Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-02
Last occurrence
2021-06-02
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0x3e2
2
kfree
vmlinux 0x3e2
3
kfree
vmlinux 0x3e2
4
? kfree
vmlinux 0x3e2
5
? kfree
vmlinux 0x3e2
6
kfree
vmlinux 0x3e2
7
kfree
vmlinux 0x3e2
8
kfree
vmlinux 0x3e2
9
kfree
vmlinux 0x3e2
10
kfree
vmlinux 0x3e2
11
kfree
vmlinux 0x3e2
12
? kfree
vmlinux 0x3e2
13
? kfree
vmlinux 0x3e2
14
kfree
vmlinux 0x3e2
15
? kfree
vmlinux 0x3e2
16
kfree
vmlinux 0x3e2
BUG: kernel NULL pointer dereference, address: 0000000000000008
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0 
Oops: 0002 [#1] SMP NOPTI
CPU: 5 PID: 162 Comm: kswapd0 Tainted: P        W  OE     5.12.8-300.fc34.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. X570 AORUS ELITE WIFI/X570 AORUS ELITE WIFI, BIOS F32 01/18/2021
RIP: 0010:down_read_trylock+0x18/0x50
Code: 20 48 c7 47 08 00 00 00 00 c7 47 10 00 00 00 00 c3 90 0f 1f 44 00 00 48 b9 07 00 00 00 00 00 00 80 31 c0 48 8d 90 00 01 00 00 <f0> 48 0f b1 17 75 21 48 8b 47 08 65 48 8b 14 25 c0 7b 01 00 83 e0
RSP: 0018:ffff9f7bc04dba00 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff90ce55fdadc1 RCX: 8000000000000007
RDX: 0000000000000100 RSI: ffff9f7bc04dba98 RDI: 0000000000000008
RBP: ffffd8fd59c1e480 R08: ffffd8fd59c1e4c8 R09: ffffd8fd59c1e408
R10: 0000000000000000 R11: 000000000000001d R12: ffff90ce55fdadc0
R13: 0000000000000008 R14: ffffd8fd59c1e480 R15: ffffd8fd59c1e488
FS:  0000000000000000(0000) GS:ffff90d29e940000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 0000000215d44000 CR4: 0000000000350ee0
Call Trace:
 page_lock_anon_vma_read+0x4d/0xf0
 rmap_walk_anon+0x192/0x2a0
 page_referenced+0xe1/0x150
 ? rmap_walk_file+0x2b0/0x2b0
 ? page_get_anon_vma+0x80/0x80
 shrink_page_list+0x7e6/0x1020
 shrink_inactive_list+0x132/0x3a0
 shrink_lruvec+0x497/0x6c0
 shrink_node+0x2b3/0x6e0
 balance_pgdat+0x2fa/0x620
 kswapd+0x1e6/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x620/0x620
 kthread+0x11b/0x140
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork+0x22/0x30
Modules linked in: binfmt_misc rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM wireguard xt_MASQUERADE libchacha20poly1305 xt_conntrack chacha_x86_64 poly1305_x86_64 libblake2s blake2s_x86_64 ipt_REJECT curve25519_x86_64 libcurve25519_generic libchacha libblake2s_generic ip6_udp_tunnel udp_tunnel nft_compat nf_nat_tftp nf_conntrack_tftp nft_counter bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink cmac bnep sunrpc vfat fat uvcvideo snd_usb_audio videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev snd_usbmidi_lib snd_rawmidi joydev mc nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) intel_rapl_msr snd_hda_codec_realtek snd_hda_codec_generic intel_rapl_common iwlmvm ledtrig_audio snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg
 snd_intel_sdw_acpi edac_mce_amd mac80211 snd_hda_codec snd_hda_core snd_hwdep nvidia(POE) snd_seq kvm libarc4 snd_seq_device snd_pcm btusb irqbypass btrtl btbcm iwlwifi drm_kms_helper rapl snd_timer btintel snd pcspkr wmi_bmof bluetooth k10temp cfg80211 cec soundcore i2c_piix4 ecdh_generic ecc rfkill acpi_cpufreq drm zram ip_tables uas usb_storage igb crct10dif_pclmul crc32_pclmul crc32c_intel dca nvme i2c_algo_bit ghash_clmulni_intel ccp sp5100_tco nvme_core wmi fuse
CR2: 0000000000000008