Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #816182
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-03-28
Last occurrence
2022-03-28
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
? mutex_lock
vmlinux 0xe
9
mutex_lock
vmlinux 0xe
10
? mutex_lock
vmlinux 0xe
11
? mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
WARNING: CPU: 0 PID: 51568 at kernel/ucount.c:253 dec_ucount+0x43/0x50
Modules linked in: vfat fat uas usb_storage usblp uinput isofs snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr ns vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock snd_seq_midi snd_seq_midi_event sunrpc intel_rapl_msr intel_rapl_common rapl snd_ens1371 snd_ac97_codec snd_rawmidi vmw_balloon gameport ac97_bus snd_seq snd_seq_device snd_pcm snd_timer pcspkr joydev snd soundcore vmw_vmci i2c_piix4 zram ip_tables vmwgfx ttm drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel serio_raw e1000 mptspi scsi_transport_spi mptscsih ata_generic mptbase pata_acpi fuse
CPU: 0 PID: 51568 Comm: pool-org.gnome. Not tainted 5.14.10-300.fc35.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
RIP: 0010:dec_ucount+0x43/0x50
Code: 14 01 48 8b 02 48 89 c6 48 83 ee 01 78 1c 3e 48 0f b1 32 75 f0 48 8b 41 10 48 8b 88 e8 01 00 00 48 85 c9 75 d9 e9 fd fc ff ff <0f> 0b eb e7 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 f8 48
RSP: 0018:ffffaaeb8555fd00 EFLAGS: 00010282
RAX: ceacdc90e718e539 RBX: 00000000000a0001 RCX: ffff8d1fcb9c3440
RDX: ffff8d1fcb9c34a0 RSI: ceacdc90e718e538 RDI: ffff8d1fcb9c3440
RBP: ffff8d1fd156bb00 R08: 0000000000000060 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffff8d1f84e4b138
R13: ffff8d1f81207d60 R14: ffff8d1fa356ce40 R15: ffff8d1fa4efb428
FS:  0000000000000000(0000) GS:ffff8d2024200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7b4c00a008 CR3: 000000004b9f2001 CR4: 00000000003706f0
Call Trace:
 fsnotify_put_group+0x2f/0x90
 inotify_release+0x17/0x50
 __fput+0x94/0x240
 task_work_run+0x65/0xa0
 do_exit+0x33d/0xa90
 do_group_exit+0x33/0xa0
 get_signal+0x16b/0x890
 ? calibrate_delay+0x452/0x460
 arch_do_signal_or_restart+0xfd/0x730
 ? __sys_getpeername+0xce/0xe0
 ? __x64_sys_futex+0x63/0x1a0
 exit_to_user_mode_prepare+0x11a/0x240
 syscall_exit_to_user_mode+0x18/0x40
 do_syscall_64+0x48/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f99bb312f3d
Code: Unable to access opcode bytes at RIP 0x7f99bb312f13.
RSP: 002b:00007f998f7fda38 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000000 RBX: 0000000000000031 RCX: 00007f99bb312f3d
RDX: 0000000000000031 RSI: 0000000000000080 RDI: 0000559d6a307d50
RBP: 0000559d6a307d48 R08: 0000000000000000 R09: 00000000000350d4
R10: 00007f998f7fda50 R11: 0000000000000246 R12: 0000559d6a307d40
R13: 0000000000000001 R14: 0000559d6a307d48 R15: 0000000000000000