Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-29
Last occurrence
2023-01-29
Unique reports
1
Quality
-53

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
selinux_inode_permission
vmlinux 0x10e
2
selinux_inode_permission
vmlinux 0x10e
3
selinux_inode_permission
vmlinux 0x10e
4
selinux_inode_permission
vmlinux 0x10e
5
? selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
selinux_inode_permission
vmlinux 0x10e
8
selinux_inode_permission
vmlinux 0x10e
9
selinux_inode_permission
vmlinux 0x10e
10
selinux_inode_permission
vmlinux 0x10e
11
selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
selinux_inode_permission
vmlinux 0x10e
14
selinux_inode_permission
vmlinux 0x10e
15
selinux_inode_permission
vmlinux 0x10e
16
selinux_inode_permission
vmlinux 0x10e
17
selinux_inode_permission
vmlinux 0x10e
18
? selinux_inode_permission
vmlinux 0x10e
19
? selinux_inode_permission
vmlinux 0x10e
20
? selinux_inode_permission
vmlinux 0x10e
21
? selinux_inode_permission
vmlinux 0x10e
22
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 7 PID: 179279 at fs/btrfs/extent-tree.c:3064 __btrfs_free_extent.cold+0x449/0xa30
Modules linked in: uas usb_storage ipheth apple_mfi_fastcharge uinput vmnet(OE) vmmon(OE) tun tls r8153_ecm cdc_ether usbnet r8152 mii rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netlink xt_nat xt_mark xt_conntrack xt_addrtype xt_comment xt_MASQUERADE nft_compat veth br_netfilter bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr ppdev parport_pc parport vmw_vsock_vmci_transport vsock overlay vmw_vmci bnep sunrpc binfmt_misc vfat fat intel_rapl_msr intel_rapl_common edac_mce_amd rtw88_8822ce kvm_amd snd_hda_codec_realtek rtw88_8822c snd_hda_codec_generic snd_hda_codec_hdmi rtw88_pci kvm rtw88_core snd_hda_intel asus_nb_wmi asus_wmi snd_intel_dspcfg ledtrig_audio snd_intel_sdw_acpi irqbypass rapl uvcvideo sparse_keymap snd_hda_codec pcspkr mac80211
 btusb videobuf2_vmalloc snd_hda_core squashfs platform_profile videobuf2_memops btrtl snd_hwdep wmi_bmof loop btbcm videobuf2_v4l2 btintel snd_seq videobuf2_common btmtk libarc4 snd_seq_device cfg80211 videodev k10temp bluetooth snd_pcm mc joydev snd_timer snd rfkill soundcore i2c_piix4 amd_pmc acpi_cpufreq zram amdgpu hid_logitech_hidpp drm_ttm_helper ttm iommu_v2 nvme gpu_sched drm_buddy crct10dif_pclmul nvme_core drm_display_helper video crc32_pclmul crc32c_intel polyval_clmulni hid_multitouch polyval_generic ghash_clmulni_intel serio_raw sha512_ssse3 sp5100_tco ccp hid_logitech_dj cec nvme_common wmi i2c_hid_acpi i2c_hid scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 7 PID: 179279 Comm: pool-udisksd Tainted: G        W  OE      6.1.7-200.fc37.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. VivoBook_ASUSLaptop X421IA_M433IA/X421IA, BIOS X421IA.310 06/02/2021
RIP: 0010:__btrfs_free_extent.cold+0x449/0xa30
Code: ff ff e9 51 50 7a ff bf fe ff ff ff e8 1c f4 ff ff 84 c0 0f 84 bc 00 00 00 be fe ff ff ff 48 c7 c7 10 41 73 b2 e8 be 9f fe ff <0f> 0b c6 44 24 30 01 44 8b 44 24 30 48 8b 7c 24 08 b9 fe ff ff ff
RSP: 0018:ffffade3d1b5f860 EFLAGS: 00010292
RAX: 0000000000000025 RBX: 0000000989dbd000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffffb274b8a3 RDI: 00000000ffffffff
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffade3d1b5f700
R10: 0000000000000003 R11: ffffffffb3146488 R12: 0000000959a9e000
R13: 0000000000000100 R14: 00000000000019c7 R15: ffff9ed71187d690
FS:  00007f62595fe6c0(0000) GS:ffff9ed9ff7c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d473e2070 CR3: 0000000108b32000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 __btrfs_run_delayed_refs+0x2b1/0x1080
 btrfs_run_delayed_refs+0x76/0x1a0
 btrfs_commit_transaction+0x52/0xc40
 btrfs_recover_log_trees+0x37d/0x430
 ? replay_one_extent+0x7e0/0x7e0
 open_ctree+0x11ed/0x1449
 btrfs_mount_root.cold+0xe/0xa5
 legacy_get_tree+0x27/0x50
 vfs_get_tree+0x25/0xc0
 vfs_kern_mount.part.0+0x73/0xb0
 btrfs_mount+0x13a/0x3e0
 ? legacy_get_tree+0x27/0x50
 legacy_get_tree+0x27/0x50
 vfs_get_tree+0x25/0xc0
 path_mount+0x446/0xa60
 __x64_sys_mount+0xf6/0x140
 do_syscall_64+0x5b/0x80
 ? do_syscall_64+0x67/0x80
 ? handle_mm_fault+0xdb/0x2d0
 ? do_user_addr_fault+0x1ef/0x690
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f625a7df12e
Code: 48 8b 0d 05 5d 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d d2 5c 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62595fd338 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f624c016460 RCX: 00007f625a7df12e
RDX: 00007f624c018d00 RSI: 00007f624c019400 RDI: 00007f624c00b0f0
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000020
R10: 0000000000000006 R11: 0000000000000246 R12: 00007f624c00b0f0
R13: 00007f624c018d00 R14: 00000000ffffffff R15: 00007f625ae72076
 </TASK>