Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-03-10
Last occurrence
2022-03-10
Unique reports
1
Quality
-49

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0x365
2
kfree
vmlinux 0x365
3
? kfree
vmlinux 0x365
4
kfree
vmlinux 0x365
5
? kfree
vmlinux 0x365
6
kfree
vmlinux 0x365
7
kfree
vmlinux 0x365
8
? kfree
vmlinux 0x365
9
? kfree
vmlinux 0x365
10
kfree
vmlinux 0x365
11
kfree
vmlinux 0x365
12
kfree
vmlinux 0x365
13
kfree
vmlinux 0x365
14
kfree
vmlinux 0x365
15
kfree
vmlinux 0x365
16
? kfree
vmlinux 0x365
17
? kfree
vmlinux 0x365
18
kfree
vmlinux 0x365
19
? kfree
vmlinux 0x365
20
kfree
vmlinux 0x365
BUG: unable to handle page fault for address: 0000000000002274
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 800000003a2fb067 P4D 800000003a2fb067 PUD 0 
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 43 Comm: kswapd0 Tainted: G           OE     5.16.12-200.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:xas_start+0x70/0xc0
Code: 00 c3 48 c1 fa 02 85 d2 74 cb 31 c0 c3 0f b6 48 fe 48 d3 ea 48 83 fa 3f 76 df 48 c7 47 18 01 00 00 00 31 c0 c3 48 85 d2 74 3c <0f> b6 0a 48 8b 47 08 48 d3 e8 83 e0 3f 48 83 c0 04 48 8b 44 c2 08
RSP: 0000:ffffb84c0038baf8 EFLAGS: 00010006
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006
RDX: 0000000000002274 RSI: 0000000000000000 RDI: ffffb84c0038bb60
RBP: ffffa09181973040 R08: ffffffffa62c9100 R09: 0000000000000238
R10: 0000000000000000 R11: 0000000000000002 R12: ffffa0908197d550
R13: ffffa091829079a0 R14: ffffb84c0038bb60 R15: ffffa091829079a0
FS:  0000000000000000(0000) GS:ffffa0919bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000002274 CR3: 00000000386d2006 CR4: 00000000000706f0
Call Trace:
 <TASK>
 xas_load+0x5/0x70
 xas_store+0x3e7/0x5f0
 ? __mod_node_page_state+0x72/0xc0
 xa_delete_node+0x57/0x60
 ? mod_lruvec_state+0x30/0x30
 shadow_lru_isolate+0x90/0x130
 __list_lru_walk_one+0x77/0x150
 ? workingset_update_node+0x80/0x80
 ? workingset_update_node+0x80/0x80
 list_lru_walk_one_irq+0x47/0x70
 do_shrink_slab+0x139/0x2e0
 shrink_slab+0x162/0x280
 shrink_node+0x2b2/0x6f0
 balance_pgdat+0x342/0x710
 kswapd+0x1ed/0x390
 ? do_wait_intr_irq+0xa0/0xa0
 ? balance_pgdat+0x710/0x710
 kthread+0x16b/0x190
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
 </TASK>
Modules linked in: uinput vboxvideo(OE) drm_ttm_helper xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter qrtr sunrpc vfat fat snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_seq intel_rapl_msr intel_rapl_common snd_seq_device snd_pcm rapl snd_timer snd soundcore i2c_piix4 joydev pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw video e1000
 vboxguest(OE) ata_generic pata_acpi ipmi_devintf ipmi_msghandler fuse
CR2: 0000000000002274