Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-08-15
Last occurrence
2021-08-15
Unique reports
1
Quality
-27

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
_raw_spin_lock_irq
vmlinux 0x21
5
_raw_spin_lock_irq
vmlinux 0x21
6
_raw_spin_lock_irq
vmlinux 0x21
7
_raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
_raw_spin_lock_irq
vmlinux 0x21
12
_raw_spin_lock_irq
vmlinux 0x21
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP NOPTI
CPU: 2 PID: 2394 Comm: Chrome_ChildIOT Tainted: G      D           5.11.12-300.fc34.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. To be filled by O.E.M./970A-DS3P, BIOS FD 02/26/2016
RIP: 0010:unlink_anon_vmas+0x1f/0x1d0
Code: 08 e8 65 c0 e7 ff eb be 0f 0b 90 0f 1f 44 00 00 41 57 41 56 41 55 4c 8d 6f 78 41 54 55 53 48 83 ec 08 4c 8b 67 78 48 89 3c 24 <49> 8b 0c 24 4d 39 e5 0f 84 7c 01 00 00 4d 8d 74 24 f0 48 8d 59 f0
RSP: 0018:ffffb7a503fd7c58 EFLAGS: 00010292
RAX: 00007fda02b70000 RBX: ffffa0f45d565390 RCX: 000000008040002f
RDX: 00007fda02970000 RSI: ffffffffa52bbc6d RDI: ffffa0f45d565390
RBP: ffffa0f45d565390 R08: 0000000000000000 R09: 0000000000000000
R10: ffffa0f40361fc00 R11: 0000000000000001 R12: 0000000000000000
R13: ffffa0f45d565408 R14: 0000000000000000 R15: 0000000000000000
FS:  00007fd9eeffc640(0000) GS:ffffa0f536c80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000a1a10000 CR4: 00000000000406e0
Call Trace:
 free_pgtables+0x93/0x100
 exit_mmap+0xa6/0x1c0
 mmput+0x61/0x140
 do_exit+0x30c/0xac0
 do_group_exit+0x33/0xa0
 get_signal+0x14f/0x8a0
 arch_do_signal_or_restart+0xf2/0x700
 ? do_user_addr_fault+0x1b3/0x480
 exit_to_user_mode_prepare+0xde/0x1b0
 ? asm_exc_page_fault+0x8/0x30
 irqentry_exit_to_user_mode+0x5/0x30
 asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x55e9be49a180
Code: Unable to access opcode bytes at RIP 0x55e9be49a156.
RSP: 002b:00007fd9eeffaaa0 EFLAGS: 00010246
RAX: 000017d0002be050 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 000017d0002be0a0 RSI: 0000000000000050 RDI: 000017d0002be050
RBP: 00007fd9eeffab20 R08: 000017d0002be000 R09: 000017d0002bf000
R10: 0000000000000000 R11: 0000000000000010 R12: 0000000000000010
R13: 000055e9c6e43148 R14: 000017d0002015a0 R15: 0000000000004000
Modules linked in: uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink rfkill ip6table_filter ip6_tables iptable_filter sunrpc vfat fat snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg soundwire_intel soundwire_generic_allocation snd_soc_core snd_compress snd_pcm_dmaengine soundwire_cadence edac_mce_amd snd_hda_codec kvm_amd ccp snd_hda_core kvm ac97_bus snd_hwdep snd_seq snd_seq_device snd_pcm irqbypass snd_timer snd soundcore pcspkr sp5100_tco fam15h_power i2c_piix4 k10temp acpi_cpufreq zram ip_tables nouveau video mxm_wmi wmi i2c_algo_bit drm_ttm_helper ttm drm_kms_helper cec drm
 crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel ata_generic pata_acpi pata_atiixp r8169 fuse
CR2: 0000000000000000