Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #795492
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-04-30
Last occurrence
2022-04-30
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
mutex_lock
vmlinux 0xe
2
mutex_lock
vmlinux 0xe
3
mutex_lock
vmlinux 0xe
4
? mutex_lock
vmlinux 0xe
5
? mutex_lock
vmlinux 0xe
6
mutex_lock
vmlinux 0xe
7
mutex_lock
vmlinux 0xe
8
? mutex_lock
vmlinux 0xe
9
? mutex_lock
vmlinux 0xe
10
mutex_lock
vmlinux 0xe
11
mutex_lock
vmlinux 0xe
12
mutex_lock
vmlinux 0xe
13
? mutex_lock
vmlinux 0xe
14
? mutex_lock
vmlinux 0xe
15
mutex_lock
vmlinux 0xe
16
? mutex_lock
vmlinux 0xe
17
mutex_lock
vmlinux 0xe
BUG: unable to handle page fault for address: ffff8cdac2e3ccd0
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP NOPTI
CPU: 2 PID: 121 Comm: kswapd0 Tainted: G      D           5.14.10-300.fc35.x86_64 #1
Hardware name: BIOSTAR Group A55MLC2/A55MLC2, BIOS 4.6.4 12/12/2012
RIP: 0010:page_vma_mapped_walk+0x11d/0xaa0
Code: 00 00 80 49 b8 80 00 00 00 00 00 00 04 48 be 00 00 00 00 80 00 00 00 49 bf 00 00 00 00 80 ff ff ff 8b 0d f2 e5 3e 01 48 89 d0 <49> 8b 7d 50 48 d3 e8 25 ff 01 00 00 48 8b 3c c7 e9 6b 01 00 00 40
RSP: 0018:ffffa5a0c0bc39b0 EFLAGS: 00010246
RAX: 00007f51a1837000 RBX: ffffa5a0c0bc39f0 RCX: 0000000000000027
RDX: 00007f51a1837000 RSI: 0000008000000000 RDI: ffffdaf984e19a40
RBP: 00007f51a1838000 R08: 0400000000000080 R09: 0000000080000000
R10: ffff8c5b2e063ec0 R11: 00000000000005e0 R12: ffffffffbd162e80
R13: ffff8cdac2e3cc80 R14: ffffdaf984e19a40 R15: ffffff8000000000
FS:  0000000000000000(0000) GS:ffff8c5b59d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8cdac2e3ccd0 CR3: 0000000115b5a000 CR4: 00000000000006e0
Call Trace:
 page_referenced_one+0x8b/0x160
 rmap_walk_file+0x152/0x2e0
 page_referenced+0xe1/0x160
 ? page_mlock_one+0xb0/0xb0
 ? page_get_anon_vma+0x80/0x80
 shrink_page_list+0x975/0xf10
 shrink_lruvec+0x607/0xb20
 ? enqueue_task_fair+0x89/0x6a0
 ? shrink_node+0x2aa/0x6d0
 shrink_node+0x2aa/0x6d0
 balance_pgdat+0x334/0x6b0
 kswapd+0x1e3/0x360
 ? finish_wait+0x80/0x80
 ? balance_pgdat+0x6b0/0x6b0
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr ns sunrpc snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core kvm_amd snd_hwdep snd_seq snd_seq_device snd_pcm ccp kvm snd_timer joydev irqbypass snd i2c_piix4 pcspkr k10temp soundcore acpi_cpufreq zram ip_tables nouveau ata_generic pata_acpi video drm_ttm_helper ttm i2c_algo_bit mxm_wmi wmi drm_kms_helper cec r8169 drm pata_atiixp sp5100_tco fuse
CR2: ffff8cdac2e3ccd0