Info

Permalink
Function
unknown function
First occurrence
2022-04-08
Last occurrence
2022-04-08
State
NEW
Components
kernel Tainted
Quality
-39

Statistics

Operating system Count
AlmaLinux 8.5 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:4.18.0-348.20.1.el8_5 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

Report backtrace

Complete report #193
Frame # Function Binary Source or offset Line
1
fat_alloc_clusters
fat 0x34f
2
? selinux_file_ioctl
vmlinux 0x17f
3
fat_alloc_clusters
fat 0x34f
4
? selinux_file_ioctl
vmlinux 0x17f
5
? selinux_file_ioctl
vmlinux 0x17f
6
vfat_mkdir
vfat 0x5f
7
? selinux_file_ioctl
vmlinux 0x17f
8
selinux_file_ioctl
vmlinux 0x17f
9
selinux_file_ioctl
vmlinux 0x17f
10
unload_network_ops_symbols
falcon_lsm_pinned_13109 0x4da7
11
? unload_network_ops_symbols
falcon_lsm_pinned_13207 0x4da7
12
? unload_network_ops_symbols
falcon_lsm_pinned_13402 0x4de7
13
? selinux_file_ioctl
vmlinux 0x17f
14
? selinux_file_ioctl
vmlinux 0x17f
WARNING: CPU: 1 PID: 1286438 at fs/fs-writeback.c:2323 __mark_inode_dirty+0x296/0x380
Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_13402(E) falcon_lsm_pinned_13207(E) vfat fat uas usb_storage snd_seq_dummy snd_hrtimer xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nft_counter tun bridge stp llc falcon_lsm_pinned_13109(E) nf_nat_tftp nft_objref nf_conntrack_tftp nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp snd_hda_codec_realtek coretemp snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_hda_intel crct10dif_pclmul hp_wmi snd_intel_dspcfg crc32_pclmul mei_wdt sparse_keymap snd_intel_sdw_acpi iTCO_wdt rfkill iTCO_vendor_support wmi_bmof snd_hda_codec ghash_clmulni_intel snd_hda_core rapl snd_hwdep intel_cstate snd_seq intel_uncore
 pcspkr snd_seq_device snd_pcm snd_timer snd mei_me i2c_i801 lpc_ich soundcore mei wmi nfsd auth_rpcgss nfs_acl lockd grace sunrpc ext4 mbcache jbd2 nvidia_drm(POE) nvidia_modeset(POE) sr_mod sd_mod cdrom t10_pi sg nvidia(POE) drm_kms_helper ahci firewire_ohci drm firewire_core libahci serio_raw crc_itu_t ata_generic crc32c_intel libata tg3 e1000e syscopyarea sysfillrect sysimgblt fb_sys_fops fuse [last unloaded: falcon_kal]
CPU: 1 PID: 1286438 Comm: pool Kdump: loaded Tainted: P           OE    --------- -  - 4.18.0-348.20.1.el8_5.x86_64 #1
Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.96 10/29/2019
RIP: 0010:__mark_inode_dirty+0x296/0x380
Code: ff ff 48 8b 38 49 89 c4 f6 47 3c 02 75 1e 48 8b 40 08 a8 01 75 16 e8 d9 6d f3 ff 48 c7 c7 b7 58 0f bd 48 89 c6 e8 c3 6a d8 ff <0f> 0b 48 8b 05 11 1a 2a 01 48 89 85 d0 00 00 00 45 85 ff 74 0e 48
RSP: 0018:ffffae2f821ebb98 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000007
RDX: 0000000000000007 RSI: 0000000000000082 RDI: ffff941917c56850
RBP: ffff9418044d9f78 R08: 0000000000000d74 R09: 0000000000000004
R10: 0000000000000000 R11: 0000000000000001 R12: ffff941886c97858
R13: ffff9418044da000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f23350d0700(0000) GS:ffff941917c40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056538529a970 CR3: 000000011aae8005 CR4: 00000000000606e0
Call Trace:
 fat_alloc_clusters+0x34f/0x510 [fat]
 ? unlazy_walk+0x42/0x70
 fat_alloc_new_dir+0x43/0x250 [fat]
 ? d_splice_alias+0x1a1/0x3c0
 ? current_time+0x4a/0x90
 vfat_mkdir+0x5f/0x1c0 [vfat]
 ? __lookup_hash+0x71/0xa0
 vfs_mkdir+0x102/0x1b0
 do_mkdirat+0x7d/0xf0
 unload_network_ops_symbols+0x4da7/0x5a90 [falcon_lsm_pinned_13109]
 ? unload_network_ops_symbols+0x4da7/0x5a90 [falcon_lsm_pinned_13207]
 ? unload_network_ops_symbols+0x4de7/0x5ad0 [falcon_lsm_pinned_13402]
 ? do_syscall_64+0x5b/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x65/0xca