Kerneloops

Similar reports
Problem #640641
Component
kernel
Last affected version
0:5.11.12-300.fc34
Executable
unknown
First occurrence
2022-10-18
Last occurrence
2022-10-18
Unique reports
1
Quality
-54

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:5.11.12-300.fc34 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
_raw_spin_lock_irq
vmlinux 0x21
5
_raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
? _raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
13
? _raw_spin_lock_irq
vmlinux 0x21
14
? _raw_spin_lock_irq
vmlinux 0x21
15
? _raw_spin_lock_irq
vmlinux 0x21
16
? _raw_spin_lock_irq
vmlinux 0x21
17
? _raw_spin_lock_irq
vmlinux 0x21
18
? _raw_spin_lock_irq
vmlinux 0x21
19
_raw_spin_lock_irq
vmlinux 0x21
20
_raw_spin_lock_irq
vmlinux 0x21
21
_raw_spin_lock_irq
vmlinux 0x21
general protection fault, probably for non-canonical address 0x6675c00a174a2bf0: 0000 [#1] SMP NOPTI
CPU: 8 PID: 669 Comm: systemd-udevd Not tainted 5.11.12-300.fc34.x86_64 #1
Hardware name: Dell Inc. Precision 3640 Tower/0D4MD1, BIOS 1.2.3 08/06/2020
RIP: 0010:kmem_cache_alloc+0x79/0x1e0
Code: e2 d1 6c 49 8b 00 49 83 78 10 00 48 89 04 24 0f 84 5e 01 00 00 48 85 c0 0f 84 55 01 00 00 41 8b 4c 24 28 49 8b 3c 24 48 01 c1 <48> 8b 19 48 89 ce 49 33 9c 24 b8 00 00 00 48 0f ce 48 31 f3 40 f6
RSP: 0018:ffffa784c08dfb90 EFLAGS: 00010206
RAX: 6675c00a174a2b80 RBX: ffff8a0f8bf43500 RCX: 6675c00a174a2bf0
RDX: 0000000000000125 RSI: 0000000000000cc0 RDI: 00000000000319e0
RBP: 0000000000000cc0 R08: ffff8a16dd2319e0 R09: 0000000000000000
R10: 0000000000000000 R11: 000000007ffff000 R12: ffff8a0f80220d00
R13: ffffffff939938a6 R14: ffff8a0f80220d00 R15: ffff8a0f897d3800
FS:  00007fd6d7995b40(0000) GS:ffff8a16dd200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe394016948 CR3: 0000000105104002 CR4: 00000000007706e0
PKRU: 55555554
Call Trace:
 skb_clone+0x56/0x1f0
 netlink_broadcast_filtered+0x384/0x490
 netlink_sendmsg+0x380/0x440
 sock_sendmsg+0x5e/0x60
 ____sys_sendmsg+0x22c/0x270
 ? import_iovec+0x17/0x20
 ? sendmsg_copy_msghdr+0x59/0x90
 ? security_inode_permission+0x30/0x50
 ___sys_sendmsg+0x81/0xc0
 ? __mod_memcg_lruvec_state+0x21/0xe0
 ? memcg_slab_post_alloc_hook+0x190/0x2b0
 ? sched_clock+0x5/0x10
 ? sched_clock_cpu+0xc/0xa0
 ? __smp_call_single_queue+0x23/0x40
 ? __x2apic_send_IPI_dest+0x2e/0x40
 ? ttwu_queue_wakelist+0xc9/0xe0
 ? try_to_wake_up+0x31a/0x4f0
 ? rwsem_mark_wake+0x1a1/0x2a0
 __sys_sendmsg+0x49/0x80
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fd6d86846c7
Code: 00 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
RSP: 002b:00007ffe271c3858 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6d86846c7
RDX: 0000000000000000 RSI: 00007ffe271c3890 RDI: 000000000000000f
RBP: 000056253b214df0 R08: 0000000000000000 R09: 0000000000000000
R10: 000056253b21ed80 R11: 0000000000000246 R12: 000056253b21fc40
R13: 00007ffe271c3878 R14: 00007ffe271c3920 R15: 00007fd6d8972f0b
Modules linked in: zram ip_tables i915 nouveau mxm_wmi drm_ttm_helper ttm i2c_algo_bit drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel drm e1000e ghash_clmulni_intel wmi video pinctrl_cannonlake fuse