Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-03-02
Last occurrence
2022-03-02
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
? mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
? mutex_lock
vmlinux 0xe
10
? mutex_lock
vmlinux 0xe
11
mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
WARNING: CPU: 0 PID: 1396 at kernel/ucount.c:280 dec_rlimit_ucounts+0x50/0x60
Modules linked in: uinput rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink snd_seq_midi snd_seq_midi_event qrtr ns bnep vsock_loopback vmw_vsock_virtio_transport_common btusb vmw_vsock_vmci_transport vsock btrtl intel_rapl_msr snd_ens1371 btbcm btintel snd_ac97_codec intel_rapl_common sunrpc rapl bluetooth vmw_balloon snd_rawmidi gameport ac97_bus snd_seq snd_seq_device snd_pcm joydev pcspkr snd_timer ecdh_generic rfkill snd vmw_vmci soundcore i2c_piix4 zram ip_tables vmwgfx ttm drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec ghash_clmulni_intel drm serio_raw mptspi scsi_transport_spi e1000 mptscsih mptbase ata_generic pata_acpi fuse
CPU: 0 PID: 1396 Comm: (sd-pam) Tainted: G      D W         5.14.10-300.fc35.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
RIP: 0010:dec_rlimit_ucounts+0x50/0x60
Code: c8 3e 48 0f c1 04 31 48 29 d0 78 1e 48 39 cf 4c 0f 44 c0 48 8b 41 10 48 8b 88 e8 01 00 00 48 85 c9 75 db 4d 85 c0 0f 94 c0 c3 <0f> 0b eb de 31 c0 c3 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 89
RSP: 0018:ffffad18c4e3fc68 EFLAGS: 00010086
RAX: ffffa07e1cdf3f00 RBX: ffffa07e245da7c0 RCX: ffffa07e1abc5200
RDX: 0000000000000001 RSI: 0000000000000090 RDI: ffffa07e1abc5200
RBP: 0000000000000001 R08: ffffffffffffffff R09: ffffffffffffffff
R10: 7fffffffffffffff R11: 0000000000000001 R12: 0000000000000000
R13: ffffa07e1abc5200 R14: 0000000000000a20 R15: 7fffffffffffffff
FS:  0000000000000000(0000) GS:ffffa07e7be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffb1c0c2e20 CR3: 000000004ce10001 CR4: 00000000003706f0
Call Trace:
 __sigqueue_alloc+0x70/0x140
 __send_signal+0x275/0x3d0
 do_notify_parent+0x246/0x280
 do_exit+0x923/0xa90
 do_group_exit+0x33/0xa0
 get_signal+0x16b/0x890
 ? schedule+0x44/0xa0
 arch_do_signal_or_restart+0xfd/0x730
 ? do_sigtimedwait+0x1b0/0x1d0
 ? __x64_sys_rt_sigtimedwait+0x76/0xf0
 exit_to_user_mode_prepare+0x11a/0x240
 syscall_exit_to_user_mode+0x18/0x40
 do_syscall_64+0x48/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7ffb1cb3a3e8
Code: Unable to access opcode bytes at RIP 0x7ffb1cb3a3be.
RSP: 002b:00007ffc08a5d3e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000080
RAX: fffffffffffffffc RBX: 00007ffc08a5d410 RCX: 00007ffb1cb3a3e8
RDX: 0000000000000000 RSI: 00007ffc08a5d410 RDI: 00007ffc08a5d5a0
RBP: 00007ffc08a5d410 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffc08a5d4f8
R13: 00007ffc08a5d5a0 R14: 0000000000000000 R15: 0000000000008000