Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-01
Last occurrence
2023-02-01
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? selinux_inode_permission
vmlinux 0x10e
2
? selinux_inode_permission
vmlinux 0x10e
3
? selinux_inode_permission
vmlinux 0x10e
4
? selinux_inode_permission
vmlinux 0x10e
5
? selinux_inode_permission
vmlinux 0x10e
6
? selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
BUG: unable to handle page fault for address: 00000e461ff33e9b
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP PTI
CPU: 0 PID: 40058 Comm: totem Tainted: P           OE      6.1.7-200.fc37.x86_64 #1
Hardware name: MSI MS-7681/Z68A-GD55 (G3) (MS-7681), BIOS V25.8 01/11/2013
RIP: 0010:0xe461ff33e9b
Code: Unable to access opcode bytes at 0xe461ff33e71.
RSP: 0018:ffffb5c4883abb78 EFLAGS: 00010206
RAX: 0000000000000000 RBX: 000000000000002d RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff9acaa1da3b58 RDI: ffff9ac9f6133600
RBP: 0000000000000050 R08: 00000e461ff33e9b R09: 0000000080080008
R10: 0000000040000040 R11: 0000000000000000 R12: 000000000000000a
R13: ffff9acaa1da3ba8 R14: 000000000000000a R15: ffff9acaa1da3b58
FS:  00007f7f8a97ca80(0000) GS:ffff9acccec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000e461ff33e9b CR3: 000000012fcec003 CR4: 00000000000606f0
Call Trace:
 <TASK>
 ? rtnl_dump_all+0xcf/0x100
 ? netlink_dump+0x123/0x310
 ? netlink_recvmsg+0x24e/0x410
 ? bpf_lsm_socket_sendmsg+0x10/0x10
 ? ____sys_recvmsg+0x98/0x1a0
 ? ___sys_recvmsg+0x80/0xb0
 ? __sys_recvmsg+0x65/0xa0
 ? do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nvidia_drm(POE) rfkill nf_tables nfnetlink nvidia_modeset(POE) nvidia_uvm(POE) nvidia(POE) qrtr sunrpc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp at24 mei_pxp iTCO_wdt mei_hdcp intel_pmc_bxt iTCO_vendor_support kvm_intel binfmt_misc joydev snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio vfat kvm uvcvideo fat snd_hda_codec_hdmi videobuf2_vmalloc irqbypass videobuf2_memops snd_usb_audio videobuf2_v4l2 rapl videobuf2_common snd_hda_intel snd_usbmidi_lib snd_intel_dspcfg intel_cstate snd_intel_sdw_acpi videodev snd_rawmidi intel_uncore snd_hda_codec mc pcspkr i2c_i801 snd_hda_core i2c_smbus snd_hwdep lpc_ich snd_seq snd_seq_device snd_pcm
 mei_me snd_timer snd mei soundcore zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni mxm_wmi polyval_generic ghash_clmulni_intel ata_generic uas sha512_ssse3 pata_acpi r8169 usb_storage video wmi ip6_tables ip_tables fuse
CR2: 00000e461ff33e9b