Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #527474
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-07-08
Last occurrence
2022-07-08
Unique reports
1
Quality
-54

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
flush_workqueue
vmlinux 0x15d
2
flush_workqueue
vmlinux 0x15d
3
flush_workqueue
vmlinux 0x15d
4
flush_workqueue
vmlinux 0x15d
5
flush_workqueue
vmlinux 0x15d
6
flush_workqueue
vmlinux 0x15d
7
? flush_workqueue
vmlinux 0x15d
8
? flush_workqueue
vmlinux 0x15d
9
? flush_workqueue
vmlinux 0x15d
10
flush_workqueue
vmlinux 0x15d
11
? flush_workqueue
vmlinux 0x15d
12
flush_workqueue
vmlinux 0x15d
13
flush_workqueue
vmlinux 0x15d
14
flush_workqueue
vmlinux 0x15d
15
? flush_workqueue
vmlinux 0x15d
16
? flush_workqueue
vmlinux 0x15d
17
? flush_workqueue
vmlinux 0x15d
18
? flush_workqueue
vmlinux 0x15d
19
? flush_workqueue
vmlinux 0x15d
20
flush_workqueue
vmlinux 0x15d
kernel BUG at drivers/dma-buf/dma-buf.c:67!
invalid opcode: 0000 [#2] PREEMPT SMP NOPTI
CPU: 11 PID: 18537 Comm: InputThread Tainted: P      D W  OE     5.18.9-200.fc36.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME X370-PRO, BIOS 4008 04/13/2018
RIP: 0010:dma_buf_release+0x89/0x90
Code: c2 75 29 48 8b 7b 78 e8 35 a2 89 ff 48 8b 7b 68 e8 9c aa a3 ff 48 89 df 5b e9 93 aa a3 ff 0f 0b e8 cc 36 00 00 eb cf 5b c3 cc <0f> 0b 0f 0b eb d3 90 0f 1f 44 00 00 48 89 f8 48 89 f7 48 c7 c6 80
RSP: 0018:ffffb1bc88387bf8 EFLAGS: 00010202
RAX: ffffffff92901ff0 RBX: ffff976b69fad400 RCX: 0000000000000001
RDX: 0000000000000015 RSI: ffffffff9366ee24 RDI: ffff97795cf59380
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000064
R10: ffff97795f355d80 R11: ffff97795f355000 R12: ffff97795cf593d8
R13: ffff976a40201560 R14: ffff97795cf59380 R15: ffff976b63408cd0
FS:  00007f03883f0640(0000) GS:ffff97791cac0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb84b31fa78 CR3: 00000008dce10000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 __dentry_kill+0xfe/0x170
 __fput+0xe0/0x250
 task_work_run+0x5c/0x90
 do_exit+0x316/0xae0
 do_group_exit+0x2d/0x90
 get_signal+0x949/0x950
 ? preempt_count_add+0x64/0x90
 ? _raw_write_lock_irq+0x19/0x40
 ? _raw_write_unlock_irq+0x18/0x30
 arch_do_signal_or_restart+0x30/0x740
 ? dequeue_task_stop+0x70/0x70
 exit_to_user_mode_prepare+0x114/0x1f0
 syscall_exit_to_user_mode+0x17/0x40
 do_syscall_64+0x67/0x80
 ? new_sync_write+0x154/0x160
 ? intel_pmu_drain_pebs_nhm+0x470/0x5d0
 ? exit_to_user_mode_prepare+0x17d/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f03a0511bfe
Code: Unable to access opcode bytes at RIP 0x7f03a0511bd4.
RSP: 002b:00007f03883eedf0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e8
RAX: fffffffffffffffc RBX: 00007f03883eee20 RCX: 00007f03a0511bfe
RDX: 0000000000000100 RSI: 00007f03883eee20 RDI: 000000000000002d
RBP: 000055fd7a9a1c70 R08: 0000000000000000 R09: 000055fd7abdb2a0
R10: 00000000ffffffff R11: 0000000000000293 R12: 000055fd795cd720
R13: 000055fd7965fe80 R14: 000055fd7a9a1c30 R15: 000055fd7a9a1c38
 </TASK>
Modules linked in: rpcsec_gss_krb5 tls nvidia_drm(POE) nvidia_modeset(POE) nvidia(POE) snd_seq_dummy snd_hrtimer nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc rpcrdma rdma_cm iw_cm ib_cm ib_core nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security overlay ip_set nfnetlink ebtable_filter ebtables qrtr ip6table_filter ip6_tables iptable_filter ip_tables binfmt_misc tun xfs jfs vfat fat intel_rapl_msr intel_rapl_common uvcvideo snd_usb_audio snd_hda_codec_realtek videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 edac_mce_amd snd_hda_codec_generic
 snd_hda_codec_hdmi videobuf2_common ledtrig_audio snd_usbmidi_lib snd_hda_intel videodev snd_rawmidi snd_intel_dspcfg eeepc_wmi snd_intel_sdw_acpi kvm_amd snd_hda_codec snd_hda_core joydev asus_wmi mc snd_hwdep kvm sparse_keymap snd_seq pktcdvd platform_profile rfkill snd_seq_device snd_pcm irqbypass rapl snd_timer pcspkr video snd soundcore i2c_piix4 wmi_bmof k10temp gpio_amdpt gpio_generic acpi_cpufreq nfsd auth_rpcgss nfs_acl lockd grace sunrpc zram hid_logitech_hidpp crct10dif_pclmul crc32_pclmul crc32c_intel igb ghash_clmulni_intel ccp sp5100_tco mxm_wmi dca hid_logitech_dj wmi target_core_mod ipmi_devintf ipmi_msghandler fuse [last unloaded: vfio]