Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #374356
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-12-04
Last occurrence
2021-12-04
Unique reports
1
Quality
-21

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Operating system Count
Fedora 34 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_ioctl
vmlinux 0x32
2
security_file_ioctl
vmlinux 0x32
3
security_file_ioctl
vmlinux 0x32
4
security_file_ioctl
vmlinux 0x32
5
security_file_ioctl
vmlinux 0x32
6
security_file_ioctl
vmlinux 0x32
7
security_file_ioctl
vmlinux 0x32
8
security_file_ioctl
vmlinux 0x32
9
security_file_ioctl
vmlinux 0x32
10
security_file_ioctl
vmlinux 0x32
WARNING: CPU: 1 PID: 1808 at block/bdev.c:656 blkdev_flush_mapping+0xfe/0x110
Modules linked in: dm_crypt trusted asn1_encoder i915 i2c_algo_bit ttm drm_kms_helper cec crct10dif_pclmul drm crc32_pclmul crc32c_intel ghash_clmulni_intel r8152 serio_raw mii i2c_hid_acpi i2c_hid wmi video fuse i2c_dev ipmi_devintf ipmi_msghandler
CPU: 1 PID: 1808 Comm: systemd-hiberna Tainted: G          I       5.15.5-100.fc34.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. UX305UA/UX305UA, BIOS UX305UA.201 10/12/2015
RIP: 0010:blkdev_flush_mapping+0xfe/0x110
Code: c6 e8 a3 91 60 00 eb 9b c6 07 00 0f 1f 40 00 48 8b 44 24 20 65 48 2b 04 25 28 00 00 00 75 12 48 83 c4 28 5b 5d 41 5c 41 5d c3 <0f> 0b e9 2b ff ff ff e8 d6 5f 66 00 66 0f 1f 44 00 00 0f 1f 44 00
RSP: 0018:ffff9f4f403d3d58 EFLAGS: 00010202
RAX: 0000000000000002 RBX: ffff896140486a40 RCX: 0000000000000000
RDX: ffff896147c5d080 RSI: 0000000000000001 RDI: ffff896140486a40
RBP: ffff89614119cc00 R08: 0000000000000000 R09: ffff9f4f403d3ae8
R10: ffff9f4f403d3ae0 R11: ffffffffb7d46028 R12: 0000000000000001
R13: ffff896140486a40 R14: ffff89614b4b5d80 R15: ffff89614b4b5da0
FS:  00007f13a8bffb40(0000) GS:ffff8962abc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055587d8080e0 CR3: 000000010b4ce002 CR4: 00000000003706e0
Call Trace:
 <TASK>
 blkdev_put+0x1ba/0x1e0
 load_image_and_restore+0x3e/0x74
 software_resume.part.0.cold+0xaf/0xb9
 resume_store+0xaf/0xd0
 kernfs_fop_write_iter+0x11c/0x1b0
 new_sync_write+0x10b/0x180
 vfs_write+0x1ce/0x260
 ksys_write+0x4f/0xc0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f13a98ab387
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007fffe95994e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f13a98ab387
RDX: 0000000000000006 RSI: 00007fffe95995d0 RDI: 0000000000000004
RBP: 00007fffe95995d0 R08: 0000000000000000 R09: 00007fffe9599447
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006
R13: 000055587ebbf650 R14: 0000000000000006 R15: 00007f13a997e700
 </TASK>