Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611701
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-02
Last occurrence
2022-11-02
Unique reports
1
Quality
-18

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
ep_remove
vmlinux 0xed
2
ep_remove
vmlinux 0xed
3
ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
? ep_remove
vmlinux 0xed
6
ep_remove
vmlinux 0xed
7
ep_remove
vmlinux 0xed
general protection fault, probably for non-canonical address 0x6176616e75206884: 0000 [#2] PREEMPT SMP PTI
CPU: 2 PID: 394 Comm: udevadm Tainted: G      D W          6.0.5-200.fc36.x86_64 #1
Hardware name: Dell Inc.                 Dell DXP061                  /0CT017, BIOS 2.5.3  11/22/2007
RIP: 0010:rb_next+0x14/0x50
Code: 48 89 78 10 e9 c3 fe ff ff 48 c7 00 01 00 00 00 c3 cc cc cc cc 90 48 8b 0f 48 39 cf 74 38 48 8b 57 08 48 85 d2 74 1d 48 89 d0 <48> 8b 52 10 48 85 d2 75 f4 c3 cc cc cc cc 48 3b 78 08 75 13 48 8b
RSP: 0018:ffffc2f14047fe38 EFLAGS: 00010206
RAX: 6176616e75206874 RBX: ffffc2f14047fed0 RCX: 0000000000000007
RDX: 6176616e75206874 RSI: ffff9ed980ddd380 RDI: ffff9ed980de9280
RBP: 0000000000000000 R08: 0000000000000020 R09: 00005634c8736ed0
R10: ffffffffbb3d3000 R11: 0000000000000001 R12: 0000000000000004
R13: ffff9ed980de9268 R14: ffff9ed980046c90 R15: ffff9ed980233de0
FS:  00007f4cff653580(0000) GS:ffff9ed9b7c80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005634c873e928 CR3: 000000010bb96000 CR4: 00000000000006e0
Call Trace:
 <TASK>
 kernfs_fop_readdir+0x175/0x270
 iterate_dir+0x177/0x1c0
 __x64_sys_getdents64+0x74/0x110
 ? __x64_sys_getdents+0x110/0x110
 ? syscall_trace_enter.constprop.0+0x124/0x1a0
 do_syscall_64+0x5b/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f4cff8d9217
Code: 0a fb ff 4c 89 e0 5b 5d 41 5c c3 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 eb 11 00 f7 d8 64 89 02 48
RSP: 002b:00007ffc63cba568 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
RAX: ffffffffffffffda RBX: 00005634c8736920 RCX: 00007f4cff8d9217
RDX: 0000000000008000 RSI: 00005634c8736920 RDI: 0000000000000003
RBP: 00005634c87368f4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000001000 R11: 0000000000000293 R12: fffffffffffffea0
R13: 0000000000000000 R14: 00005634c87368f0 R15: 00007ffc63cba778
 </TASK>
Modules linked in: zram nouveau drm_ttm_helper serio_raw ttm mxm_wmi wmi video drm_display_helper e1000e cec ip6_tables ip_tables fuse