Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #53259
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-01-09
Last occurrence
2021-06-22
Unique reports
1
Quality
-17

Graphs

Statistics

Operating system Unique / Total count
Fedora 32 1 / 1
Fedora 33 3 / 3
Fedora 34 1 / 1
Operating system Count
Fedora 33 3
Fedora 32 1
Fedora 34 1
Architecture Count
x86_64 5

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
__switch_to
vmlinux 0x7f
2
__switch_to
vmlinux 0x7f
3
__switch_to
vmlinux 0x7f
4
__switch_to
vmlinux 0x7f
5
__switch_to
vmlinux 0x7f
6
__switch_to
vmlinux 0x7f
7
__switch_to
vmlinux 0x7f
8
__switch_to
vmlinux 0x7f
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP PTI
CPU: 6 PID: 333 Comm: systemd-udevd Tainted: G      D           5.9.16-200.fc33.x86_64 #1
Hardware name: Acer Predator G3610/Predator G3610, BIOS P02-A2 10/31/2011
RIP: 0010:unlink_anon_vmas+0x97/0x1d0
Code: 83 c0 22 49 89 46 18 e8 87 81 03 00 48 8b 43 10 4c 8d 63 10 49 89 de 48 83 e8 10 4d 39 ec 74 47 48 89 c3 4d 8b 7e 08 48 89 ef <49> 8b 2f 48 39 fd 74 12 48 85 ff 0f 85 f0 00 00 00 48 8d 7d 08 e8
RSP: 0018:ffffbd970079fd80 EFLAGS: 00010246
RAX: 00007faa5ac3b000 RBX: 0004fe0000a000c0 RCX: 0004fe0000a000d0
RDX: 00007faa5aa3b000 RSI: ffff9ff86c43e078 RDI: 0000000000000000
RBP: 0000000000000000 R08: 00007faa5aa3b000 R09: 0000000000000005
R10: 0000000000000001 R11: ffff9ff867227300 R12: ffff9ff8671479d0
R13: ffff9ff867149460 R14: ffff9ff8671479c0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9ff871580000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000113a0e004 CR4: 00000000000606e0
Call Trace:
 free_pgtables+0x8a/0xf0
 exit_mmap+0xa6/0x170
 mmput+0x61/0x140
 do_exit+0x2ff/0xae0
 do_group_exit+0x33/0xa0
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7faa5b347fc1
Code: Unable to access opcode bytes at RIP 0x7faa5b347f97.
RSP: 002b:00007ffcd9658ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00005570b9334220 RCX: 00007faa5b347fc1
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 00007ffcd9659100 R08: fffffffffffffec0 R09: 0000000000000004
R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000000
R13: 00005570b936ad80 R14: 0000000000000000 R15: 00005570b9372ba0
Modules linked in: smsc75xx usbnet mii nouveau video mxm_wmi i2c_algo_bit drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel ttm ghash_clmulni_intel drm r8169 wmi uas usb_storage fuse
CR2: 0000000000000000