Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #527234
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-10-19
Last occurrence
2021-10-19
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Operating system Count
Fedora 34 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
unmap_vmas
vmlinux 0x6a
2
unmap_vmas
vmlinux 0x6a
3
unmap_vmas
vmlinux 0x6a
4
unmap_vmas
vmlinux 0x6a
5
unmap_vmas
vmlinux 0x6a
6
unmap_vmas
vmlinux 0x6a
7
unmap_vmas
vmlinux 0x6a
8
unmap_vmas
vmlinux 0x6a
9
unmap_vmas
vmlinux 0x6a
10
? unmap_vmas
vmlinux 0x6a
11
? unmap_vmas
vmlinux 0x6a
12
unmap_vmas
vmlinux 0x6a
13
? unmap_vmas
vmlinux 0x6a
14
unmap_vmas
vmlinux 0x6a
BUG: unable to handle page fault for address: fffff4a7452b9359
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP NOPTI
CPU: 1 PID: 112 Comm: kswapd0 Tainted: G      D W         5.14.11-200.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:_raw_spin_trylock+0x5/0x20
Code: 01 00 00 00 f0 0f b1 17 75 06 4c 89 e0 41 5c c3 89 c6 e8 fe c4 50 ff 66 90 4c 89 e0 41 5c c3 66 0f 1f 44 00 00 0f 1f 44 00 00 <8b> 07 85 c0 75 0b ba 01 00 00 00 f0 0f b1 17 74 03 31 c0 c3 b8 01
RSP: 0018:ffffb3170010fb70 EFLAGS: 00010297
RAX: 0000000000000001 RBX: ffff8b00452bd000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffff8b00452bacb0 RDI: fffff4a7452b9359
RBP: fffff4a7452b9301 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8b0045469600 R11: 0000000000000001 R12: ffff8b004532d518
R13: fffff4a7452b9359 R14: ffff8b00435a8070 R15: 0000000000000360
FS:  0000000000000000(0000) GS:ffff8b010f100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff4a7452b9359 CR3: 000000000cb2e002 CR4: 00000000000306e0
Call Trace:
 shrink_lock_dentry.part.0+0x42/0xf0
 shrink_dentry_list+0x24/0xc0
 prune_dcache_sb+0x44/0x50
 super_cache_scan+0x12f/0x1f0
 do_shrink_slab+0x13b/0x2b0
 shrink_slab+0x162/0x280
 shrink_node+0x2bf/0x6d0
 balance_pgdat+0x334/0x6b0
 kswapd+0x1e3/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x6b0/0x6b0
 kthread+0x124/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
Modules linked in: veth xt_nat nf_conntrack_netlink xt_addrtype br_netfilter overlay uinput isofs snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc vboxvideo drm_vram_helper drm_ttm_helper nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter vboxsf sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq intel_rapl_msr snd_seq_device snd_pcm intel_rapl_common rapl joydev snd_timer snd pcspkr i2c_piix4 vboxguest soundcore zram ip_tables vmwgfx ttm drm_kms_helper cec drm e1000 crc32c_intel serio_raw ata_generic pata_acpi video fuse
CR2: fffff4a7452b9359