Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #673760
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-08-24
Last occurrence
2022-08-24
Unique reports
1
Quality
-50

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
9
? ktime_get
vmlinux 0x38
10
ktime_get
vmlinux 0x38
11
ktime_get
vmlinux 0x38
12
? ktime_get
vmlinux 0x38
13
? ktime_get
vmlinux 0x38
14
ktime_get
vmlinux 0x38
15
ktime_get
vmlinux 0x38
16
ktime_get
vmlinux 0x38
17
? ktime_get
vmlinux 0x38
18
? ktime_get
vmlinux 0x38
19
ktime_get
vmlinux 0x38
20
? ktime_get
vmlinux 0x38
21
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: ffffdcda00000c34
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 1ef4ca067 P4D 1ef4ca067 PUD 0 
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 77 Comm: kworker/u8:4 Not tainted 5.18.18-200.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events_unbound btrfs_preempt_reclaim_metadata_space
RIP: 0010:find_get_pages_range_tag+0xb0/0x230
Code: c7 48 81 ff 06 04 00 00 74 de 48 81 ff 02 04 00 00 0f 84 c4 00 00 00 48 85 ff 0f 84 ea 00 00 00 40 f6 c7 01 0f 85 0a 01 00 00 <8b> 47 34 85 c0 0f 84 a6 00 00 00 8d 50 01 48 8d 77 34 f0 0f b1 57
RSP: 0018:ffffa5dfc03a7a10 EFLAGS: 00010246
RAX: ffffdcda00000c00 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffdcda00000c00 RDI: ffffdcda00000c00
RBP: 0007ffffffffffff R08: 0007ffffffffffff R09: 0000000000000000
R10: 0000000000000228 R11: 0000000000000000 R12: ffffa5dfc03a7ad8
R13: 0000000000000000 R14: 000000000000000f R15: ffffa5dfc03a7ac8
FS:  0000000000000000(0000) GS:ffff9a5e27c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffdcda00000c34 CR3: 0000000122186006 CR4: 00000000000706f0
Call Trace:
 <TASK>
 pagevec_lookup_range_tag+0x24/0x30
 extent_write_cache_pages+0xf8/0x4f0
 ? __do_compat_sys_sysinfo+0x110/0x1c0
 extent_writepages+0x60/0x140
 do_writepages+0xac/0x1a0
 ? wbc_detach_inode+0xfd/0x220
 filemap_fdatawrite_wbc+0x5f/0x80
 start_delalloc_inodes+0xd4/0x3a0
 ? pollwake+0x66/0x80
 btrfs_start_delalloc_roots+0x16a/0x260
 flush_space+0x236/0x5a0
 ? _raw_spin_unlock+0x15/0x30
 ? btrfs_get_alloc_profile+0xbd/0x1a0
 btrfs_preempt_reclaim_metadata_space+0x96/0x1c0
 process_one_work+0x1c7/0x380
 worker_thread+0x4d/0x380
 ? _raw_spin_lock_irqsave+0x23/0x50
 ? process_one_work+0x380/0x380
 kthread+0xe9/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr sunrpc intel_rapl_msr intel_rapl_common snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio kvm_intel snd_hda_intel snd_intel_dspcfg kvm snd_intel_sdw_acpi irqbypass snd_hda_codec rapl snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm joydev snd_timer snd vboxguest soundcore pcspkr i2c_piix4 zram crct10dif_pclmul crc32_pclmul crc32c_intel vmwgfx ghash_clmulni_intel serio_raw drm_ttm_helper ata_generic ttm e1000 video pata_acpi ip6_tables ip_tables fuse
CR2: ffffdcda00000c34