanks(char *url); extern int opted_in; extern int allow_distro_to_pass_on; extern char *submit_url; extern char *log_file; extern int testmode; extern int pinged; #endif kerneloops-0.12+git20090217/submit.c0000644000175000017500000001462011174075563015766 0ustar willywilly/* * Copyright 2007, Intel Corporation * * This file is part of kerneloops.org * * This program file is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * You should have received a copy of the GNU General Public License * along with this program in a file named COPYING; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301 USA * * Authors: * Arjan van de Ven */ #define _BSD_SOURCE #include #include #include #include #include #include #include #include #include "kerneloops.h" /* * we keep track of 16 checksums of the last submitted oopses; this allows us to * make sure we don't submit the same oops twice (this allows us to not have to do * really expensive things during non-destructive dmesg-scanning) * * This also limits the number of oopses we'll submit per session; * it's important that this is bounded to avoid feedback loops * for the scenario where submitting an oopses causes a warning/oops */ #define MAX_CHECKSUMS 16 static unsigned int checksums[MAX_CHECKSUMS]; static int submitted; struct oops; struct oops { struct oops *next; char *text; unsigned int checksum; }; /* we queue up oopses, and then submit in a batch. * This is useful to be able to cancel all submissions, in case * we later find our marker indicating we submitted everything so far already * previously. */ static struct oops *queued_oopses; static int newoops; /* For communicating details to the applet, we write the * details in a file, and provide the filename to the applet */ static char *detail_filename; static unsigned int checksum(char *ptr) { unsigned int temp = 0; unsigned char *c; c = (unsigned char *) ptr; while (c && *c) { temp = (temp) + *c; c++; } return temp; } void queue_oops(char *oops) { int i; unsigned int sum; struct oops *new; if (submitted >= MAX_CHECKSUMS-1) return; /* first, check if we haven't already submitted the oops */ sum = checksum(oops); for (i = 0; i < submitted; i++) { if (checksums[i] == sum) { printf("Match with oops %i (%x)\n", i, sum); return; } } checksums[submitted++] = sum; new = malloc(sizeof(struct oops)); memset(new, 0, sizeof(struct oops)); new->next = queued_oopses; new->checksum = sum; new->text = strdup(oops); queued_oopses = new; newoops = 1; } void write_detail_file(void) { int temp_fileno; FILE *tmpf; struct oops *oops; int count = 0; detail_filename = strdup("/tmp/kerneloops.XXXXXX"); temp_fileno = mkstemp(detail_filename); if (temp_fileno < 0) { free(detail_filename); detail_filename = NULL; return; } /* regular user must be able to read this detail file to be * useful; there is nothing worth doing if fchmod fails. */ fchmod(temp_fileno, 0644); tmpf = fdopen(temp_fileno, "w"); oops = queued_oopses; while (oops) { count++; /* Users are not programmers, start at 1 */ fprintf(tmpf, "Kernel failure message %d:\n", count); fprintf(tmpf, "%s", oops->text); fprintf(tmpf, "\n\n"); oops = oops->next; } fclose(tmpf); close(temp_fileno); } void unlink_detail_file(void) { if (detail_filename) { unlink(detail_filename); free(detail_filename); } } static void print_queue(void) { struct oops *oops; struct oops *queue; int count = 0; queue = queued_oopses; queued_oopses = NULL; barrier(); oops = queue; while (oops) { struct oops *next; printf("Submit text is:\n---[start of oops]---\n%s\n---[end of oops]---\n", oops->text); next = oops->next; free(oops->text); free(oops); oops = next; count++; } } static void write_logfile(int count) { openlog("kerneloops", 0, LOG_KERN); syslog(LOG_WARNING, "Submitted %i kernel oopses to www.kerneloops.org", count); closelog(); } char result_url[4096]; size_t writefunction( void *ptr, size_t size, size_t nmemb, void __attribute((unused)) *stream) { char *c, *c1, *c2; c = malloc(size*nmemb + 1); memset(c, 0, size*nmemb + 1); memcpy(c, ptr, size*nmemb); printf("received %s \n", c); c1 = strstr(c, "201 "); if (c1) { c1+=4; c2 = strchr(c1, '\n'); if (c2) *c2 = 0; strncpy(result_url, c1, 4095); } return size * nmemb; } void submit_queue(void) { int result; struct oops *oops; struct oops *queue; int count = 0; memset(result_url, 0, 4096); if (testmode) { print_queue(); return; } queue = queued_oopses; queued_oopses = NULL; barrier(); oops = queue; while (oops) { CURL *handle; struct curl_httppost *post = NULL; struct curl_httppost *last = NULL; struct oops *next; handle = curl_easy_init(); printf("DEBUG SUBMIT URL is %s \n", submit_url); curl_easy_setopt(handle, CURLOPT_URL, submit_url); /* set up the POST data */ curl_formadd(&post, &last, CURLFORM_COPYNAME, "oopsdata", CURLFORM_COPYCONTENTS, oops->text, CURLFORM_END); if (allow_distro_to_pass_on) { curl_formadd(&post, &last, CURLFORM_COPYNAME, "pass_on_allowed", CURLFORM_COPYCONTENTS, "yes", CURLFORM_END); } curl_easy_setopt(handle, CURLOPT_HTTPPOST, post); curl_easy_setopt(handle, CURLOPT_WRITEFUNCTION, writefunction); result = curl_easy_perform(handle); curl_formfree(post); curl_easy_cleanup(handle); next = oops->next; free(oops->text); free(oops); oops = next; count++; } if (count && !testmode) write_logfile(count); if (count) dbus_say_thanks(result_url); /* * If we've reached the maximum count, we'll exit the program, * the program won't do any useful work anymore going forward. */ if (submitted >= MAX_CHECKSUMS-1) { unlink_detail_file(); exit(EXIT_SUCCESS); } } void clear_queue(void) { struct oops *oops, *next; struct oops *queue; queue = queued_oopses; queued_oopses = NULL; barrier(); oops = queue; while (oops) { next = oops->next; free(oops->text); free(oops); oops = next; } write_logfile(0); } void ask_permission(void) { if (!newoops && !pinged) return; pinged = 0; newoops = 0; if (queued_oopses) { write_detail_file(); dbus_ask_permission(detail_filename); } } kerneloops-0.12+git20090217/Makefile0000644000175000017500000000610511174075563015756 0ustar willywilly # # to build this package, you need to have the following components installed: # dbus-glib-devel libnotify-devel gtk2-devel curl-devel # BINDIR=/usr/bin SBINDIR=/usr/sbin LOCALESDIR=/usr/share/locale MANDIR=/usr/share/man/man8 CC?=gcc CFLAGS := -O2 -g -fstack-protector -D_FORTIFY_SOURCE=2 -Wall -W -Wstrict-prototypes -Wundef -fno-common -Werror-implicit-function-declaration -Wdeclaration-after-statement -Wformat -Wformat-security -Werror=format-security MY_CFLAGS := `pkg-config --cflags libnotify gtk+-2.0` # # pkg-config tends to make programs pull in a ton of libraries, not all # are needed. -Wl,--as-needed tells the linker to just drop unused ones, # and that makes the applet load faster and use less memory. # LDF_A := -Wl,--as-needed `pkg-config --libs libnotify gtk+-2.0` LDF_D := -Wl,--as-needed `pkg-config --libs glib-2.0 dbus-glib-1` `curl-config --libs` -Wl,"-z relro" -Wl,"-z now" all: kerneloops kerneloops-applet kerneloops.8.gz noui: kerneloops kerneloops.8.gz .c.o: $(CC) $(CFLAGS) $(MY_CFLAGS) -c -o $@ $< kerneloops: kerneloops.o submit.o dmesg.o configfile.o kerneloops.h gcc kerneloops.o submit.o dmesg.o configfile.o $(LDF_D) -o kerneloops @(cd po/ && $(MAKE)) kerneloops-applet: kerneloops-applet.o gcc kerneloops-applet.o $(LDF_A)-o kerneloops-applet kerneloops.8.gz: kerneloops.8 gzip -9 -c $< > $@ clean: rm -f *~ *.o *.ko DEADJOE kerneloops kerneloops-applet *.out */*~ kerneloops.8.gz @(cd po/ && $(MAKE) $@) dist: clean rm -rf .git .gitignore push.sh .*~ */*~ test/*dbg install-system: kerneloops.8.gz -mkdir -p $(DESTDIR)$(MANDIR) -mkdir -p $(DESTDIR)/etc/dbus-1/system.d/ install -m 0644 kerneloops.conf $(DESTDIR)/etc/kerneloops.conf install -m 0644 kerneloops.dbus $(DESTDIR)/etc/dbus-1/system.d/ install -m 0644 kerneloops.8.gz $(DESTDIR)$(MANDIR)/ @(cd po/ && env LOCALESDIR=$(LOCALESDIR) DESTDIR=$(DESTDIR) $(MAKE) install) install-kerneloops: kerneloops -mkdir -p $(DESTDIR)$(SBINDIR) install -m 0755 kerneloops $(DESTDIR)$(SBINDIR)/ install-applet: kerneloops-applet -mkdir -p $(DESTDIR)$(BINDIR) -mkdir -p $(DESTDIR)/etc/xdg/autostart -mkdir -p $(DESTDIR)/usr/share/kerneloops install -m 0755 kerneloops-applet $(DESTDIR)$(BINDIR)/ desktop-file-install --mode 0644 --dir=$(DESTDIR)/etc/xdg/autostart/ kerneloops-applet.desktop install -m 0644 icon.png $(DESTDIR)/usr/share/kerneloops/icon.png install: install-system install-kerneloops install-applet install-noui: install-system install-kerneloops # This is for translators. To update your po with new strings, do : # svn up ; make uptrans LG=fr # or de, ru, hu, it, ... uptrans: xgettext -C -s -k_ -o po/kerneloops.pot *.c *.h @(cd po/ && env LG=$(LG) $(MAKE) $@) tests: kerneloops desktop-file-validate *.desktop for i in test/*txt ; do echo -n . ; ./kerneloops --debug $$i > $$i.dbg ; diff -u $$i.out $$i.dbg ; done ; echo [ -e /usr/bin/valgrind ] && for i in test/*txt ; do echo -n . ; valgrind -q --leak-check=full ./kerneloops --debug $$i > $$i.dbg ; diff -u $$i.out $$i.dbg ; done ; echo valgrind: kerneloops tests valgrind -q --leak-check=full ./kerneloops --debug test/*.txt