Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-03
Last occurrence
2021-06-03
Unique reports
1
Quality
-47

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
? _raw_spin_lock_irq
vmlinux 0x21
5
? _raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
_raw_spin_lock_irq
vmlinux 0x21
8
_raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
_raw_spin_lock_irq
vmlinux 0x21
12
_raw_spin_lock_irq
vmlinux 0x21
13
? _raw_spin_lock_irq
vmlinux 0x21
14
? _raw_spin_lock_irq
vmlinux 0x21
15
? _raw_spin_lock_irq
vmlinux 0x21
16
_raw_spin_lock_irq
vmlinux 0x21
17
? _raw_spin_lock_irq
vmlinux 0x21
18
_raw_spin_lock_irq
vmlinux 0x21
19
_raw_spin_lock_irq
vmlinux 0x21
general protection fault, probably for non-canonical address 0x687a10336ebb7c49: 0000 [#5] SMP NOPTI
CPU: 2 PID: 784 Comm: (mount) Tainted: G      D           5.11.12-300.fc34.x86_64 #1
Hardware name: Terrans Force AMD/AMD, BIOS 1.07.06TBPC2 06/03/2020
RIP: 0010:kmem_cache_alloc+0x79/0x1e0
Code: e2 d1 78 49 8b 00 49 83 78 10 00 48 89 04 24 0f 84 5e 01 00 00 48 85 c0 0f 84 55 01 00 00 41 8b 4c 24 28 49 8b 3c 24 48 01 c1 <48> 8b 19 48 89 ce 49 33 9c 24 b8 00 00 00 48 0f ce 48 31 f3 40 f6
RSP: 0018:ffffacd58119fb80 EFLAGS: 00010202
RAX: 687a10336ebb7be9 RBX: ffffacd58119fdf0 RCX: 687a10336ebb7c49
RDX: 0000000000004664 RSI: 0000000000000cc0 RDI: 00000000000306d0
RBP: 0000000000000cc0 R08: ffff8f30de6b06d0 R09: 0000000000000064
R10: 0000000000000000 R11: 968b9e9cffcbc7c8 R12: ffff8f220021ed00
R13: ffffffff87347142 R14: ffff8f220021ed00 R15: 0000000000000019
FS:  00007fb346255340(0000) GS:ffff8f30de680000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005626b81a8a40 CR3: 00000001106a0000 CR4: 0000000000350ee0
Call Trace:
 __d_alloc+0x22/0x1e0
 d_alloc+0x1b/0xa0
 d_alloc_parallel+0x46/0x480
 ? sprintf+0x46/0x50
 ? __legitimize_path+0x27/0x50
 ? legitimize_links+0x40/0xb0
 __lookup_slow+0x4b/0x130
 walk_component+0x11b/0x190
 link_path_walk.part.0.constprop.0+0x1ae/0x350
 ? path_init+0x2bd/0x3e0
 path_lookupat+0x3a/0x1b0
 filename_lookup+0x9b/0x180
 ? simple_attr_release+0x20/0x20
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 do_faccessat+0x6e/0x240
 ? __audit_syscall_exit+0x24d/0x2a0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fb346da886b
Code: 77 05 c3 0f 1f 40 00 48 8b 15 01 16 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 0f 1f 40 00 f3 0f 1e fa b8 15 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 d1 15 0d 00 f7 d8
RSP: 002b:00007ffd18a82f18 EFLAGS: 00000206 ORIG_RAX: 0000000000000015
RAX: ffffffffffffffda RBX: 00007ffd18a82fd0 RCX: 00007fb346da886b
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007ffd18a82f20
RBP: 0000000000000001 R08: 0000000000000000 R09: 00007ffd18a82db0
R10: 0000000000000003 R11: 0000000000000206 R12: 00007ffd18a82f20
R13: 00007ffd18a834c0 R14: 00005626b9fb93b0 R15: 0000000000000000
Modules linked in: zram ip_tables nouveau i2c_algo_bit drm_ttm_helper ttm rtsx_pci_sdmmc drm_kms_helper mmc_core mxm_wmi cec crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel serio_raw ccp nvme r8169 rtsx_pci nvme_core wmi video i2c_hid pinctrl_amd fuse