Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-27
Last occurrence
2023-01-27
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? selinux_inode_permission
vmlinux 0x10e
2
? selinux_inode_permission
vmlinux 0x10e
3
? selinux_inode_permission
vmlinux 0x10e
4
? selinux_inode_permission
vmlinux 0x10e
5
? selinux_inode_permission
vmlinux 0x10e
6
? selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
BUG: unable to handle page fault for address: ffffa02b7c020305
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 542001067 P4D 542001067 PUD 542009067 PMD 0 
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 9 PID: 30134 Comm: Screen.Capture Tainted: P           OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. AX370M-Gaming 3/AX370M-Gaming 3-CF, BIOS F50d 07/02/2020
RIP: 0010:file_has_perm+0x29/0xe0
Code: 00 0f 1f 44 00 00 41 55 49 89 f5 41 54 55 89 d5 53 48 89 fb 48 83 ec 20 48 63 15 76 b6 21 01 48 63 05 6b b6 21 01 48 03 47 78 <48> 03 96 c0 00 00 00 48 c7 04 24 00 00 00 00 48 c7 44 24 08 00 00
RSP: 0018:ffffc38453447ca0 EFLAGS: 00010286
RAX: ffffa02b80ca85a0 RBX: ffffa02bbb510300 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffa02b7c020245 RDI: ffffa02bbb510300
RBP: 0000000000000000 R08: 00007f3f139083d6 R09: ffffc38453447da0
R10: 000000007ffff000 R11: 0000000000000000 R12: 0000000000000002
R13: ffffa02b7c020245 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f3ecd5056c0(0000) GS:ffffa0326ec40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffa02b7c020305 CR3: 00000005cbd7e000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? __check_object_size+0x4a/0x200
 ? inode_security+0x22/0x60
 ? security_file_permission+0x32/0x60
 ? do_iter_write+0x57/0x1c0
 ? vfs_writev+0xbf/0x1c0
 ? do_writev+0xd2/0x130
 ? do_syscall_64+0x5b/0x80
 ? __x64_sys_poll+0x3a/0x120
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_user_addr_fault+0x1ef/0x690
 ? exc_page_fault+0x70/0x170
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat rfkill nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) qrtr nvidia(POE) sunrpc vfat fat snd_hda_codec_realtek ucsi_ccg snd_hda_codec_generic typec_ucsi intel_rapl_msr ppdev typec ledtrig_audio snd_hda_codec_hdmi intel_rapl_common snd_hda_intel snd_intel_dspcfg snd_usb_audio snd_intel_sdw_acpi edac_mce_amd snd_hda_codec snd_usbmidi_lib kvm_amd snd_hda_core snd_rawmidi mc snd_hwdep kvm snd_seq snd_seq_device irqbypass snd_pcm rapl snd_timer pcspkr gigabyte_wmi wmi_bmof k10temp snd xpad joydev ff_memless i2c_piix4 video soundcore i2c_nvidia_gpu gpio_amdpt parport_pc acpi_cpufreq gpio_generic parport zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni
 polyval_generic nvme ghash_clmulni_intel ccp r8169 sha512_ssse3 nvme_core sp5100_tco nvme_common wmi ip6_tables ip_tables fuse
CR2: ffffa02b7c020305