Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-06-20
Last occurrence
2022-06-20
Unique reports
1
Quality
-49

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
mutex_lock
vmlinux 0xe
10
mutex_lock
vmlinux 0xe
11
mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
16
mutex_lock
vmlinux 0xe
17
mutex_lock
vmlinux 0xe
18
mutex_lock
vmlinux 0xe
19
? mutex_lock
vmlinux 0xe
20
mutex_lock
vmlinux 0xe
21
mutex_lock
vmlinux 0xe
22
mutex_lock
vmlinux 0xe
23
mutex_lock
vmlinux 0xe
kernel BUG at mm/slub.c:321!
invalid opcode: 0000 [#1] SMP PTI
CPU: 5 PID: 1045 Comm: upowerd Tainted: G        W         5.14.10-300.fc35.x86_64 #1
Hardware name: Dell Inc. Inspiron 7591/0JKGD4, BIOS 1.13.0 12/10/2021
RIP: 0010:kmem_cache_free+0x397/0x3f0
Code: b1 4c 89 f7 e8 ea 16 fa ff 0f 0b 4d 89 e9 41 b8 01 00 00 00 4c 89 d1 48 89 da 48 89 ee 4c 89 ff e8 8e bf ff ff e9 1a ff ff ff <0f> 0b 0f 0b 48 8b 47 08 f0 48 83 28 01 0f 85 9a fe ff ff 48 8b 47
RSP: 0018:ffffa4f340e4fb00 EFLAGS: 00010246
RAX: ffff8b03d07db750 RBX: ffff8b03d07db750 RCX: ffff8b03d07db770
RDX: 00000000000170bb RSI: ffffef0cc0000000 RDI: ffff8b03c01e5c00
RBP: ffffef0cc441f6c0 R08: 0000000000000048 R09: 0000000000000000
R10: ffff8b03d07db750 R11: 0000000000000000 R12: ffff8b03d07db750
R13: ffffffffb07186ea R14: ffffef0cc441f6c0 R15: ffff8b03c01e5c00
FS:  00007fbba0f95840(0000) GS:ffff8b0534340000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000015385949c000 CR3: 00000001014e2005 CR4: 00000000003706e0
Call Trace:
 ? acpi_ut_allocate_object_desc_dbg+0x42/0x6e
 acpi_os_release_object+0xa/0x10
 acpi_ut_update_object_reference+0x13b/0x1a7
 acpi_ds_store_object_to_local+0x119/0x168
 acpi_ex_opcode_1A_1T_1R+0x3fc/0x514
 acpi_ds_exec_end_op+0xcb/0x411
 acpi_ps_parse_loop+0x495/0x5bc
 acpi_ps_parse_aml+0x94/0x2c2
 acpi_ps_execute_method+0x15e/0x193
 acpi_ns_evaluate+0x1c6/0x25d
 acpi_evaluate_object+0x12e/0x226
 acpi_battery_get_state+0x83/0x210
 acpi_battery_get_property+0x4b/0x3e0
 power_supply_show_property+0xb2/0x1f0
 dev_attr_show+0x19/0x40
 sysfs_kf_seq_show+0x9b/0xf0
 seq_read_iter+0x120/0x4b0
 new_sync_read+0x105/0x180
 ? selinux_socket_bind+0x90/0x250
 vfs_read+0xf3/0x180
 ksys_read+0x4f/0xc0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbba12babac
Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 77 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 7f 77 f8 ff 48
RSP: 002b:00007ffc5825df90 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 000055feeae2dc60 RCX: 00007fbba12babac
RDX: 0000000000001000 RSI: 000055feeadc4260 RDI: 000000000000000d
RBP: 00007ffc5825e0d0 R08: 0000000000000000 R09: 00007fbba13b0ee0
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000d