Kerneloops
- Similar reports
-
Problem #366
- Component
-
kernel
Tainted
- Last affected version
-
0:4.18.0-477.21.1.el8_8
- Executable
-
unknown
- First occurrence
- 2023-12-21
- Last occurrence
- 2023-12-21
- Unique reports
-
1
- Quality
- -38
Associate bug
If you don't consider this report useful, you can archive
it and it won't be displayed on reports dashboard.
Statistics
Operating system |
Unique / Total count |
AlmaLinux 8.8 |
1 / 1 |
Operating system |
Count |
AlmaLinux 8.8 |
1 |
Architecture |
Count |
x86_64 |
1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 days.
Backtrace
Frame # |
Function |
Binary |
Source or offset |
Line |
1
|
hook_protocols
|
gc_enforcement |
|
0x100
|
2
|
hook_protocols
|
gc_enforcement |
|
0x100
|
3
|
|
gc_enforcement |
|
0x100
|
4
|
kfree
|
vmlinux |
|
0xd3
|
5
|
|
vmlinux |
|
0xd3
|
6
|
|
vmlinux |
|
0xd3
|
7
|
kfree
|
vmlinux |
|
0xd3
|
8
|
kfree
|
vmlinux |
|
0xd3
|
9
|
|
vmlinux |
|
0xd3
|
10
|
|
vmlinux |
|
0xd3
|
11
|
kfree
|
vmlinux |
|
0xd3
|
12
|
unload_network_ops_symbols
|
falcon_lsm_pinned_15508 |
|
0x6c83
|
13
|
|
vmlinux |
|
0xd3
|
14
|
|
vmlinux |
|
0xd3
|
WARNING: CPU: 1 PID: 32376 at arch/x86/kernel/cpu/common.c:415 native_write_cr0+0x38/0x50
Modules linked in: gc_enforcement(OE+) falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_15508(E) cfg80211 rfkill vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock ppdev crct10dif_pclmul crc32_pclmul vmw_balloon ghash_clmulni_intel joydev pcspkr vmw_vmci i2c_piix4 parport_pc parport auth_rpcgss sunrpc ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg vmwgfx ata_generic drm_ttm_helper ttm drm_kms_helper crc32c_intel syscopyarea sysfillrect sysimgblt serio_raw fb_sys_fops ata_piix drm mptspi scsi_transport_spi libata mptscsih vmw_pvscsi mptbase vmxnet3 dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 1 PID: 32376 Comm: insmod Tainted: P OE ---------r- - 4.18.0-477.21.1.el8_8.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
RIP: 0010:native_write_cr0+0x38/0x50
Code: 01 00 74 2d 48 85 c0 75 05 e9 c4 46 dc 00 80 3d 65 4c f2 01 00 75 f2 48 c7 c7 1e 30 4d bc c6 05 55 4c f2 01 01 e8 a5 a1 0b 00 <0f> 0b e9 a1 46 dc 00 48 81 cf 00 00 01 00 b8 00 00 01 00 eb b5 0f
RSP: 0018:ffffa5504189fc28 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: 0000000000000027 RSI: 00000000ffff7fff RDI: ffff9a05b7d1e690
RBP: 0000000000000001 R08: 0000000000000000 R09: c0000000ffff7fff
R10: 0000000000000001 R11: ffffa5504189fa40 R12: ffffffffc0ad2640
R13: ffffffffc0ad2658 R14: ffffffffc0ad2810 R15: 0000000000000000
FS: 00007fdc7b7eb740(0000) GS:ffff9a05b7d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9f964c11e0 CR3: 00000001ee46e000 CR4: 00000000000006e0
Call Trace:
hook_protocols+0x100/0x17d0 [gc_enforcement]
init_module+0x502/0x3440 [gc_enforcement]
? cleanup_module+0x4c0/0x4c0 [gc_enforcement]
do_one_initcall+0x46/0x1d0
? do_init_module+0x22/0x230
? kmem_cache_alloc_trace+0x142/0x280
do_init_module+0x5a/0x230
load_module+0x14bf/0x17f0
? ima_post_read_file+0xfa/0x110
? __do_sys_finit_module+0xb1/0x110
__do_sys_finit_module+0xb1/0x110
unload_network_ops_symbols+0x6c83/0xa860 [falcon_lsm_pinned_15508]
? do_syscall_64+0x5b/0x1b0
? entry_SYSCALL_64_after_hwframe+0x61/0xc6