Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #527474
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-07-07
Last occurrence
2022-07-07
Unique reports
1
Quality
-55

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? flush_workqueue
vmlinux 0x15d
2
flush_workqueue
vmlinux 0x15d
3
? flush_workqueue
vmlinux 0x15d
4
flush_workqueue
vmlinux 0x15d
5
flush_workqueue
vmlinux 0x15d
6
? flush_workqueue
vmlinux 0x15d
7
? flush_workqueue
vmlinux 0x15d
8
flush_workqueue
vmlinux 0x15d
9
? flush_workqueue
vmlinux 0x15d
10
flush_workqueue
vmlinux 0x15d
11
? flush_workqueue
vmlinux 0x15d
12
flush_workqueue
vmlinux 0x15d
13
? flush_workqueue
vmlinux 0x15d
14
? flush_workqueue
vmlinux 0x15d
15
flush_workqueue
vmlinux 0x15d
16
flush_workqueue
vmlinux 0x15d
17
flush_workqueue
vmlinux 0x15d
18
flush_workqueue
vmlinux 0x15d
19
? flush_workqueue
vmlinux 0x15d
20
? flush_workqueue
vmlinux 0x15d
21
flush_workqueue
vmlinux 0x15d
22
flush_workqueue
vmlinux 0x15d
WARNING: CPU: 0 PID: 313 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x5d5/0x670
Modules linked in: xfs firewire_ohci crct10dif_pclmul ata_generic crc32_pclmul mxm_wmi crc32c_intel r8169 ghash_clmulni_intel uas pata_acpi usb_storage serio_raw video wmi firewire_core pata_marvell crc_itu_t ip6_tables ip_tables ipmi_devintf ipmi_msghandler fuse
CPU: 0 PID: 313 Comm: systemd-udevd Tainted: G      D           5.18.9-200.fc36.x86_64 #1
Hardware name: System manufacturer System Product Name/P8P67 LE, BIOS 3801 09/12/2013
RIP: 0010:rcu_note_context_switch+0x5d5/0x670
Code: 00 00 00 00 0f 85 72 fd ff ff 49 89 bc 24 a0 00 00 00 e9 65 fd ff ff 48 c7 c7 a8 b0 61 8d c6 05 11 93 fd 01 01 e8 e6 96 b5 00 <0f> 0b e9 82 fa ff ff 49 83 bc 24 98 00 00 00 00 49 8b 84 24 a0 00
RSP: 0018:ffffa6d6c09afc18 EFLAGS: 00010096
RAX: 000000000000003f RBX: ffff95e514c32780 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffff8d66ee24 RDI: 00000000ffffffff
RBP: 0000000000000000 R08: ffffffff8de653a0 R09: ffffa6d6c09afbb8
R10: 3fffffffffffffff R11: 000000002d2d2d2d R12: ffffa6d6c09afdf8
R13: ffff95e51d7927c0 R14: 0000000000000002 R15: ffff95e51d7927c0
FS:  0000000000000000(0000) GS:ffff95e514c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3c3140b000 CR3: 00000001b6e10006 CR4: 00000000000606f0
Call Trace:
 <TASK>
 ? enqueue_entity+0x188/0x4f0
 __schedule+0x9d/0x1250
 ? resched_curr+0x20/0xb0
 schedule+0x4e/0xb0
 schedule_timeout+0xed/0x130
 ? memcg_slab_free_hook+0x19c/0x220
 ? preempt_count_add+0x64/0x90
 __wait_for_common+0x84/0x1a0
 ? usleep_range_state+0x60/0x60
 __flush_work.isra.0+0x152/0x1f0
 ? flush_workqueue_prep_pwqs+0x110/0x110
 fsnotify_destroy_group+0x44/0xb0
 ? proc_nr_files+0x30/0x30
 ? call_rcu+0xfd/0x680
 inotify_release+0x17/0x50
 __fput+0x91/0x250
 task_work_run+0x5c/0x90
 do_exit+0x316/0xae0
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 make_task_dead+0x51/0x60
 rewind_stack_and_make_dead+0x17/0x17
RIP: 0033:0x7fa8bd117317
Code: Unable to access opcode bytes at RIP 0x7fa8bd1172ed.
RSP: 002b:00007ffc55a92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fa8bd117317
RDX: 0000000000000000 RSI: 000055eabfc37528 RDI: 0000000000000006
RBP: 00007fa8bc569420 R08: 00007fa8bd20d310 R09: 00000000fffffffe
R10: 0000000000001000 R11: 0000000000000246 R12: 000055eac063f870
R13: 0000000000000008 R14: 000055eabfc374a9 R15: 000055eac063f870
 </TASK>