Kerneloops

Similar reports
Problem #748057
Component
kernel Tainted
Last affected version
0:5.14.18-100.fc33
Executable
unknown
First occurrence
2024-11-02
Last occurrence
2024-11-02
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:5.14.18-100.fc33 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
__cancel_work_timer
vmlinux 0xea
2
__cancel_work_timer
vmlinux 0xea
3
__cancel_work_timer
vmlinux 0xea
4
__cancel_work_timer
vmlinux 0xea
5
__cancel_work_timer
vmlinux 0xea
6
__cancel_work_timer
vmlinux 0xea
7
__cancel_work_timer
vmlinux 0xea
8
__cancel_work_timer
vmlinux 0xea
9
__cancel_work_timer
vmlinux 0xea
10
? __cancel_work_timer
vmlinux 0xea
11
? __cancel_work_timer
vmlinux 0xea
12
__cancel_work_timer
vmlinux 0xea
13
? __cancel_work_timer
vmlinux 0xea
14
__cancel_work_timer
vmlinux 0xea
BUG: unable to handle page fault for address: ffff9ab300001144
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 182c01067 P4D 182c01067 PUD 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 3 PID: 169 Comm: kswapd0 Tainted: G           OE     5.14.18-100.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:__list_del_entry_valid+0x39/0x50
Code: ad de 48 39 c2 0f 84 a5 53 5a 00 48 b8 22 01 00 00 00 00 ad de 49 39 c0 0f 84 c5 53 5a 00 49 8b 30 48 39 fe 0f 85 a5 53 5a 00 <48> 8b 52 08 48 39 f2 0f 85 8a 53 5a 00 b8 01 00 00 00 c3 cc cc cc
RSP: 0018:ffffaac08156fb80 EFLAGS: 00010246
RAX: dead000000000122 RBX: ffffffff9624cfe0 RCX: 0000000000000000
RDX: ffff9ab30000113c RSI: ffff9ab34a8a9020 RDI: ffff9ab34a8a9020
RBP: ffff9ab34a8a8f08 R08: ffff9ab349faf530 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ab34a8a9020
R13: ffff9ab4417fd000 R14: ffff9ab4417fd070 R15: 0000000000000255
FS:  0000000000000000(0000) GS:ffff9ab74fac0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff9ab300001144 CR3: 0000000145272001 CR4: 00000000000706e0
Call Trace:
 evict+0x7b/0x180
 dispose_list+0x48/0x60
 prune_icache_sb+0x44/0x50
 super_cache_scan+0x161/0x1e0
 do_shrink_slab+0x141/0x2b0
 shrink_slab+0x167/0x2c0
 shrink_node+0x2b9/0x6e0
 balance_pgdat+0x339/0x6c0
 kswapd+0x1e3/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x6c0/0x6c0
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: isofs uinput binfmt_misc xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink rfkill ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc squashfs loop snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec intel_rapl_msr intel_rapl_common snd_hda_core snd_hwdep rapl snd_seq snd_seq_device snd_pcm snd_timer joydev snd soundcore i2c_piix4 pcspkr zram ip_tables vmwgfx ttm drm_kms_helper cec crct10dif_pclmul crc32_pclmul drm crc32c_intel
 e1000 ata_generic pata_acpi ghash_clmulni_intel serio_raw vboxguest(OE) video fuse
CR2: ffff9ab300001144