Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #526963
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-29
Last occurrence
2021-06-30
Unique reports
5
Quality
-29

Statistics

Operating system Unique / Total count
Fedora 34 5 / 6
Operating system Count
Fedora 34 6
Architecture Count
x86_64 6

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
try_to_wake_up
vmlinux 0x1c1
2
try_to_wake_up
vmlinux 0x1c1
3
try_to_wake_up
vmlinux 0x1c1
4
? try_to_wake_up
vmlinux 0x1c1
5
try_to_wake_up
vmlinux 0x1c1
6
? try_to_wake_up
vmlinux 0x1c1
7
? try_to_wake_up
vmlinux 0x1c1
8
? try_to_wake_up
vmlinux 0x1c1
9
try_to_wake_up
vmlinux 0x1c1
10
try_to_wake_up
vmlinux 0x1c1
11
try_to_wake_up
vmlinux 0x1c1
12
try_to_wake_up
vmlinux 0x1c1
general protection fault, probably for non-canonical address 0x8a544f907d6ee6ef: 0000 [#5] SMP NOPTI
CPU: 1 PID: 1355 Comm: systemd-udevd Tainted: G      D           5.11.16-300.fc34.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. TRX40 AORUS XTREME/TRX40 AORUS XTREME, BIOS F4l 09/25/2020
RIP: 0010:kmem_cache_alloc+0x79/0x1e0
Code: e0 d1 78 49 8b 00 49 83 78 10 00 48 89 04 24 0f 84 5e 01 00 00 48 85 c0 0f 84 55 01 00 00 41 8b 4c 24 28 49 8b 3c 24 48 01 c1 <48> 8b 19 48 89 ce 49 33 9c 24 b8 00 00 00 48 0f ce 48 31 f3 40 f6
RSP: 0018:ffffa9cd83dd3cc0 EFLAGS: 00010282
RAX: 8a544f907d6ee677 RBX: 0000000000008000 RCX: 8a544f907d6ee6ef
RDX: 0000000000000659 RSI: 0000000000000dc0 RDI: 0000000000030710
RBP: 0000000000000dc0 R08: ffff8c13bd070710 R09: 0000000000000006
R10: 0000000000000020 R11: 0000000000000000 R12: ffff8bf50024d100
R13: ffffffff8732eda3 R14: ffff8bf50024d100 R15: 0000000000000000
FS:  00007fabd4869b40(0000) GS:ffff8c13bd040000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055dee4958a48 CR3: 000000012299a000 CR4: 0000000000350ee0
Call Trace:
 __alloc_file+0x23/0xe0
 alloc_empty_file+0x40/0xb0
 path_openat+0x3b/0xf20
 ? __import_iovec+0x4a/0x170
 do_filp_open+0x7e/0x110
 ? ep_done_scan+0xc4/0xe0
 ? do_epoll_wait+0x74c/0x760
 ? __check_object_size+0x136/0x150
 do_sys_openat2+0x7a/0x130
 __x64_sys_openat+0x45/0x70
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fabd556301b
Code: 25 00 00 41 00 3d 00 00 41 00 74 4b 64 8b 04 25 18 00 00 00 85 c0 75 67 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 91 00 00 00 48 8b 54 24 28 64 48 2b 14 25
RSP: 002b:00007ffe89663b00 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fabd556301b
RDX: 0000000000080000 RSI: 00007ffe89663c80 RDI: 00000000ffffff9c
RBP: 00007ffe89663c80 R08: 00007fabd583f8a0 R09: 00ea365e89881424
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080000
R13: 00007ffe89663c80 R14: 000055dee49203a0 R15: 0000000000000000
Modules linked in: zram ip_tables dm_crypt hid_logitech_hidpp ixgbe mdio dca nouveau video i2c_algo_bit drm_ttm_helper ttm crct10dif_pclmul crc32_pclmul drm_kms_helper crc32c_intel ghash_clmulni_intel cec drm nvme ccp mxm_wmi nvme_core sp5100_tco wmi pinctrl_amd hid_logitech_dj fuse