Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #779495
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-06-09
Last occurrence
2022-06-09
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
drm_helper_probe_detect_ctx
vmlinux 0x31
2
? drm_helper_probe_detect_ctx
vmlinux 0x31
3
? drm_helper_probe_detect_ctx
vmlinux 0x31
4
? drm_helper_probe_detect_ctx
vmlinux 0x31
5
? drm_helper_probe_detect_ctx
vmlinux 0x31
6
drm_helper_probe_detect_ctx
vmlinux 0x31
7
? drm_helper_probe_detect_ctx
vmlinux 0x31
8
drm_helper_probe_detect_ctx
vmlinux 0x31
9
drm_helper_probe_detect_ctx
vmlinux 0x31
10
drm_helper_probe_detect_ctx
vmlinux 0x31
11
? drm_helper_probe_detect_ctx
vmlinux 0x31
12
drm_helper_probe_detect_ctx
vmlinux 0x31
13
drm_helper_probe_detect_ctx
vmlinux 0x31
14
drm_helper_probe_detect_ctx
vmlinux 0x31
15
drm_helper_probe_detect_ctx
vmlinux 0x31
WARNING: CPU: 0 PID: 1371 at kernel/kthread.c:76 get_kthread_comm+0x30/0x40
Modules linked in: tls vhost_net vhost vhost_iotlb tap xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nf_conntrack_tftp bridge stp llc tun rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof dell_rbtn intel_tcc_cooling vfat x86_pkg_temp_thermal snd_hda_codec_hdmi snd_soc_hdac_hda intel_powerclamp iTCO_wdt snd_hda_ext_core fat intel_pmc_bxt ee1004 coretemp iTCO_vendor_support mei_wdt mei_hdcp mei_pxp dell_laptop intel_rapl_msr snd_ctl_led iwlmvm snd_soc_acpi_intel_match kvm_intel snd_soc_acpi soundwire_bus mac80211 kvm
 snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic irqbypass libarc4 snd_compress intel_cstate ac97_bus snd_pcm_dmaengine intel_uncore snd_hda_intel dell_wmi snd_intel_dspcfg pcspkr ledtrig_audio snd_intel_sdw_acpi btusb dell_wmi_sysman dell_smbios snd_usb_audio btrtl firmware_attributes_class uvcvideo snd_hda_codec dcdbas btbcm iwlwifi snd_usbmidi_lib videobuf2_vmalloc btintel videobuf2_memops snd_rawmidi videobuf2_v4l2 e1000e dell_wmi_descriptor snd_hda_core wmi_bmof videobuf2_common btmtk snd_seq i2c_i801 snd_hwdep i2c_smbus iwlmei videodev bluetooth snd_seq_device mei_me joydev idma64 snd_pcm cfg80211 mc r8153_ecm snd_timer ecdh_generic cdc_ether snd usbnet rfkill soundcore r8152 mei processor_thermal_device_pci_legacy thunderbolt mii processor_thermal_device processor_thermal_rfim processor_thermal_mbox processor_thermal_rapl intel_rapl_common intel_soc_dts_iosf igen6_edac int3403_thermal int340x_thermal_zone int3400_thermal intel_hid acpi_thermal_rel
 sparse_keymap acpi_pad acpi_tad zram dm_crypt typec_displayport hid_sensor_hub intel_ishtp_hid i915 rtsx_pci_sdmmc nouveau mmc_core nvme crct10dif_pclmul crc32_pclmul hid_multitouch drm_ttm_helper intel_ish_ipc crc32c_intel ucsi_acpi mxm_wmi nvme_core ghash_clmulni_intel serio_raw rtsx_pci typec_ucsi ttm intel_ishtp typec i2c_hid_acpi i2c_hid video wmi pinctrl_tigerlake ip6_tables ip_tables ipmi_devintf ipmi_msghandler fuse
CPU: 0 PID: 1371 Comm: wdavdaemon Tainted: G        W         5.17.12-300.fc36.x86_64 #1
Hardware name: Dell Inc. Latitude 5520/0DKMM3, BIOS 1.18.1 04/14/2022
RIP: 0010:get_kthread_comm+0x30/0x40
Code: 42 2e 20 74 25 48 8b 82 a8 0a 00 00 48 85 c0 74 14 48 8b 40 68 48 85 c0 74 0b 48 89 f2 48 89 c6 e9 45 61 56 00 e9 20 81 26 00 <0f> 0b eb d7 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 41
RSP: 0018:ffffb0cd423e7cd0 EFLAGS: 00010246
RAX: 0000000000208040 RBX: ffff91cc813bdd98 RCX: 0000000000000000
RDX: ffff91d1896f4000 RSI: 0000000000000040 RDI: ffffb0cd423e7cd8
RBP: 0000000000000001 R08: 0000000000001000 R09: ffff91ce31dfbab0
R10: 0000000000000000 R11: 0000000000000000 R12: ffffb0cd423e7cd8
R13: ffff91d191b80b80 R14: ffffffff89e5d360 R15: 0000000000000000
FS:  00007fbb8cffe640(0000) GS:ffff91d3ef600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6f70840c08 CR3: 000000013ca6e004 CR4: 0000000000772ef0
PKRU: 55555554
Call Trace:
 <TASK>
 proc_task_name+0xa0/0xd0
 ? __mod_memcg_lruvec_state+0xa8/0xc0
 ? preempt_count_add+0x64/0x90
 ? _raw_spin_lock+0x13/0x40
 ? _raw_spin_unlock+0x16/0x30
 proc_pid_status+0x53/0xbe0
 ? memcg_slab_post_alloc_hook+0x181/0x280
 proc_single_show+0x4d/0xb0
 seq_read_iter+0x11c/0x450
 seq_read+0xed/0x120
 ? 0xffffffff88000000
 vfs_read+0x94/0x190
 ksys_read+0x53/0xd0
 do_syscall_64+0x37/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbb8d100bac
Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 77 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 7f 77 f8 ff 48
RSP: 002b:00007fbb6c092b20 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007fbb6c092b80 RCX: 00007fbb8d100bac
RDX: 0000000000001fff RSI: 00007fbb6c092b80 RDI: 000000000000002d
RBP: 00007fbb6c094bb0 R08: 0000000000000000 R09: 00007fbb6c094987
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000002d R14: 00007fbb6c094c50 R15: 0000000000000000
 </TASK>