Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-04-23
Last occurrence
2022-04-23
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
mutex_lock
vmlinux 0xe
5
mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
mutex_lock
vmlinux 0xe
9
mutex_lock
vmlinux 0xe
10
? mutex_lock
vmlinux 0xe
11
? mutex_lock
vmlinux 0xe
12
? mutex_lock
vmlinux 0xe
13
? mutex_lock
vmlinux 0xe
14
mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
16
mutex_lock
vmlinux 0xe
17
mutex_lock
vmlinux 0xe
BUG: unable to handle page fault for address: ffffa0dba1fb9b00
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 78e02067 P4D 78e02067 PUD 0 
Oops: 0000 [#1] SMP PTI
CPU: 0 PID: 5768 Comm: gmain Not tainted 5.14.10-300.fc35.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
RIP: 0010:refill_obj_stock+0x49/0x120
Code: 00 0f 85 c3 00 00 00 48 c7 c3 00 88 02 00 65 48 03 1d 1b 44 ce 4e 45 31 ed 48 83 c3 10 4c 39 23 74 64 48 89 df e8 87 f3 ff ff <49> 8b 04 24 a8 03 75 74 65 48 ff 00 e8 c6 2e e3 ff 4c 89 23 41 8b
RSP: 0000:ffffc097d08dfc20 EFLAGS: 00010206
RAX: 00003fba8c009678 RBX: ffffa0dd2fe28810 RCX: 0000000000020000
RDX: 00000000fffea9c8 RSI: 0000000000000006 RDI: 00003fba8c009838
RBP: 00000000000000d0 R08: 0000000000000030 R09: fffffffffffea9c8
R10: ffffa0dc83904258 R11: 0000000000000000 R12: ffffa0dba1fb9b00
R13: 0000000000000000 R14: fffff240000e4100 R15: ffffa0dc811ef400
FS:  00007fc1c6426640(0000) GS:ffffa0dd2fe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffa0dba1fb9b00 CR3: 0000000079c90000 CR4: 00000000000006f0
Call Trace:
 ? remove_vma+0x5b/0x70
 kmem_cache_free+0x1fe/0x3f0
 remove_vma+0x5b/0x70
 exit_mmap+0xba/0x1c0
 mmput+0x61/0x140
 do_exit+0x2e9/0xa90
 do_group_exit+0x33/0xa0
 get_signal+0x16b/0x890
 arch_do_signal_or_restart+0xfd/0x730
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 ? recalibrate_cpu_khz+0x10/0x10
 ? ktime_get_ts64+0x4c/0xf0
 exit_to_user_mode_prepare+0x11a/0x240
 syscall_exit_to_user_mode+0x18/0x40
 do_syscall_64+0x48/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fc1c9d927ff
Code: Unable to access opcode bytes at RIP 0x7fc1c9d927d5.
RSP: 002b:00007fc1c6425a40 EFLAGS: 00000293 ORIG_RAX: 0000000000000007
RAX: 0000000000000001 RBX: 00007fc1caf7d071 RCX: 00007fc1c9d927ff
RDX: 0000000000000f37 RSI: 0000000000000002 RDI: 000055f71d91d2d0
RBP: 000055f71d91d2d0 R08: 0000000000000000 R09: 0000000000000000
R10: 00007ffe001d7080 R11: 0000000000000293 R12: 0000000000000002
R13: 0000000000000002 R14: 00007fc1c6425ab0 R15: 000055f71d921270
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr ns vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 snd_ac97_codec vmw_balloon snd_rawmidi gameport ac97_bus snd_seq snd_seq_device joydev snd_pcm pcspkr snd_timer snd soundcore vmw_vmci i2c_piix4 zram ip_tables crc32c_intel vmwgfx ttm drm_kms_helper serio_raw cec drm mptspi scsi_transport_spi mptscsih e1000 mptbase ata_generic pata_acpi fuse
CR2: ffffa0dba1fb9b00