Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #648499
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-03-24
Last occurrence
2022-05-17
Unique reports
17
Quality
-45

Graphs

Statistics

Operating system Unique / Total count
Fedora 33 2 / 2
Fedora 34 17 / 18
Operating system Count
Fedora 34 18
Fedora 33 2
Architecture Count
x86_64 20

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
simple_xattr_alloc
vmlinux 0x2c
2
simple_xattr_alloc
vmlinux 0x2c
3
simple_xattr_alloc
vmlinux 0x2c
4
simple_xattr_alloc
vmlinux 0x2c
5
simple_xattr_alloc
vmlinux 0x2c
6
simple_xattr_alloc
vmlinux 0x2c
7
simple_xattr_alloc
vmlinux 0x2c
8
? simple_xattr_alloc
vmlinux 0x2c
9
? simple_xattr_alloc
vmlinux 0x2c
10
simple_xattr_alloc
vmlinux 0x2c
11
simple_xattr_alloc
vmlinux 0x2c
12
simple_xattr_alloc
vmlinux 0x2c
13
? simple_xattr_alloc
vmlinux 0x2c
14
simple_xattr_alloc
vmlinux 0x2c
15
? simple_xattr_alloc
vmlinux 0x2c
16
? simple_xattr_alloc
vmlinux 0x2c
17
simple_xattr_alloc
vmlinux 0x2c
18
simple_xattr_alloc
vmlinux 0x2c
19
simple_xattr_alloc
vmlinux 0x2c
20
simple_xattr_alloc
vmlinux 0x2c
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 2 PID: 344 Comm: systemd-udevd Not tainted 5.11.7-200.fc33.x86_64 #1
Hardware name: Default string Default string/Default string, BIOS 5.19 03/23/2021
RIP: 0010:strcmp+0xc/0x20
Code: 06 49 89 f8 48 83 c6 01 48 83 c7 01 88 47 ff 84 c0 75 eb 4c 89 c0 c3 0f 1f 80 00 00 00 00 31 c0 eb 08 48 83 c0 01 84 d2 74 0f <0f> b6 14 07 3a 14 06 74 ef 19 c0 83 c8 01 c3 31 c0 c3 66 90 48 89
RSP: 0018:ffff9d5440647c78 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d5440647c58
RDX: 0000000000000000 RSI: ffffffffc047dc8f RDI: 0000000000000000
RBP: ffffffffc04810e0 R08: ffff923fc697fc10 R09: ffff923fc697fc10
R10: 0000000000000000 R11: ffffffff85cdd320 R12: ffffffffc047fc20
R13: 0000000000000000 R14: 0000000000000008 R15: 0000000000010000
FS:  00007f38bbdd7380(0000) GS:ffff92402ff00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000108de8000 CR4: 0000000000350ee0
Call Trace:
 intel_pinctrl_get_soc_data+0x62/0xb0
 intel_pinctrl_probe_by_uid+0xe/0x30
 platform_probe+0x3f/0x90
 really_probe+0xf2/0x440
 driver_probe_device+0xe1/0x150
 device_driver_attach+0xa1/0xb0
 __driver_attach+0x8a/0x150
 ? device_driver_attach+0xb0/0xb0
 ? device_driver_attach+0xb0/0xb0
 bus_for_each_dev+0x64/0x90
 bus_add_driver+0x12b/0x1e0
 driver_register+0x8b/0xe0
 ? 0xffffffffc0484000
 do_one_initcall+0x44/0x1d0
 ? do_init_module+0x23/0x270
 ? kmem_cache_alloc_trace+0xef/0x1e0
 do_init_module+0x5c/0x270
 __do_sys_init_module+0x12a/0x190
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f38bcd4d70e
Code: 48 8b 0d 6d 17 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 af 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 3a 17 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007ffc819ecfd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000af
RAX: ffffffffffffffda RBX: 00005582778500c0 RCX: 00007f38bcd4d70e
RDX: 00007f38bce8335a RSI: 00000000000070f6 RDI: 000055827786f390
RBP: 000055827786f390 R08: 00007f38bb5c1000 R09: 00007ffc819e9f76
R10: 000055827782b010 R11: 0000000000000246 R12: 00007f38bce8335a
R13: 0000558277845800 R14: 0000000000000007 R15: 0000558277850f60
Modules linked in: pinctrl_elkhartlake(+) fjes(-) fuse
CR2: 0000000000000000