Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #546102
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-11
Last occurrence
2021-02-11
Unique reports
1
Quality
-29

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avc_has_extended_perms
vmlinux 0x18d
2
avc_has_extended_perms
vmlinux 0x18d
3
avc_has_extended_perms
vmlinux 0x18d
4
avc_has_extended_perms
vmlinux 0x18d
5
avc_has_extended_perms
vmlinux 0x18d
6
avc_has_extended_perms
vmlinux 0x18d
7
avc_has_extended_perms
vmlinux 0x18d
8
avc_has_extended_perms
vmlinux 0x18d
9
avc_has_extended_perms
vmlinux 0x18d
10
avc_has_extended_perms
vmlinux 0x18d
11
avc_has_extended_perms
vmlinux 0x18d
12
avc_has_extended_perms
vmlinux 0x18d
13
avc_has_extended_perms
vmlinux 0x18d
14
avc_has_extended_perms
vmlinux 0x18d
BUG: unable to handle page fault for address: 0000010000000200
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP NOPTI
CPU: 11 PID: 784 Comm: upowerd Tainted: G      D           5.10.12-200.fc33.x86_64 #1
Hardware name: System76 Oryx Pro/Oryx Pro, BIOS 2020-10-19_d5deed5 10/07/2020
RIP: 0010:string+0x49/0xd0
Code: ff 77 36 45 89 d1 31 f6 49 01 f9 66 45 85 d2 75 19 eb 1e 49 39 f8 76 02 88 07 48 83 c7 01 83 c6 01 48 83 c2 01 4c 39 cf 74 07 <0f> b6 02 84 c0 75 e2 4c 89 c2 e9 78 ee ff ff 48 c7 c0 60 c2 40 8a
RSP: 0018:ffffa703c1853c50 EFLAGS: 00010286
RAX: 000000fffffff200 RBX: ffffa703c1853ca8 RCX: ffff0a00ffffff04
RDX: 0000010000000200 RSI: 0000000000000000 RDI: 0000000000000006
RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000100000005
R10: ffffffffffffffff R11: ffff98e05bd0e22d R12: 0000000000000000
R13: ffffffff8a45fe9f R14: 0000000000000000 R15: ffffffff8a45fe9f
FS:  00007f3fc8b45c40(0000) GS:ffff98e38e4c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000010000000200 CR3: 000000011cc7e004 CR4: 00000000007706e0
PKRU: 55555554
Call Trace:
 vsnprintf+0x253/0x4e0
 kvasprintf+0x3e/0xa0
 kasprintf+0x3e/0x40
 device_get_devnode+0x68/0xd0
 dev_uevent+0x144/0x2c0
 uevent_show+0x94/0x100
 dev_attr_show+0x19/0x40
 sysfs_kf_seq_show+0x9b/0xf0
 seq_read_iter+0x1e5/0x520
 new_sync_read+0x105/0x180
 vfs_read+0x14b/0x1a0
 ksys_read+0x4f/0xc0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f3fc939047c
Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 19 40 f9 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 6f 40 f9 ff 48
RSP: 002b:00007ffdae96a240 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 0000560e9d590200 RCX: 00007f3fc939047c
RDX: 0000000000001000 RSI: 0000560e9d5b0810 RDI: 000000000000000c
RBP: 00007f3fc9464320 R08: 0000000000000000 R09: 00007f3fc9462a60
R10: 0000000000000070 R11: 0000000000000246 R12: 0000000000001001
R13: 0000560e9d5b0810 R14: 0000000000000d68 R15: 00007f3fc9463720
Modules linked in: sunrpc vfat fat squashfs loop zram ip_tables i915 nouveau hid_multitouch mxm_wmi wmi ttm i2c_algo_bit drm_kms_helper rtsx_pci_sdmmc mmc_core crct10dif_pclmul crc32_pclmul cec crc32c_intel drm ghash_clmulni_intel serio_raw r8169 rtsx_pci i2c_hid video pinctrl_cannonlake fuse
CR2: 0000010000000200