Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-23
Last occurrence
2021-06-17
Unique reports
1
Quality
-17

Graphs

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Fedora 34 1 / 1
Operating system Count
Fedora 33 1
Fedora 34 1
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP PTI
CPU: 1 PID: 2576 Comm: PK-Backend Not tainted 5.8.15-301.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.16722896.B64.2008100651 08/10/2020
RIP: 0010:do_swap_page+0x3f8/0x7b0
Code: 48 8b 55 08 48 8d 42 ff 83 e2 01 48 0f 44 c5 48 8b 00 a9 00 00 20 00 0f 84 66 ff ff ff e9 59 ff ff ff 4c 89 ef e8 48 07 03 00 <48> 8b 00 f6 c4 10 74 11 4c 89 ef e8 18 c8 02 00 83 f8 01 0f 84 7d
RSP: 0000:ffffad9d44f33dd0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: b7d0000000000082 RCX: 0000000000000000
RDX: ffff9eae760670a0 RSI: ffff9eae76058d10 RDI: 0000000000000016
RBP: 0000000000000000 R08: 0000000000000760 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000001 R12: ffffad9d44f33e30
R13: 580013ffffffffcf R14: ffff9eadf07d16a8 R15: ffff9eae6ef7ea40
FS:  00007f63e7fff640(0000) GS:ffff9eae76040000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000b0e94006 CR4: 00000000003606e0
Call Trace:
 ? trigger_load_balance+0x5a/0x210
 handle_mm_fault+0xd22/0x1950
 ? timerqueue_add+0x96/0xb0
 do_user_addr_fault+0x1c4/0x470
 exc_page_fault+0x81/0x1a0
 ? asm_exc_page_fault+0x8/0x30
 asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x7f64060b51b6
Code: 00 00 0f 85 cf 06 00 00 48 83 c4 48 4c 89 e7 5b 5d 41 5c 41 5d 41 5e 41 5f e9 06 f0 ff ff 66 0f 1f 44 00 00 48 89 f7 83 c2 01 <49> 89 4c 24 18 48 c1 ef 0c 48 33 bc c1 80 00 00 00 49 89 7c 24 10
RSP: 002b:00007f63e7ffe990 EFLAGS: 00010202
RAX: 0000000000000008 RBX: 00000000000000a0 RCX: 00007f63e025e2e0
RDX: 0000000000000007 RSI: 00007f63e192ac10 RDI: 00007f63e192ac10
RBP: 00007f63e0000020 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: 00000000000000a0 R12: 00007f63e192ac00
R13: 0000000000000000 R14: 00007f6406648ad0 R15: 00000000c3e32209
Modules linked in: uinput nls_utf8 isofs rfcomm nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter snd_seq_midi snd_seq_midi_event bnep vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr intel_rapl_common vfat kvm_intel fat kvm irqbypass rapl vmw_balloon btusb btrtl btbcm btintel bluetooth snd_ens1371 snd_ac97_codec joydev pcspkr gameport ac97_bus snd_rawmidi snd_seq ecdh_generic snd_seq_device rfkill ecc snd_pcm snd_timer snd vmw_vmci soundcore i2c_piix4 zram ip_tables vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel drm_kms_helper ghash_clmulni_intel cec ttm
 serio_raw drm nvme nvme_core e1000 ata_generic pata_acpi fuse
CR2: 0000000000000000