Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-11-08
Last occurrence
2021-11-08
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
mutex_lock
vmlinux 0xe
10
mutex_lock
vmlinux 0xe
11
mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
? mutex_lock
vmlinux 0xe
16
? mutex_lock
vmlinux 0xe
17
mutex_lock
vmlinux 0xe
18
? mutex_lock
vmlinux 0xe
19
mutex_lock
vmlinux 0xe
BUG: unable to handle page fault for address: fffff4a700000011
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP PTI
CPU: 1 PID: 112 Comm: kswapd0 Tainted: G        W         5.14.10-300.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:rb_next+0x14/0x50
Code: 89 40 10 e9 c3 fe ff ff 48 c7 07 01 00 00 00 c3 66 0f 1f 44 00 00 48 8b 17 48 39 d7 74 35 48 8b 47 08 48 85 c0 74 1c 49 89 c0 <48> 8b 40 10 48 85 c0 75 f4 4c 89 c0 c3 48 3b 78 08 75 f6 48 8b 10
RSP: 0018:ffffbc8380a5fa98 EFLAGS: 00010282
RAX: fffff4a700000001 RBX: 0000000000000001 RCX: fffff4a700001000
RDX: 0000000000000001 RSI: ffff94c6c6878000 RDI: ffff94c6c6878010
RBP: ffff94c6c6878000 R08: fffff4a700000001 R09: ffff94c6c6878000
R10: ffff94c6c7ed3000 R11: 0000000000000001 R12: ffff94c6c6878010
R13: ffff94c6c57464d8 R14: 0000000000000000 R15: fffff4a700000fff
FS:  0000000000000000(0000) GS:ffff94c74d900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff4a700000011 CR3: 0000000038592001 CR4: 00000000000706e0
Call Trace:
 clear_state_bit+0x113/0x1a0
 __clear_extent_bit+0x229/0x4b0
 clear_extent_bit+0x15/0x20
 btrfs_inode_clear_file_extent_range+0x45/0x50
 btrfs_destroy_inode+0x132/0x240
 destroy_inode+0x3b/0x70
 dispose_list+0x48/0x60
 prune_icache_sb+0x44/0x50
 super_cache_scan+0x161/0x1f0
 do_shrink_slab+0x13e/0x2b0
 shrink_slab+0x162/0x280
 shrink_node+0x2bf/0x6d0
 balance_pgdat+0x334/0x6b0
 kswapd+0x1e3/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x6b0/0x6b0
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr ns sunrpc snd_intel8x0 intel_rapl_msr snd_ac97_codec intel_rapl_common ac97_bus snd_seq snd_seq_device snd_pcm rapl joydev snd_timer snd pcspkr vboxguest i2c_piix4 soundcore zram ip_tables vmwgfx ttm drm_kms_helper cec drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw e1000 ata_generic pata_acpi video fuse
CR2: fffff4a700000011