This bug seems to be present on kernel "6.2.0-32-generic #32~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 18 10:40:13 UTC 2 x86_64 x86_64 x86_64 GNU/Linux"
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.3 LTS
Release: 22.04
Codename: jammy
Hi all,
This bug seems to be present on kernel "6.2.0-32-generic #32~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 18 10:40:13 UTC 2 x86_64 x86_64 x86_64 GNU/Linux"
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.3 LTS
Release: 22.04
Codename: jammy
Logs: read_trylock+ 0x16/0x80 5539a8 EFLAGS: 00010282 0(0000) GS:ffff94fd16b8 0000(0000) knlGS:000000000 0000000 oops+0x79/ 0x190 get_new_ requests+ 0xf6/0x1a0 addr_fault+ 0x30c/0x640 fault+0x81/ 0x1b0 page_fault+ 0x27/0x30 trylock+ 0x16/0x80 anon_vma_ read+0x76/ 0x190 anon+0x262/ 0x350 d+0x17d/ 0x240 referenced_ one+0x10/ 0x10 lock_anon_ vma_read+ 0x10/0x10 folio_list+ 0x7ee/0xc20 inactive_ list+0x191/ 0x600 active_ list+0x2dd/ 0x470 lruvec+ 0x2c4/0x400 slab+0x112/ 0x120 slab+0x112/ 0x120 node_memcgs+ 0x187/0x1f0 node+0xb9/ 0x330 pgdat+0x375/ 0x840 0x10/0x10 0x10/0x10 fork+0x29/ 0x50
[lun sep 11 12:18:58 2023] BUG: kernel NULL pointer dereference, address: 000000000000002b
[lun sep 11 12:18:58 2023] #PF: supervisor read access in kernel mode
[lun sep 11 12:18:58 2023] #PF: error_code(0x0000) - not-present page
[lun sep 11 12:18:58 2023] PGD 0 P4D 0
[lun sep 11 12:18:58 2023] Oops: 0000 [#1] PREEMPT SMP PTI
[lun sep 11 12:18:58 2023] CPU: 6 PID: 118 Comm: kswapd0 Tainted: P OE 6.2.0-32-generic #32~22.04.1-Ubuntu
[lun sep 11 12:18:58 2023] Hardware name: System manufacturer System Product Name/ROG STRIX Z370-E GAMING, BIOS 3005 09/30/2021
[lun sep 11 12:18:58 2023] RIP: 0010:down_
[lun sep 11 12:18:58 2023] Code: 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 5c 69 6b 50 48 b9 07 00 00 00 00 00 00 80 <48> 8b 07 48 85 c8 75 57 48 8d 90 00 01 00 00 f0 48 0f b1 17 75 ed
[lun sep 11 12:18:58 2023] RSP: 0018:ffffb6e340
[lun sep 11 12:18:58 2023] RAX: 0000000000000000 RBX: fffff2dbdbbc1080 RCX: 8000000000000007
[lun sep 11 12:18:58 2023] RDX: 0000000000000000 RSI: ffffb6e340553a58 RDI: 000000000000002b
[lun sep 11 12:18:58 2023] RBP: ffffb6e3405539d8 R08: 0000000000000000 R09: 0000000000000000
[lun sep 11 12:18:58 2023] R10: 0000000000000000 R11: 0000000000000000 R12: ffff94f60ffade38
[lun sep 11 12:18:58 2023] R13: ffff94f60ffade39 R14: ffffb6e340553a58 R15: 000000000000002b
[lun sep 11 12:18:58 2023] FS: 000000000000000
[lun sep 11 12:18:58 2023] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[lun sep 11 12:18:58 2023] CR2: 000000000000002b CR3: 0000000330e10003 CR4: 00000000003706e0
[lun sep 11 12:18:58 2023] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[lun sep 11 12:18:58 2023] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[lun sep 11 12:18:58 2023] Call Trace:
[lun sep 11 12:18:58 2023] <TASK>
[lun sep 11 12:18:58 2023] ? show_regs+0x72/0x90
[lun sep 11 12:18:58 2023] ? __die+0x25/0x80
[lun sep 11 12:18:58 2023] ? page_fault_
[lun sep 11 12:18:58 2023] ? blk_mq_
[lun sep 11 12:18:58 2023] ? do_user_
[lun sep 11 12:18:58 2023] ? exc_page_
[lun sep 11 12:18:58 2023] ? asm_exc_
[lun sep 11 12:18:58 2023] ? down_read_
[lun sep 11 12:18:58 2023] ? folio_lock_
[lun sep 11 12:18:58 2023] rmap_walk_
[lun sep 11 12:18:58 2023] folio_reference
[lun sep 11 12:18:58 2023] ? __pfx_folio_
[lun sep 11 12:18:58 2023] ? __pfx_folio_
[lun sep 11 12:18:58 2023] shrink_
[lun sep 11 12:18:58 2023] shrink_
[lun sep 11 12:18:58 2023] ? shrink_
[lun sep 11 12:18:58 2023] shrink_
[lun sep 11 12:18:58 2023] ? shrink_
[lun sep 11 12:18:58 2023] ? shrink_
[lun sep 11 12:18:58 2023] shrink_
[lun sep 11 12:18:58 2023] shrink_
[lun sep 11 12:18:58 2023] balance_
[lun sep 11 12:18:58 2023] kswapd+0x11a/0x1f0
[lun sep 11 12:18:58 2023] ? __pfx_kswapd+
[lun sep 11 12:18:58 2023] kthread+0xeb/0x120
[lun sep 11 12:18:58 2023] ? __pfx_kthread+
[lun sep 11 12:18:58 2023] ret_from_
[lun sep 11 12:18:58 2023] </TASK>