Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-05
Last occurrence
2021-06-05
Unique reports
1
Quality
-29

Statistics

Operating system Unique / Total count
Fedora 34 1 / 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0x3e2
2
kfree
vmlinux 0x3e2
3
kfree
vmlinux 0x3e2
4
kfree
vmlinux 0x3e2
5
? kfree
vmlinux 0x3e2
6
kfree
vmlinux 0x3e2
7
kfree
vmlinux 0x3e2
8
kfree
vmlinux 0x3e2
9
kfree
vmlinux 0x3e2
10
kfree
vmlinux 0x3e2
11
kfree
vmlinux 0x3e2
12
kfree
vmlinux 0x3e2
13
kfree
vmlinux 0x3e2
14
kfree
vmlinux 0x3e2
WARNING: CPU: 12 PID: 448 at arch/x86/include/asm/kfence.h:44 kfence_protect_page+0x21/0x80
Modules linked in: hid_logitech_hidpp hid_logitech_dj nouveau drm_ttm_helper ttm i2c_algo_bit drm_kms_helper crct10dif_pclmul cec crc32_pclmul crc32c_intel nvme mxm_wmi drm e1000e ghash_clmulni_intel nvme_core wmi video fuse
CPU: 12 PID: 448 Comm: systemd-udevd Not tainted 5.12.8-300.fc34.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME Z370-A, BIOS 2401 07/12/2019
RIP: 0010:kfence_protect_page+0x21/0x80
Code: ff 0f 1f 84 00 00 00 00 00 55 48 89 fd 53 89 f3 48 83 ec 08 48 8d 74 24 04 e8 db e0 d7 ff 48 85 c0 74 07 83 7c 24 04 01 74 0b <0f> 0b 48 83 c4 08 31 c0 5b 5d c3 48 8b 38 48 89 c2 84 db 75 36 48
RSP: 0018:ffffaaa9807cfc10 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffaaa9807cfc14
RDX: ffffaaa9807cfc14 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002
R13: ffffaaa9807cfcb8 R14: 0000000000000108 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8a696ed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000108 CR3: 000000010b09c006 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 kfence_unprotect+0x13/0x30
 page_fault_oops+0x89/0x270
 exc_page_fault+0x67/0x150
 asm_exc_page_fault+0x1e/0x30
RIP: 0010:down_write+0x15/0x40
Code: 5d 48 3d 01 f0 ff ff 19 c0 f7 d0 83 e0 fc c3 66 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 fd e8 e2 e3 ff ff 31 c0 ba 01 00 00 00 <f0> 48 0f b1 55 00 75 0f 65 48 8b 04 25 c0 7b 01 00 48 89 45 08 5d
RSP: 0018:ffffaaa9807cfd68 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8a624b071100 RCX: ffff8a624b071110
RDX: 0000000000000001 RSI: ffff8a62448475d8 RDI: 0000000000000108
RBP: 0000000000000108 R08: 00007f963658e000 R09: ffff8a624b030000
R10: ffff8a624b0c0200 R11: 0000000000000001 R12: ffff8a624b071090
R13: ffff8a624b0a9338 R14: ffff8a624b0744d0 R15: ffff8a624b071080
 ? down_write+0xe/0x40
 unlink_anon_vmas+0xb1/0x1e0
 free_pgtables+0x93/0x100
 exit_mmap+0x9d/0x1a0
 mmput+0x61/0x140
 do_exit+0x2fe/0xab0
 do_group_exit+0x33/0xa0
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f9636ce8021
Code: Unable to access opcode bytes at RIP 0x7f9636ce7ff7.
RSP: 002b:00007ffc065cfb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9636ce8021
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 00007ffc065cfc00 R08: fffffffffffffea0 R09: 0000000000000004
R10: 0000000000000018 R11: 0000000000000246 R12: 00007ffc065cfb90
R13: 000055ac6a5bc5b0 R14: 0000000000000000 R15: 000055ac6a5d6430