Kerneloops

Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
0:5.9.11-100.fc32
Executable
unknown
First occurrence
2021-07-24
Last occurrence
2021-07-24
Unique reports
1
Quality
-26

Statistics

Operating system Unique / Total count
Fedora 32 1 / 1
Operating system Count
Fedora 32 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:5.9.11-100.fc32 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
? ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
? ktime_get
vmlinux 0x38
5
? ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
? ktime_get
vmlinux 0x38
8
? ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: 0000000000004b52
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#2] SMP PTI
CPU: 0 PID: 1961 Comm: gdbus Tainted: G      D W         5.9.11-100.fc32.x86_64 #1
Hardware name: LENOVO 20F6A06BCD/20F6A06BCD, BIOS R02ET46W (1.19 ) 03/15/2016
RIP: 0010:0x4b52
Code: Unable to access opcode bytes at RIP 0x4b28.
RSP: 0018:ffffb75982b83e28 EFLAGS: 00010046
RAX: 0000000000004b52 RBX: 000000001abaa380 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffffb75982b5bcb8
RBP: 0000000000000000 R08: ffffb75982b5bcb8 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000004 R12: ffff8e1c14a627e8
R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000001
FS:  00007fefb5538700(0000) GS:ffff8e1c1aa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000004b52 CR3: 0000000214a2a005 CR4: 00000000003706f0
Call Trace:
 ? __wake_up_common+0x80/0x180
 ? eventfd_write+0xc1/0x250
 ? selinux_file_permission+0x4e/0x120
 ? wake_up_q+0xa0/0xa0
 ? vfs_write+0xc7/0x210
 ? ksys_write+0x4f/0xc0
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Modules linked in: ccm uinput rfcomm xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter cmac bnep sunrpc squashfs loop intel_rapl_msr iTCO_wdt intel_pmc_bxt intel_rapl_common ee1004 mei_hdcp iTCO_vendor_support x86_pkg_temp_thermal intel_powerclamp coretemp btusb kvm_intel btrtl btbcm btintel bluetooth uvcvideo kvm videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 ecdh_generic ecc videobuf2_common videodev mc iwlmvm snd_hda_codec_hdmi irqbypass rapl intel_cstate
 snd_soc_skl mac80211 snd_soc_sst_ipc intel_uncore snd_soc_sst_dsp snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_compress ac97_bus snd_pcm_dmaengine libarc4 snd_hda_intel snd_intel_dspcfg snd_hda_codec iwlwifi snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm cfg80211 pcspkr joydev i2c_i801 wmi_bmof thinkpad_acpi i2c_smbus mei_me intel_xhci_usb_role_switch snd_timer ledtrig_audio mei roles intel_pch_thermal snd soundcore rfkill ip_tables i915 rtsx_pci_sdmmc mmc_core i2c_algo_bit drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec e1000e ghash_clmulni_intel drm serio_raw rtsx_pci wmi video fuse
CR2: 0000000000004b52