Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-02-12
Last occurrence
2023-02-04
Unique reports
1
Quality
-33

Graphs

Statistics

Operating system Unique / Total count
Fedora 35 2 / 2
Fedora 37 1 / 1
Operating system Count
Fedora 35 2
Fedora 37 1
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
? mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
? mutex_lock
vmlinux 0xe
10
mutex_lock
vmlinux 0xe
11
? mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
WARNING: CPU: 1 PID: 1703 at kernel/ucount.c:253 dec_ucount+0x43/0x50
Modules linked in: tun nft_counter uinput isofs snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr ns snd_seq_midi snd_seq_midi_event vsock_loopback vmw_vsock_virtio_transport_common binfmt_misc vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr snd_ens1371 snd_ac97_codec vmw_balloon snd_rawmidi gameport ac97_bus intel_rapl_common snd_seq rapl snd_seq_device snd_pcm joydev pcspkr snd_timer snd soundcore i2c_piix4 vmw_vmci zram ip_tables crct10dif_pclmul crc32_pclmul crc32c_intel vmwgfx ttm ghash_clmulni_intel drm_kms_helper cec drm serio_raw nvme nvme_core vmxnet3 ata_generic pata_acpi fuse
CPU: 1 PID: 1703 Comm: gdbus Not tainted 5.14.10-300.fc35.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:dec_ucount+0x43/0x50
Code: 14 01 48 8b 02 48 89 c6 48 83 ee 01 78 1c f0 48 0f b1 32 75 f0 48 8b 41 10 48 8b 88 e8 01 00 00 48 85 c9 75 d9 e9 fd fc ff ff <0f> 0b eb e7 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 f8 48
RSP: 0018:ffffa8da44edfd00 EFLAGS: 00010286
RAX: 8d642056879202d5 RBX: 00000000000a0001 RCX: ffff99c9c83c10c0
RDX: ffff99c9c83c1120 RSI: 8d642056879202d4 RDI: ffff99c9c83c10c0
RBP: ffff99c9d189f600 R08: 0000000000000060 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff99c984ac8000
R13: ffff99c983bf4a20 R14: ffff99c9c50e5000 R15: ffff99c9ceb98c68
FS:  0000000000000000(0000) GS:ffff99c9fbe40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056189ff9eca8 CR3: 00000000367ba003 CR4: 00000000003706e0
Call Trace:
 fsnotify_put_group+0x2f/0x90
 inotify_release+0x17/0x50
 __fput+0x94/0x240
 task_work_run+0x65/0xa0
 do_exit+0x33d/0xa90
 ? try_to_wake_up+0x51/0x4d0
 do_group_exit+0x33/0xa0
 get_signal+0x16b/0x890
 ? wake_up_q+0x90/0x90
 arch_do_signal_or_restart+0xfd/0x730
 ? __sys_sendmsg+0x68/0x80
 exit_to_user_mode_prepare+0x11a/0x240
 syscall_exit_to_user_mode+0x18/0x40
 do_syscall_64+0x48/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fb064cb07ff
Code: Unable to access opcode bytes at RIP 0x7fb064cb07d5.
RSP: 002b:00007fb056490c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000007
RAX: fffffffffffffdfc RBX: 00007fb0650c0071 RCX: 00007fb064cb07ff
RDX: 00000000ffffffff RSI: 0000000000000003 RDI: 00007fb05002e7e0
RBP: 00007fb05002e7e0 R08: 0000000000000000 R09: 00007fb056490a90
R10: 00007ffeced8c080 R11: 0000000000000293 R12: 0000000000000003
R13: 0000000000000003 R14: 00007fb056490c70 R15: 0000559d24c8eb70