Kerneloops

Similar reports
Problem #754069
Component
kernel Tainted
Last affected version
0:6.13.12-200.fc41
Executable
unknown
First occurrence
2025-04-30
Last occurrence
2025-04-30
Unique reports
1
Quality
-31

Statistics

Operating system Unique / Total count
Fedora 41 1 / 1
Operating system Count
Fedora 41 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.13.12-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
? warn_thunk_thunk
vmlinux 0x1a
2
warn_thunk_thunk
vmlinux 0x1a
3
warn_thunk_thunk
vmlinux 0x1a
4
warn_thunk_thunk
vmlinux 0x1a
5
warn_thunk_thunk
vmlinux 0x1a
6
warn_thunk_thunk
vmlinux 0x1a
7
warn_thunk_thunk
vmlinux 0x1a
8
? warn_thunk_thunk
vmlinux 0x1a
9
warn_thunk_thunk
vmlinux 0x1a
10
? warn_thunk_thunk
vmlinux 0x1a
11
warn_thunk_thunk
vmlinux 0x1a
12
? warn_thunk_thunk
vmlinux 0x1a
13
warn_thunk_thunk
vmlinux 0x1a
kernel BUG at mm/slub.c:545!
Oops: invalid opcode: 0000 [#2] PREEMPT SMP NOPTI
CPU: 3 UID: 0 PID: 3999 Comm: kworker/u514:7 Tainted: G      D            6.13.12-200.fc41.x86_64 #1
Tainted: [D]=DIE
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
Workqueue: kvfree_rcu_reclaim kfree_rcu_monitor
RIP: 0010:__slab_free+0x152/0x2b0
Code: 00 4c 89 ff e8 5f ea d4 00 48 8b 14 24 48 8b 4c 24 20 48 89 44 24 08 48 8b 03 48 c1 e8 09 83 e0 01 88 44 24 13 e9 71 ff ff ff <0f> 0b 66 41 f7 44 24 08 87 04 75 b3 eb a9 66 41 f7 44 24 08 87 04
RSP: 0018:ffffb86686e33c90 EFLAGS: 00010246
RAX: ffff971244c352d0 RBX: ffffe68dc0130d40 RCX: 0000000080200014
RDX: ffff971244c35290 RSI: ffffe68dc0130d40 RDI: ffffb86686e33d00
RBP: ffffb86686e33d30 R08: 0000000000000001 R09: ffffffff8a294a59
R10: 0000000080200014 R11: ffff971349c14720 R12: ffff971340045c00
R13: ffff971244c35290 R14: ffffffff8a294a59 R15: ffffb86686e33e10
FS:  0000000000000000(0000) GS:ffff971473f80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f10f2e22018 CR3: 000000016e82c000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ? kvfree_rcu_list+0x49/0x120
 kfree+0x2f3/0x370
 kvfree_rcu_list+0x49/0x120
 kvfree_rcu_drain_ready+0x1bc/0x280
 kfree_rcu_monitor+0x1f/0x90
 process_one_work+0x179/0x330
 worker_thread+0x252/0x390
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xd2/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Modules linked in: uvcvideo uvc videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_usb_audio videobuf2_common videodev snd_usbmidi_lib snd_ump snd_hwdep mc uinput snd_seq_dummy snd_hrtimer xt_conntrack xt_MASQUERADE bridge stp llc xt_set xt_addrtype nft_compat nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject overlay nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables qrtr snd_seq_midi snd_seq_midi_event sunrpc intel_rapl_msr intel_rapl_common kvm_amd kvm vmw_balloon snd_ens1371 snd_ac97_codec irqbypass snd_rawmidi gameport binfmt_misc ac97_bus snd_seq pcspkr snd_seq_device snd_pcm vmxnet3 snd_timer snd soundcore i2c_piix4 i2c_smbus joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock zram vmw_vmci lz4hc_compress lz4_compress crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic
 ghash_clmulni_intel nvme sha512_ssse3 sha256_ssse3 sha1_ssse3 nvme_core nvme_auth vmwgfx drm_ttm_helper ttm ata_generic pata_acpi serio_raw fuse