Kerneloops

Similar reports
Problem #380
Component
kernel Tainted
Last affected version
0:4.18.0-513.9.1.el8_9
Executable
unknown
First occurrence
2024-04-26
Last occurrence
2024-04-26
Unique reports
1
Quality
-68
Associate bug
If you don't consider this report useful, you can archive it and it won't be displayed on reports dashboard.

Statistics

Operating system Unique / Total count
AlmaLinux 8.9 1 / 1
Operating system Count
AlmaLinux 8.9 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:4.18.0-513.9.1.el8_9 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? __warn
vmlinux 0x94
2
? ext4_handle_error
ext4 0x45
3
? ext4_handle_error
ext4 0x45
4
? __warn
vmlinux 0x94
5
? __warn
vmlinux 0x94
6
? __warn
vmlinux 0x94
7
? ext4_handle_error
ext4 0x45
8
? __warn
vmlinux 0x94
9
? ext4_handle_error
ext4 0x45
10
? ext4_handle_error
ext4 0x45
11
ext4_handle_error
ext4 0x45
12
ext4_handle_error
ext4 0x45
13
? __warn
vmlinux 0x94
14
? __warn
vmlinux 0x94
15
? __warn
vmlinux 0x94
16
__warn
vmlinux 0x94
17
? __warn
vmlinux 0x94
18
? __warn
vmlinux 0x94
19
__warn
vmlinux 0x94
20
ext4_handle_error
ext4 0x45
21
__warn
vmlinux 0x94
22
__warn
vmlinux 0x94
23
__warn
vmlinux 0x94
24
__warn
vmlinux 0x94
25
__warn
vmlinux 0x94
WARNING: CPU: 11 PID: 1344582 at fs/ext4/ext4_jbd2.c:53 ext4_journal_check_start+0x50/0x90 [ext4]
Modules linked in: snumbd26(OE) snapapi26(OE) kcare(OE) dm_mod xt_owner xt_nat ip_set_bitmap_port ip_set_list_set xt_NFLOG xt_set ip_set_hash_net ip6t_REJECT nf_reject_ipv6 nft_limit ip_set nf_nat_ftp iptable_nat xt_REDIRECT xt_conntrack iptable_mangle nf_conntrack_ftp xt_LOG nf_log_syslog xt_limit iptable_filter ip_tables xt_multiport nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_counter ipt_REJECT nf_reject_ipv4 nft_compat nf_tables libcrc32c binfmt_misc nfnetlink_log snd_hda_codec_generic intel_rapl_msr ledtrig_audio intel_rapl_common nfnetlink intel_uncore_frequency_common isst_if_common nfit snd_hda_intel libnvdimm snd_intel_dspcfg snd_intel_sdw_acpi kvm_intel snd_hda_codec kvm iTCO_wdt qxl irqbypass iTCO_vendor_support drm_ttm_helper snd_hda_core ttm crct10dif_pclmul crc32_pclmul snd_hwdep drm_kms_helper snd_pcm snd_timer ghash_clmulni_intel syscopyarea joydev rapl snd sysfillrect sysimgblt soundcore drm i2c_i801 pcspkr lpc_ich virtio_balloon ext4
 mbcache jbd2 sr_mod cdrom sg ahci libahci crc32c_intel libata virtio_net virtio_console net_failover serio_raw virtio_blk failover [last unloaded: edd]
CPU: 11 PID: 1344582 Comm: imunify-realtim Kdump: loaded Tainted: G        W  OE    --------- -  - 4.18.0-513.9.1.el8_9.x86_64 #1
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+3346+68867adb 04/01/2014
RIP: 0010:ext4_journal_check_start+0x50/0x90 [ext4]
Code: f6 43 50 01 75 53 83 bb 30 02 00 00 04 74 1b 48 8b 92 18 02 00 00 31 c0 48 85 d2 74 07 8b 02 83 e0 02 75 0a 5b e9 70 c4 e3 e5 <0f> 0b eb e1 8b 4a 08 48 89 df 49 c7 c0 48 66 22 c0 ba 3d 00 00 00
RSP: 0018:ffffadff477d3bd0 EFLAGS: 00010246
RAX: 00000000fffffffb RBX: ffff8f3204197800 RCX: 0000000000000000
RDX: ffff8f3204192800 RSI: 0000000000000b30 RDI: ffff8f3204197800
RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000008
R10: 0000000000000002 R11: ffffffffffffffff R12: 0000000000000000
R13: 0000000000000008 R14: ffffffffc01e33d4 R15: 0000000000000000
FS:  00007fca07fff700(0000) GS:ffff8f44efcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000096d1800 CR3: 00000002bd1ec003 CR4: 0000000000770ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 ? __warn+0x94/0xe0
 ? ext4_journal_check_start+0x50/0x90 [ext4]
 ? ext4_journal_check_start+0x50/0x90 [ext4]
 ? report_bug.kpatch+0x7c/0xdb
 ? do_error_trap+0x9e/0xd0
 ? do_invalid_op+0x36/0x40
 ? ext4_journal_check_start+0x50/0x90 [ext4]
 ? invalid_op+0x14/0x20
 ? ext4_writepages+0x554/0xf30 [ext4]
 ? ext4_journal_check_start+0x50/0x90 [ext4]
 __ext4_journal_start_sb+0x37/0x140 [ext4]
 ext4_writepages+0x554/0xf30 [ext4]
 ? finish_task_switch+0x86/0x2f0
 ? sched_clock+0x5/0x10
 ? do_writepages+0xc6/0x1d0
 do_writepages+0xc6/0x1d0
 ? wake_up_q+0x3d/0x70
 ? futex_wake+0x144/0x160
 __filemap_fdatawrite_range+0xcb/0x100
 ext4_release_file+0x70/0xb0 [ext4]
 __fput+0xbe/0x250
 task_work_run+0x8a/0xb0
 exit_to_usermode_loop+0xef/0x100
 do_syscall_64+0x19c/0x1b0
 entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x4cb1db
Code: fa ff eb bd e8 86 81 fa ff e9 61 ff ff ff cc e8 5b 50 fa ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30
RSP: 002b:000000c0000b7d80 EFLAGS: 00000206 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 000000c000020000 RCX: 00000000004cb1db
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000f
RBP: 000000c0000b7dc0 R08: 0000000000000044 R09: 0000000000000008
R10: 00000000009235b0 R11: 0000000000000206 R12: 0000000000000001
R13: 0000000000000001 R14: 00000000000000aa R15: ffffffffffffffff