Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #576007
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-11-11
Last occurrence
2021-11-11
Unique reports
1
Quality
-23

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
suspend_devices_and_enter
vmlinux 0x1a1
2
? suspend_devices_and_enter
vmlinux 0x1a1
3
suspend_devices_and_enter
vmlinux 0x1a1
4
suspend_devices_and_enter
vmlinux 0x1a1
5
suspend_devices_and_enter
vmlinux 0x1a1
6
suspend_devices_and_enter
vmlinux 0x1a1
7
suspend_devices_and_enter
vmlinux 0x1a1
8
suspend_devices_and_enter
vmlinux 0x1a1
9
suspend_devices_and_enter
vmlinux 0x1a1
10
suspend_devices_and_enter
vmlinux 0x1a1
11
suspend_devices_and_enter
vmlinux 0x1a1
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0 
Oops: 0002 [#1] SMP PTI
CPU: 4 PID: 4253 Comm: xkbcomp Not tainted 5.14.15-300.fc35.x86_64 #1
Hardware name: SAMSUNG ELECTRONICS CO., LTD. 550P5C/550P7C/SAMSUNG_NP1234567890, BIOS P10AAA.047.140617.dg 06/17/2014
RIP: 0010:vmacache_find+0xa6/0xb0
Code: 89 c0 48 c7 81 b8 08 00 00 00 00 00 00 48 c7 81 c0 08 00 00 00 00 00 00 48 c7 81 c8 08 00 00 00 00 00 00 48 c7 81 d0 08 00 00 <00> 00 00 00 c3 cc cc cc cc cc 0f 1f 44 00 00 48 8b 47 18 48 89 46
RSP: 0018:ffffb9c60a95bc58 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff8d9b015edd80 RCX: ffff8d9b2e640000
RDX: ffff8d9b2e640000 RSI: 00007f92228a5050 RDI: ffff8d9b015edd80
RBP: 00007f92228a5050 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffb9c60a95bcf8
R13: 00007f92228a5050 R14: ffff8d9b015edd80 R15: ffff8d9b015eddf8
FS:  0000000000000000(0000) GS:ffff8d9c27300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000172f82005 CR4: 00000000001706e0
Call Trace:
 find_vma+0x16/0x70
 ? mmap_region+0x2a0/0x690
 do_user_addr_fault+0x14e/0x680
 exc_page_fault+0x72/0x150
 asm_exc_page_fault+0x1e/0x30
RIP: 0010:__clear_user+0x20/0x50
Code: c3 cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 48 89 f1 0f 1f 00 48 89 f0 48 c1 e9 03 83 e0 07 48 85 c9 74 15 66 0f 1f 44 00 00 <48> c7 07 00 00 00 00 48 83 c7 08 ff c9 75 f1 48 89 c1 85 c9 74 0a
RSP: 0018:ffffb9c60a95bda0 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff8d9b1f741668 RCX: 00000000000001f6
RDX: 00007ffffffff000 RSI: 0000000000000fb0 RDI: 00007f92228a5050
RBP: ffff8d9be0adbe00 R08: 00007f92228a2000 R09: 0000000000000000
R10: 00007f9222871000 R11: ffff8d9b72f991e8 R12: ffff8d9b1f742000
R13: ffff8d9b2e640000 R14: ffff8d9b2dbf2e00 R15: ffff8d9b4f854a00
 load_elf_binary+0x1631/0x1650
 bprm_execve+0x26a/0x630
 do_execveat_common.isra.0+0x156/0x1c0
 __x64_sys_execve+0x33/0x40
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1383c6497b
Code: Unable to access opcode bytes at RIP 0x7f1383c64951.
RSP: 002b:00007ffd959044f8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1383c6497b
RDX: 000055eadca21790 RSI: 000055eadca24d40 RDI: 000055eadca24650
RBP: 000055eadca24650 R08: 00007ffd95904440 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff
R13: 000055eadca24d40 R14: 000055eadca21790 R15: 000055eadca24a90
Modules linked in: uinput rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter qrtr ns bnep sunrpc squashfs loop intel_rapl_msr intel_rapl_common iwldvm snd_hda_codec_realtek x86_pkg_temp_thermal intel_powerclamp snd_hda_codec_generic coretemp snd_hda_codec_hdmi ledtrig_audio mac80211 kvm_intel btusb snd_hda_intel uvcvideo btrtl snd_intel_dspcfg btbcm pktcdvd iTCO_wdt videobuf2_vmalloc btintel snd_intel_sdw_acpi libarc4 kvm videobuf2_memops intel_pmc_bxt videobuf2_v4l2 at24 mei_hdcp
 iTCO_vendor_support iwlwifi bluetooth snd_hda_codec samsung_laptop videobuf2_common irqbypass rapl intel_cstate videodev intel_uncore snd_hda_core cfg80211 snd_hwdep snd_seq snd_seq_device mc ecdh_generic joydev pcspkr snd_pcm i2c_i801 rfkill lpc_ich i2c_smbus mei_me snd_timer mei snd soundcore binfmt_misc zram ip_tables i915 nouveau drm_ttm_helper mxm_wmi i2c_algo_bit ttm crct10dif_pclmul crc32_pclmul crc32c_intel drm_kms_helper cec serio_raw ghash_clmulni_intel drm r8169 wmi video ipmi_devintf ipmi_msghandler fuse
CR2: 0000000000000000