Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #374356
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-10-06
Last occurrence
2022-05-03
Unique reports
1
Quality
-18

Graphs

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Fedora 35 1 / 1
Operating system Count
Fedora 34 1
Fedora 35 1
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_ioctl
vmlinux 0x2f
2
security_file_ioctl
vmlinux 0x2f
3
security_file_ioctl
vmlinux 0x2f
4
security_file_ioctl
vmlinux 0x2f
5
security_file_ioctl
vmlinux 0x2f
6
security_file_ioctl
vmlinux 0x2f
7
security_file_ioctl
vmlinux 0x2f
8
security_file_ioctl
vmlinux 0x2f
9
security_file_ioctl
vmlinux 0x2f
BUG: kernel NULL pointer dereference, address: 0000000000000008
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 4 PID: 546 Comm: ata_id Not tainted 5.14.9-200.fc34.x86_64 #1
Hardware name: Micro-Star International Co., Ltd. MS-7C82/MAG B460M MORTAR (MS-7C82), BIOS 1.20 07/20/2020
RIP: 0010:free_swap_cache+0x5/0x70
Code: 5e 41 5f c3 40 84 f6 0f 84 fc fe ff ff c6 44 24 12 3f 48 89 4c 24 08 e9 ed fe ff ff 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 <48> 8b 57 08 48 8d 42 ff 83 e2 01 48 0f 44 c7 48 8b 48 08 48 8d 51
RSP: 0018:ffffa57400493da8 EFLAGS: 00010282
RAX: ffffd0a2c421df80 RBX: ffff983801833008 RCX: 0000000000000000
RDX: 0017ffffc010001e RSI: 000000000000b2b1 RDI: 0000000000000000
RBP: ffff98380188b598 R08: ffffd0a2c4373a88 R09: ffffd0a2c4373a88
R10: 0000000000000010 R11: 0000000000000000 R12: 000000000000b2b1
R13: ffff983801832010 R14: 0000000000000000 R15: ffff98380945dd68
FS:  0000000000000000(0000) GS:ffff983f3eb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 00000002d1c10001 CR4: 00000000007706e0
PKRU: 55555554
Call Trace:
 free_pages_and_swap_cache+0x34/0x50
 tlb_finish_mmu+0x7a/0x1a0
 exit_mmap+0x9d/0x1c0
 mmput+0x61/0x140
 do_exit+0x2e9/0xa90
 do_group_exit+0x33/0xa0
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x38/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fd5ded56021
Code: Unable to access opcode bytes at RIP 0x7fd5ded55ff7.
RSP: 002b:00007ffde5f79b48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fd5dee4e470 RCX: 00007fd5ded56021
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000002
RBP: 0000000000000002 R08: fffffffffffffea0 R09: 0000000000000000
R10: 00007fd5dec9c468 R11: 0000000000000246 R12: 00007fd5dee4e470
R13: 0000000000000002 R14: 00007fd5dee4e948 R15: 0000000000000000
Modules linked in: crct10dif_pclmul crc32_pclmul crc32c_intel nvme mxm_wmi ghash_clmulni_intel nvme_core r8169 video wmi pinctrl_sunrisepoint uas usb_storage i2c_dev fuse
CR2: 0000000000000008