Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-31
Last occurrence
2023-01-31
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
selinux_inode_permission
vmlinux 0x10e
2
selinux_inode_permission
vmlinux 0x10e
3
selinux_inode_permission
vmlinux 0x10e
4
selinux_inode_permission
vmlinux 0x10e
5
? selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
selinux_inode_permission
vmlinux 0x10e
8
selinux_inode_permission
vmlinux 0x10e
9
selinux_inode_permission
vmlinux 0x10e
10
selinux_inode_permission
vmlinux 0x10e
11
selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
selinux_inode_permission
vmlinux 0x10e
14
selinux_inode_permission
vmlinux 0x10e
15
selinux_inode_permission
vmlinux 0x10e
16
selinux_inode_permission
vmlinux 0x10e
17
selinux_inode_permission
vmlinux 0x10e
18
? selinux_inode_permission
vmlinux 0x10e
19
? selinux_inode_permission
vmlinux 0x10e
20
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 5 PID: 3837 at fs/btrfs/extent-tree.c:3058 __btrfs_free_extent+0x534/0x7a0
Modules linked in: tls bnep uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr sunrpc snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils soundwire_bus snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi elan_i2c snd_hda_codec_hdmi snd_soc_core snd_ctl_led vfat snd_hda_codec_conexant fat snd_hda_codec_generic snd_compress intel_tcc_cooling ac97_bus x86_pkg_temp_thermal snd_pcm_dmaengine intel_powerclamp coretemp snd_hda_intel snd_intel_dspcfg iwlmvm kvm_intel snd_intel_sdw_acpi mac80211 snd_hda_codec iTCO_wdt mei_hdcp mei_pxp kvm ee1004
 snd_hda_core btusb libarc4 intel_pmc_bxt iTCO_vendor_support intel_rapl_msr snd_hwdep btrtl irqbypass rapl snd_seq btbcm uvcvideo intel_cstate iwlwifi snd_seq_device btintel videobuf2_vmalloc videobuf2_memops intel_uncore snd_pcm videobuf2_v4l2 btmtk think_lmi pcspkr videobuf2_common firmware_attributes_class cfg80211 wmi_bmof i2c_i801 intel_wmi_thunderbolt snd_timer i2c_smbus mei_me bluetooth processor_thermal_device_pci_legacy videodev thinkpad_acpi processor_thermal_device mei processor_thermal_rfim joydev mc processor_thermal_mbox ledtrig_audio processor_thermal_rapl platform_profile intel_rapl_common rfkill intel_soc_dts_iosf intel_pch_thermal snd soundcore int3403_thermal int340x_thermal_zone int3400_thermal acpi_pad acpi_thermal_rel zram hid_logitech_hidpp amdgpu i915 drm_ttm_helper nvme crct10dif_pclmul ttm iommu_v2 crc32_pclmul gpu_sched crc32c_intel drm_buddy polyval_clmulni nvme_core polyval_generic drm_display_helper ucsi_acpi uas ghash_clmulni_intel serio_raw
 typec_ucsi usb_storage sha512_ssse3 nvme_common r8169 cec hid_logitech_dj typec video wmi pinctrl_cannonlake ip6_tables ip_tables fuse
CPU: 5 PID: 3837 Comm: pool-udisksd Tainted: G        W          6.1.7-200.fc37.x86_64 #1
Hardware name: LENOVO 20RA0085UE/20RA0085UE, BIOS R16ET32W (1.18 ) 06/30/2021
RIP: 0010:__btrfs_free_extent+0x534/0x7a0
Code: 0f 86 e2 af 85 00 48 8d 70 7d ba 11 00 00 00 4c 89 ef e8 8f 2f 03 00 0f b6 c0 4c 39 f0 0f 84 12 fe ff ff 0f 0b e9 0b fe ff ff <0f> 0b 49 8b 3f e8 02 4f 00 00 4d 89 f1 4d 89 e8 48 89 da 41 54 48
RSP: 0018:ffffa0c683a8f910 EFLAGS: 00010246
RAX: 00000000fffffffe RBX: 0000000989dbd000 RCX: 0000000000000000
RDX: ffff8d0ff179cf78 RSI: ffff8d1005ec9a53 RDI: ffffa0c683a8f8c0
RBP: 0000000000000000 R08: 0000000000001000 R09: 00000000000000e2
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000959a9e000
R13: 0000000000000100 R14: 00000000000019c7 R15: ffff8d0f115e6690
FS:  00007f32777fe6c0(0000) GS:ffff8d124e540000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005637d908a6c8 CR3: 00000001061b0006 CR4: 00000000003706e0
Call Trace:
 <TASK>
 __btrfs_run_delayed_refs+0x2b1/0x1080
 btrfs_run_delayed_refs+0x76/0x1a0
 btrfs_commit_transaction+0x52/0xc40
 btrfs_recover_log_trees+0x37d/0x430
 ? replay_one_extent+0x7e0/0x7e0
 open_ctree+0x11ed/0x1449
 btrfs_mount_root.cold+0xe/0xa5
 legacy_get_tree+0x24/0x50
 vfs_get_tree+0x22/0xc0
 vfs_kern_mount.part.0+0x73/0xb0
 btrfs_mount+0x13a/0x3e0
 ? legacy_get_tree+0x24/0x50
 legacy_get_tree+0x24/0x50
 vfs_get_tree+0x22/0xc0
 path_mount+0x446/0xa60
 __x64_sys_mount+0xf6/0x140
 do_syscall_64+0x58/0x80
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f3287c1f12e
Code: 48 8b 0d 05 5d 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d d2 5c 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f32777fd338 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f326400a020 RCX: 00007f3287c1f12e
RDX: 00007f3264005720 RSI: 000056073aececf0 RDI: 00007f3264002920
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000020
R10: 0000000000000006 R11: 0000000000000246 R12: 00007f3264002920
R13: 00007f3264005720 R14: 00000000ffffffff R15: 00007f32882b2076
 </TASK>