Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-07-30
Last occurrence
2021-07-30
Unique reports
1
Quality
-20

Statistics

Operating system Unique / Total count
Fedora 33 1 / 3
Operating system Count
Fedora 33 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
9
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: fffff4a775eee061
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 2 PID: 12716 Comm: lsof Tainted: G             L    5.8.15-301.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:d_path+0x1f/0x110
Code: 8b 77 58 8b 7f 28 e9 10 fe ff ff 0f 1f 44 00 00 55 48 63 c2 49 89 c0 48 01 f0 48 89 e5 48 83 ec 20 4c 8b 4f 08 48 89 44 24 08 <49> 8b 41 60 89 54 24 04 48 85 c0 74 24 48 8b 40 48 48 85 c0 74 1b
RSP: 0018:ffff9ddcc2c07df8 EFLAGS: 00010282
RAX: ffff9087bae9c000 RBX: ffff90878ff1e960 RCX: 0000000000001000
RDX: 0000000000000f1c RSI: ffff9087bae9b0e4 RDI: ffff9087bb923010
RBP: ffff9ddcc2c07e18 R08: 0000000000000f1c R09: fffff4a775eee001
R10: 00007f0416357000 R11: ffff9087bae9b0c9 R12: ffffffffac45cdee
R13: ffff90878ff1e988 R14: ffff90878ff1e960 R15: ffff90878ff1e998
FS:  00007f34d7f7b840(0000) GS:ffff9087bdd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff4a775eee061 CR3: 0000000005de2003 CR4: 00000000000606e0
Call Trace:
 ? show_vma_header_prefix+0x12a/0x150
 seq_path+0x36/0xa0
 show_map_vma+0x6a/0x140
 show_map+0xa/0x10
 seq_read+0x308/0x460
 vfs_read+0xa0/0x180
 ksys_read+0x4f/0xc0
 do_syscall_64+0x4d/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f34d85b83f2
Code: c0 e9 b2 fe ff ff 50 48 8d 3d 8a 41 0a 00 e8 75 f0 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
RSP: 002b:00007ffcd9560eb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 000055a2a7f2a360 RCX: 00007f34d85b83f2
RDX: 0000000000001000 RSI: 000055a2a7f39ae0 RDI: 0000000000000004
RBP: 00007f34d868d320 R08: 0000000000000004 R09: 0000000000000000
R10: 00007f34d863cac0 R11: 0000000000000246 R12: 000055a2a7f2a360
R13: 00007f34d868c720 R14: 0000000000000d68 R15: 0000000000000d68
Modules linked in: nft_objref nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat iptable_mangle iptable_raw iptable_security ip6table_filter ip6_tables iptable_filter ip_tables uinput nf_conntrack_netbios_ns nf_conntrack_broadcast nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc intel_rapl_msr intel_rapl_common joydev pcspkr vboxguest i2c_piix4 zram vmwgfx drm_kms_helper cec ttm crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel serio_raw e1000 ata_generic pata_acpi video fuse [last unloaded: ip_tables]
CR2: fffff4a775eee061