Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #527428
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-10
Last occurrence
2022-11-10
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ep_remove
vmlinux 0xed
2
? ep_remove
vmlinux 0xed
3
? ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
? ep_remove
vmlinux 0xed
6
? ep_remove
vmlinux 0xed
7
? ep_remove
vmlinux 0xed
8
? ep_remove
vmlinux 0xed
9
? ep_remove
vmlinux 0xed
10
? ep_remove
vmlinux 0xed
11
? ep_remove
vmlinux 0xed
12
? ep_remove
vmlinux 0xed
13
? ep_remove
vmlinux 0xed
general protection fault, maybe for address 0x0: 0000 [#1] PREEMPT SMP NOPTI
CPU: 9 PID: 3878 Comm: victoria3 Tainted: P           OE      6.0.5-200.fc36.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME X570-P, BIOS 4204 02/24/2022
RIP: 0010:security_inode_follow_link+0x58/0x70
Code: 74 20 48 8b 43 18 89 ea 4c 89 e6 4c 89 ef e8 df 24 a0 00 85 c0 74 e3 5b 5d 41 5c 41 5d c3 cc cc cc cc 5b 31 c0 5d 41 5c 41 5d <c3> cc cc cc cc 31 c0 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00
RSP: 0018:ffffa76dd20bbc08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffa76dd20bbc90 RCX: ffff9bd90515ae58
RDX: 0000000000000001 RSI: ffff9bd905c78230 RDI: ffff9bd9075f2f00
RBP: ffff9bd905c78230 R08: ffffffffb6d8f860 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: ffffffffb43ca527
R13: ffffffffb43c70a6 R14: ffffa76dd20bbcf8 R15: 0000000000000000
FS:  00007f8f6a7fc640(0000) GS:ffff9bdc1ec40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1a8ddba000 CR3: 000000022bc22000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? path_lookupat+0x67/0x190
 ? filename_lookup+0xd3/0x1c0
 ? __check_object_size+0x1f4/0x250
 ? vfs_statx+0x82/0x120
 ? vfs_fstatat+0x51/0x70
 ? __do_sys_newfstatat+0x2e/0x50
 ? do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x117/0x1f0
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) nvidia(POE) sunrpc vfat fat snd_hda_codec_realtek intel_rapl_msr intel_rapl_common snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi ucsi_ccg edac_mce_amd snd_hda_codec typec_ucsi snd_hda_core snd_hwdep typec snd_seq kvm snd_seq_device eeepc_wmi asus_wmi irqbypass ledtrig_audio snd_pcm sparse_keymap rapl platform_profile snd_timer snd rfkill video wmi_bmof pcspkr k10temp soundcore i2c_nvidia_gpu i2c_piix4 acpi_cpufreq zram ccp crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme ghash_clmulni_intel nvme_core sp5100_tco r8169 nvme_common wmi
 hid_glorious ip6_tables ip_tables fuse