Kerneloops

Similar reports
Problem #366
Component
kernel Tainted
Last affected version
0:4.18.0-477.21.1.el8_8
Executable
unknown
First occurrence
2023-12-21
Last occurrence
2023-12-21
Unique reports
1
Quality
-38
Associate bug
If you don't consider this report useful, you can archive it and it won't be displayed on reports dashboard.

Statistics

Operating system Unique / Total count
AlmaLinux 8.8 1 / 1
Operating system Count
AlmaLinux 8.8 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:4.18.0-477.21.1.el8_8 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
hook_protocols
gc_enforcement 0x100
2
hook_protocols
gc_enforcement 0x100
3
? hook_protocols
gc_enforcement 0x100
4
kfree
vmlinux 0xd3
5
? kfree
vmlinux 0xd3
6
? kfree
vmlinux 0xd3
7
kfree
vmlinux 0xd3
8
kfree
vmlinux 0xd3
9
? kfree
vmlinux 0xd3
10
? kfree
vmlinux 0xd3
11
kfree
vmlinux 0xd3
12
unload_network_ops_symbols
falcon_lsm_pinned_15508 0x6c83
13
? kfree
vmlinux 0xd3
14
? kfree
vmlinux 0xd3
WARNING: CPU: 1 PID: 32376 at arch/x86/kernel/cpu/common.c:415 native_write_cr0+0x38/0x50
Modules linked in: gc_enforcement(OE+) falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_15508(E) cfg80211 rfkill vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock ppdev crct10dif_pclmul crc32_pclmul vmw_balloon ghash_clmulni_intel joydev pcspkr vmw_vmci i2c_piix4 parport_pc parport auth_rpcgss sunrpc ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg vmwgfx ata_generic drm_ttm_helper ttm drm_kms_helper crc32c_intel syscopyarea sysfillrect sysimgblt serio_raw fb_sys_fops ata_piix drm mptspi scsi_transport_spi libata mptscsih vmw_pvscsi mptbase vmxnet3 dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 1 PID: 32376 Comm: insmod Tainted: P           OE    ---------r-  - 4.18.0-477.21.1.el8_8.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
RIP: 0010:native_write_cr0+0x38/0x50
Code: 01 00 74 2d 48 85 c0 75 05 e9 c4 46 dc 00 80 3d 65 4c f2 01 00 75 f2 48 c7 c7 1e 30 4d bc c6 05 55 4c f2 01 01 e8 a5 a1 0b 00 <0f> 0b e9 a1 46 dc 00 48 81 cf 00 00 01 00 b8 00 00 01 00 eb b5 0f
RSP: 0018:ffffa5504189fc28 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: 0000000000000027 RSI: 00000000ffff7fff RDI: ffff9a05b7d1e690
RBP: 0000000000000001 R08: 0000000000000000 R09: c0000000ffff7fff
R10: 0000000000000001 R11: ffffa5504189fa40 R12: ffffffffc0ad2640
R13: ffffffffc0ad2658 R14: ffffffffc0ad2810 R15: 0000000000000000
FS:  00007fdc7b7eb740(0000) GS:ffff9a05b7d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9f964c11e0 CR3: 00000001ee46e000 CR4: 00000000000006e0
Call Trace:
 hook_protocols+0x100/0x17d0 [gc_enforcement]
 init_module+0x502/0x3440 [gc_enforcement]
 ? cleanup_module+0x4c0/0x4c0 [gc_enforcement]
 do_one_initcall+0x46/0x1d0
 ? do_init_module+0x22/0x230
 ? kmem_cache_alloc_trace+0x142/0x280
 do_init_module+0x5a/0x230
 load_module+0x14bf/0x17f0
 ? ima_post_read_file+0xfa/0x110
 ? __do_sys_finit_module+0xb1/0x110
 __do_sys_finit_module+0xb1/0x110
 unload_network_ops_symbols+0x6c83/0xa860 [falcon_lsm_pinned_15508]
 ? do_syscall_64+0x5b/0x1b0
 ? entry_SYSCALL_64_after_hwframe+0x61/0xc6