Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-29
Last occurrence
2021-04-29
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
_raw_spin_lock_irq
vmlinux 0x21
5
_raw_spin_lock_irq
vmlinux 0x21
6
_raw_spin_lock_irq
vmlinux 0x21
7
_raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
_raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
13
_raw_spin_lock_irq
vmlinux 0x21
14
_raw_spin_lock_irq
vmlinux 0x21
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 1 PID: 381 Comm: systemd-udevd Tainted: G    B             5.11.12-300.fc34.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. H310M M.2 2.0/H310M M.2 2.0, BIOS F15a 08/18/2020
RIP: 0010:do_swap_page+0x3e4/0x770
Code: 49 8b 56 08 48 8d 42 ff 83 e2 01 49 0f 44 c6 48 8b 00 a9 00 00 20 00 0f 84 66 ff ff ff e9 59 ff ff ff 48 89 ef e8 bc 1e 03 00 <48> 8b 00 f6 c4 10 74 11 48 89 ef e8 9c de 02 00 83 f8 01 0f 84 7d
RSP: 0000:ffffb21d808678b8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffb21d80867928 RCX: 0000000000000000
RDX: ffff92435ec66ba0 RSI: ffff92435ec58ac0 RDI: 0000000000000000
RBP: 0003fffeffffffff R08: 0000000000000000 R09: ffffb21d808676c0
R10: ffffb21d808676b8 R11: ffffffffa7b44f08 R12: ffff9240495d2898
R13: 0000000000000000 R14: 0000000000000000 R15: ffff9240495d2898
FS:  00007f2c928d3b40(0000) GS:ffff92435ec40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000109630003 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 handle_mm_fault+0xe37/0x1970
 __get_user_pages+0x28c/0x7f0
 get_dump_page+0xa5/0x300
 dump_user_range+0x8d/0x110
 elf_core_dump+0xdfc/0xef0
 do_coredump+0x89a/0x1090
 get_signal+0x146/0x8a0
 ? send_signal+0x3f/0x120
 arch_do_signal_or_restart+0xf2/0x700
 ? force_sig_fault+0x4c/0x70
 exit_to_user_mode_prepare+0xde/0x1b0
 ? asm_exc_page_fault+0x8/0x30
 irqentry_exit_to_user_mode+0x5/0x30
 asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x139c0
Code: Unable to access opcode bytes at RIP 0x13996.
RSP: 002b:00007ffdbce9ec58 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 000055f0ec6c4a20 RCX: 000055f5b36758d5
RDX: 00007ffdbce9ecc8 RSI: 000055f0ec40f0f7 RDI: 000055f0ec6baac0
RBP: 00007ffdbce9ee60 R08: 000055f0ec6d57e0 R09: 00007f2c935a3a00
R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000000
R13: 000055f0ec40e6b3 R14: 000000000000000d R15: 00007ffdbce9ed20
Modules linked in: fjes(-) nouveau(+) mxm_wmi i2c_algo_bit drm_ttm_helper ttm drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel r8169 wmi video fuse
CR2: 0000000000000000