Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #621125
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-07-31
Last occurrence
2021-09-30
Unique reports
2
Quality
-30

Statistics

Operating system Unique / Total count
Fedora 34 2 / 2
Operating system Count
Fedora 34 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
proc_reg_llseek
vmlinux 0x46
2
proc_reg_llseek
vmlinux 0x46
3
? proc_reg_llseek
vmlinux 0x46
4
proc_reg_llseek
vmlinux 0x46
5
proc_reg_llseek
vmlinux 0x46
6
proc_reg_llseek
vmlinux 0x46
7
proc_reg_llseek
vmlinux 0x46
8
proc_reg_llseek
vmlinux 0x46
9
? proc_reg_llseek
vmlinux 0x46
10
proc_reg_llseek
vmlinux 0x46
11
? proc_reg_llseek
vmlinux 0x46
12
proc_reg_llseek
vmlinux 0x46
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 0 PID: 236 Comm: kworker/0:1H Tainted: P           OE     5.13.4-200.fc34.x86_64 #1
Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 PLUS, BIOS 0901 04/15/2016
Workqueue: kblockd blk_mq_run_work_fn
RIP: 0010:sbitmap_get+0x75/0x190
Code: 85 80 00 00 00 41 8b 57 08 85 d2 0f 84 b1 00 00 00 45 31 e4 48 63 cd 48 8d 1c 49 48 c1 e3 06 49 03 5f 10 4c 8d 6b 40 83 f0 01 <48> 8b 33 44 89 f2 4c 89 ef 0f b6 c8 e8 4a f7 ff ff 83 f8 ff 75 58
RSP: 0018:ffffbe3d00583d58 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9f85c137f830
RBP: 0000000000000000 R08: 0000000000000001 R09: ffff9f86c5088d2c
R10: 0000000000000008 R11: 0000000000000008 R12: 0000000000000000
R13: 0000000000000040 R14: 0000000000000000 R15: ffff9f85c137f830
FS:  0000000000000000(0000) GS:ffff9f89cfc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001ee470000 CR4: 00000000000406f0
Call Trace:
 scsi_mq_get_budget+0x1a/0x110
 __blk_mq_do_dispatch_sched+0x1b4/0x2d0
 ? __switch_to_xtra+0x317/0x500
 __blk_mq_sched_dispatch_requests+0x129/0x180
 blk_mq_sched_dispatch_requests+0x30/0x60
 __blk_mq_run_hw_queue+0x2d/0x60
 process_one_work+0x1ec/0x380
 worker_thread+0x53/0x3e0
 ? process_one_work+0x380/0x380
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: uinput rndis_host cdc_ether usbnet mii nls_utf8 isofs uas usb_storage rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nft_objref nf_conntrack_tftp bridge stp llc vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep it87 hwmon_vid sunrpc vfat fat squashfs loop nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) edac_mce_amd kvm_amd ccp kvm btusb snd_hda_codec_realtek btrtl btbcm snd_hda_codec_generic btintel snd_hda_codec_hdmi ledtrig_audio pktcdvd bluetooth irqbypass snd_hda_intel snd_intel_dspcfg
 snd_intel_sdw_acpi snd_hda_codec nvidia(POE) eeepc_wmi asus_wmi sparse_keymap snd_hda_core joydev video rfkill snd_hwdep wmi_bmof snd_seq pcspkr snd_seq_device fam15h_power k10temp snd_pcm drm_kms_helper i2c_piix4 snd_timer snd soundcore cec drm binfmt_misc zram ip_tables crct10dif_pclmul crc32_pclmul mxm_wmi crc32c_intel ghash_clmulni_intel sp5100_tco r8169 wmi fuse
CR2: 0000000000000000