Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-01-08
Last occurrence
2021-08-14
Unique reports
9
Quality
-18

Statistics

Operating system Unique / Total count
Fedora 33 9 / 9
Operating system Count
Fedora 33 9
Architecture Count
x86_64 9

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
? ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
? ktime_get
vmlinux 0x38
5
? ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
WARNING: CPU: 0 PID: 0 at arch/x86/kernel/cpu/mtrr/cleanup.c:978 mtrr_trim_uncached_memory+0x2a8/0x2d3
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 5.8.15-301.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
RIP: 0010:mtrr_trim_uncached_memory+0x2a8/0x2d3
Code: ff ff 48 01 c5 48 85 ed 0f 84 93 fd ff ff 48 89 ee 48 c7 c7 98 99 38 87 48 c1 ee 14 e8 68 d6 00 fe 83 3d 43 87 12 00 00 75 02 <0f> 0b 48 c7 c7 03 97 38 87 41 bd 01 00 00 00 e8 4b d6 00 fe e8 42
RSP: 0000:ffffffff87a03e48 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
RAX: 000000000000004a RBX: 0000000000000001 RCX: 0000000000000031
RDX: 0000000000000001 RSI: 0000000000000082 RDI: 0000000000000047
RBP: 0000000000400000 R08: 0000000000000031 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000083f400
R13: ffffffff88269470 R14: ffffffff88267d00 R15: 0000000000000008
FS:  0000000000000000(0000) GS:ffffffff880fb000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88860ba0fff8 CR3: 000000060c198000 CR4: 00000000000006a0
Call Trace:
 ? setup_arch+0x562/0xccf
 ? slab_is_available+0x5/0x10
 ? security_add_hooks+0x64/0x89
 ? start_kernel+0x5c/0x804
 ? load_ucode_bsp+0x34/0xcd
 ? secondary_startup_64+0xb6/0xc0
random: get_random_bytes called from __warn+0xaf/0xf6 with crng_init=0