Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-12-01
Last occurrence
2021-12-01
Unique reports
1
Quality
-46

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
? mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
? mutex_lock
vmlinux 0xe
10
? mutex_lock
vmlinux 0xe
11
? mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
? mutex_lock
vmlinux 0xe
16
? mutex_lock
vmlinux 0xe
17
mutex_lock
vmlinux 0xe
18
? mutex_lock
vmlinux 0xe
19
mutex_lock
vmlinux 0xe
BUG: unable to handle page fault for address: ffffb0e640706000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 1000067 P4D 1000067 PUD 11d6067 PMD 19f5067 PTE 0
Oops: 0000 [#2] SMP PTI
CPU: 0 PID: 112 Comm: kswapd0 Tainted: G      D           5.14.10-300.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:scan_swap_map_try_ssd_cluster+0xdf/0x150
Code: e9 62 ff ff ff 49 8b 7f 58 48 85 ff 74 18 4c 89 f0 48 c1 e8 09 48 8d 3c c7 48 89 3c 24 e8 f9 a4 94 00 48 8b 3c 24 49 8b 47 50 <42> 80 3c 30 00 74 46 49 83 c6 01 4c 39 f3 75 f0 48 85 ff 0f 84 79
RSP: 0000:ffffb0e640a678f0 EFLAGS: 00010246
RAX: ffffb0e640702000 RBX: 0000000000004200 RCX: 0000000000000020
RDX: 0000000000000001 RSI: ffffb0e640a67958 RDI: ffff94a38126e100
RBP: ffffb0e640a67960 R08: ffffb0e640a67c10 R09: 0000000000000007
R10: ffff94a38798ddb8 R11: 00000000000005e0 R12: ffffb0e640a67958
R13: ffffd0e63fc03598 R14: 0000000000004000 R15: ffff94a388e90400
FS:  0000000000000000(0000) GS:ffff94a3fda00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffb0e640706000 CR3: 0000000028d3a001 CR4: 00000000000706f0
Call Trace:
 scan_swap_map_slots+0x6f/0x6d0
 get_swap_pages+0x21b/0x400
 ? page_referenced_one+0x8b/0x160
 get_swap_page+0xc5/0x210
 shmem_writepage+0xcf/0x390
 pageout+0xe9/0x2d0
 shrink_page_list+0xb52/0xf10
 shrink_lruvec+0x607/0xb20
 ? enqueue_task_fair+0x89/0x6a0
 ? update_load_avg+0x7a/0x5a0
 ? shrink_node+0x2aa/0x6d0
 shrink_node+0x2aa/0x6d0
 balance_pgdat+0x334/0x6b0
 kswapd+0x1e3/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x6b0/0x6b0
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr ns sunrpc vfat fat snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio intel_rapl_msr snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec intel_rapl_common rapl snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm joydev pcspkr snd_timer snd i2c_piix4 vboxguest soundcore zram ip_tables crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel vmwgfx ttm drm_kms_helper e1000 serio_raw cec drm video fuse
CR2: ffffb0e640706000