Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #527474
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-07-07
Last occurrence
2022-07-07
Unique reports
1
Quality
-54

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
flush_workqueue
vmlinux 0x15d
2
flush_workqueue
vmlinux 0x15d
3
flush_workqueue
vmlinux 0x15d
4
flush_workqueue
vmlinux 0x15d
5
flush_workqueue
vmlinux 0x15d
6
flush_workqueue
vmlinux 0x15d
7
? flush_workqueue
vmlinux 0x15d
8
? flush_workqueue
vmlinux 0x15d
9
? flush_workqueue
vmlinux 0x15d
10
flush_workqueue
vmlinux 0x15d
11
? flush_workqueue
vmlinux 0x15d
12
? flush_workqueue
vmlinux 0x15d
13
flush_workqueue
vmlinux 0x15d
14
flush_workqueue
vmlinux 0x15d
15
flush_workqueue
vmlinux 0x15d
16
? flush_workqueue
vmlinux 0x15d
17
? flush_workqueue
vmlinux 0x15d
18
? flush_workqueue
vmlinux 0x15d
19
? flush_workqueue
vmlinux 0x15d
20
flush_workqueue
vmlinux 0x15d
kernel BUG at drivers/dma-buf/dma-buf.c:67!
invalid opcode: 0000 [#2] PREEMPT SMP NOPTI
CPU: 8 PID: 17503 Comm: InputThread Tainted: P      D W  OE     5.18.9-200.fc36.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME X370-PRO, BIOS 4008 04/13/2018
RIP: 0010:dma_buf_release+0x89/0x90
Code: c2 75 29 48 8b 7b 78 e8 35 a2 89 ff 48 8b 7b 68 e8 9c aa a3 ff 48 89 df 5b e9 93 aa a3 ff 0f 0b e8 cc 36 00 00 eb cf 5b c3 cc <0f> 0b 0f 0b eb d3 90 0f 1f 44 00 00 48 89 f8 48 89 f7 48 c7 c6 80
RSP: 0018:ffffc0a683d8bc30 EFLAGS: 00010202
RAX: ffffffffa2901ff0 RBX: ffff9ee31dbc5400 RCX: 0000000000000001
RDX: 0000000000000077 RSI: ffffffffa366ee24 RDI: ffff9ee64daa4cc0
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000064
R10: ffff9ef19f355d80 R11: ffff9ef19f355000 R12: ffff9ee64daa4d18
R13: ffff9ee2802011a0 R14: ffff9ee64daa4cc0 R15: ffff9ee5f259b590
FS:  00007f2e0aff0640(0000) GS:ffff9ef15ca00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055e4f289e028 CR3: 0000000a58e10000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 __dentry_kill+0xfe/0x170
 __fput+0xe0/0x250
 task_work_run+0x5c/0x90
 do_exit+0x316/0xae0
 do_group_exit+0x2d/0x90
 get_signal+0x949/0x950
 ? preempt_count_add+0x64/0x90
 ? _raw_write_lock_irq+0x19/0x40
 ? _raw_write_unlock_irq+0x18/0x30
 arch_do_signal_or_restart+0x30/0x740
 ? pipe_write+0x156/0x660
 ? dequeue_task_stop+0x70/0x70
 exit_to_user_mode_prepare+0x114/0x1f0
 syscall_exit_to_user_mode+0x17/0x40
 do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x17d/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x17d/0x1f0
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f2e23111bfe
Code: Unable to access opcode bytes at RIP 0x7f2e23111bd4.
RSP: 002b:00007f2e0afeedf0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e8
RAX: fffffffffffffffc RBX: 00007f2e0afeee20 RCX: 00007f2e23111bfe
RDX: 0000000000000100 RSI: 00007f2e0afeee20 RDI: 000000000000002d
RBP: 0000558612c611e0 R08: 0000000000000000 R09: 00000007f2df8008
R10: 00000000ffffffff R11: 0000000000000293 R12: 00005586114ef720
R13: 0000558611581e80 R14: 0000558612c611a0 R15: 0000558612c611a8
 </TASK>
Modules linked in: rpcsec_gss_krb5 tls nvidia_drm(POE) nvidia_modeset(POE) nvidia(POE) snd_seq_dummy snd_hrtimer nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc rpcrdma rdma_cm iw_cm ib_cm ib_core nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set overlay nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables qrtr binfmt_misc tun vfat jfs fat xfs uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 intel_rapl_msr videobuf2_common intel_rapl_common videodev snd_usb_audio snd_hda_codec_realtek snd_usbmidi_lib
 edac_mce_amd snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_rawmidi mc snd_hda_intel kvm_amd snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec joydev pktcdvd kvm snd_hda_core snd_hwdep snd_seq eeepc_wmi asus_wmi snd_seq_device sparse_keymap snd_pcm snd_timer platform_profile irqbypass snd rfkill video soundcore k10temp rapl i2c_piix4 pcspkr wmi_bmof gpio_amdpt gpio_generic acpi_cpufreq nfsd auth_rpcgss nfs_acl lockd grace sunrpc zram hid_logitech_hidpp igb crct10dif_pclmul crc32_pclmul crc32c_intel mxm_wmi ghash_clmulni_intel ccp sp5100_tco dca hid_logitech_dj wmi target_core_mod ipmi_devintf ipmi_msghandler fuse [last unloaded: vfio]