Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #662252
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-15
Last occurrence
2021-04-15
Unique reports
1
Quality
-60

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? proc_mkdir_mode
vmlinux 0x59
2
? proc_mkdir_mode
vmlinux 0x59
3
proc_mkdir_mode
vmlinux 0x59
4
? proc_mkdir_mode
vmlinux 0x59
5
? proc_mkdir_mode
vmlinux 0x59
6
proc_mkdir_mode
vmlinux 0x59
7
proc_mkdir_mode
vmlinux 0x59
8
? proc_mkdir_mode
vmlinux 0x59
9
proc_mkdir_mode
vmlinux 0x59
10
proc_mkdir_mode
vmlinux 0x59
11
proc_mkdir_mode
vmlinux 0x59
12
proc_mkdir_mode
vmlinux 0x59
13
proc_mkdir_mode
vmlinux 0x59
14
? proc_mkdir_mode
vmlinux 0x59
15
? proc_mkdir_mode
vmlinux 0x59
16
proc_mkdir_mode
vmlinux 0x59
17
? proc_mkdir_mode
vmlinux 0x59
18
? proc_mkdir_mode
vmlinux 0x59
19
? proc_mkdir_mode
vmlinux 0x59
20
? proc_mkdir_mode
vmlinux 0x59
21
? proc_mkdir_mode
vmlinux 0x59
22
proc_mkdir_mode
vmlinux 0x59
23
proc_mkdir_mode
vmlinux 0x59
24
proc_mkdir_mode
vmlinux 0x59
WARNING: CPU: 2 PID: 246659 at fs/btrfs/extent-tree.c:3054 __btrfs_free_extent+0x540/0x8e0
Modules linked in: vhost_net vhost vhost_iotlb tap lp parport uinput xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc vfat fat xfs snd_hda_codec_hdmi snd_hda_codec_realtek intel_rapl_msr snd_hda_codec_generic intel_rapl_common ledtrig_audio snd_hda_intel snd_intel_dspcfg ath9k x86_pkg_temp_thermal intel_powerclamp soundwire_intel iTCO_wdt soundwire_generic_allocation coretemp snd_soc_core ath9k_common mei_wdt snd_compress kvm_intel snd_pcm_dmaengine intel_pmc_bxt iTCO_vendor_support ath9k_hw kvm
 soundwire_cadence snd_hda_codec mac80211 ses snd_hda_core ath joydev cfg80211 ac97_bus snd_hwdep enclosure snd_seq scsi_transport_sas irqbypass rapl intel_cstate rfkill snd_seq_device intel_uncore mei_hdcp at24 dcdbas libarc4 snd_pcm dell_smm_hwmon mei_me lpc_ich snd_timer snd mei soundcore i2c_i801 pcspkr i2c_smbus zram ip_tables dm_crypt i915 i2c_algo_bit drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec ghash_clmulni_intel drm r8169 nvme nvme_core hid_microsoft video ff_memless ums_realtek uas usb_storage fuse
CPU: 2 PID: 246659 Comm: btrfs Kdump: loaded Not tainted 5.11.10-200.fc33.x86_64 #1
Hardware name: Dell Inc. Vostro 270s  /0XFWHV       , BIOS A13 05/23/2018
RIP: 0010:__btrfs_free_extent+0x540/0x8e0
Code: 24 14 ba 72 0c 00 00 48 c7 c6 c0 5d 06 8f 4c 89 ef e8 5a af 6f 00 e9 c3 fe ff ff 44 89 e6 48 c7 c7 d8 2a 3e 8f e8 24 8d 6e 00 <0f> 0b 44 89 e1 ba ee 0b 00 00 48 c7 c6 c0 5d 06 8f 4c 89 ef e8 2d
RSP: 0018:ffffb2828837f9b0 EFLAGS: 00010282
RAX: 0000000000000026 RBX: 0000000000000000 RCX: ffff892a8e318ac8
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff892a8e318ac0
RBP: 0000000001d00000 R08: 0000000000000000 R09: ffffb2828837f7e0
R10: ffffb2828837f7d8 R11: ffffffff8fb44f08 R12: 00000000ffffffe4
R13: ffff8929ae01d068 R14: ffff892893699690 R15: 0000000000000007
FS:  00007f1c5f8c99c0(0000) GS:ffff892a8e300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000a1e3f14e000 CR3: 000000011a538006 CR4: 00000000001706e0
Call Trace:
 ? read_block_for_search+0xeb/0x340
 ? btrfs_merge_delayed_refs+0x19f/0x1d0
 __btrfs_run_delayed_refs+0x245/0xf70
 ? rwsem_down_read_slowpath+0x310/0x3a0
 ? btrfs_update_root+0x194/0x2b0
 btrfs_run_delayed_refs+0x73/0x200
 btrfs_commit_transaction+0x47/0xa90
 ? start_transaction+0xd2/0x580
 relocate_block_group+0x361/0x610
 btrfs_relocate_block_group+0x15c/0x300
 btrfs_relocate_chunk+0x27/0xc0
 btrfs_shrink_device+0x1f0/0x530
 btrfs_rm_device+0x16a/0x540
 ? __check_object_size+0x136/0x150
 ? _copy_from_user+0x3c/0x80
 btrfs_ioctl+0x2c8c/0x3090
 ? _copy_to_user+0x2d/0x40
 ? cp_new_stat+0x13d/0x160
 ? selinux_file_ioctl+0x122/0x1c0
 ? vfs_statx+0xdb/0x100
 ? __x64_sys_ioctl+0x83/0xb0
 __x64_sys_ioctl+0x83/0xb0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f1c5fa9c5db
Code: 89 d8 49 8d 3c 1c 48 f7 d8 49 39 c4 72 b5 e8 1c ff ff ff 85 c0 78 ba 4c 89 e0 5b 5d 41 5c c3 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 6d b8 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007fff77de9608 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fff77deb7d0 RCX: 00007f1c5fa9c5db
RDX: 00007fff77de9630 RSI: 000000005000943a RDI: 0000000000000003
RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f1c5fb2d0c0
R10: 0000000000000015 R11: 0000000000000246 R12: 00007fff77de9630
R13: 0000000000000000 R14: 00007f1c5f8c97a8 R15: 0000000000000000