Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-11-04
Last occurrence
2021-11-09
Unique reports
2
Quality
-36

Statistics

Operating system Unique / Total count
Fedora 35 2 / 3
Operating system Count
Fedora 35 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
? mutex_lock
vmlinux 0xe
7
? mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
mutex_lock
vmlinux 0xe
10
? mutex_lock
vmlinux 0xe
11
mutex_lock
vmlinux 0xe
12
? mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
16
mutex_lock
vmlinux 0xe
WARNING: CPU: 1 PID: 1500 at kernel/ucount.c:253 dec_ucount+0x43/0x50
Modules linked in: vboxvideo drm_vram_helper drm_ttm_helper uinput isofs snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr ns sunrpc intel_rapl_msr intel_rapl_common rapl joydev pcspkr i2c_piix4 vboxguest zram ip_tables vmwgfx ttm drm_kms_helper cec crc32c_intel drm e1000 ata_generic serio_raw pata_acpi video fuse
CPU: 1 PID: 1500 Comm: gdbus Not tainted 5.14.10-300.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:dec_ucount+0x43/0x50
Code: 14 01 48 8b 02 48 89 c6 48 83 ee 01 78 1c f0 48 0f b1 32 75 f0 48 8b 41 10 48 8b 88 e8 01 00 00 48 85 c9 75 d9 e9 fd fc ff ff <0f> 0b eb e7 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 f8 48
RSP: 0018:ffffb6f702e43d00 EFLAGS: 00010282
RAX: f28b2d9a8709aee4 RBX: 00000000000a0001 RCX: ffff944ac4ad7d80
RDX: ffff944ac4ad7de0 RSI: f28b2d9a8709aee3 RDI: ffff944ac4ad7d80
RBP: ffff944ac6aa4800 R08: 0000000000000060 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff944ac258b840
R13: ffff944ac11df7e0 R14: ffff944aeb3459c0 R15: ffff944ac68632e8
FS:  0000000000000000(0000) GS:ffff944afec80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ceee9a4a50 CR3: 0000000028e10003 CR4: 00000000000306e0
Call Trace:
 fsnotify_put_group+0x2f/0x90
 inotify_release+0x17/0x50
 __fput+0x94/0x240
 task_work_run+0x65/0xa0
 do_exit+0x33d/0xa90
 ? _raw_spin_unlock_irqrestore+0xa/0x20
 ? try_to_wake_up+0x51/0x4d0
 do_group_exit+0x33/0xa0
 get_signal+0x16b/0x890
 ? wake_up_q+0x90/0x90
 arch_do_signal_or_restart+0xfd/0x730
 ? vfs_read+0x14f/0x180
 exit_to_user_mode_prepare+0x11a/0x240
 syscall_exit_to_user_mode+0x18/0x40
 do_syscall_64+0x48/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f39a0cb97ff
Code: Unable to access opcode bytes at RIP 0x7f39a0cb97d5.
RSP: 002b:00007f398edfea00 EFLAGS: 00000293 ORIG_RAX: 0000000000000007
RAX: fffffffffffffdfc RBX: 00007f39a0fec071 RCX: 00007f39a0cb97ff
RDX: 00000000ffffffff RSI: 0000000000000003 RDI: 00007f3980003760
RBP: 00007f3980003760 R08: 0000000000000000 R09: 00007f398edfe890
R10: 00007ffcc2193080 R11: 0000000000000293 R12: 0000000000000003
R13: 0000000000000003 R14: 00007f398edfea70 R15: 00005651c7d8b5a0