Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-16
Last occurrence
2021-02-16
Unique reports
1
Quality
-17

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: 0000000000400000
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0 
Oops: 0002 [#1] SMP NOPTI
CPU: 0 PID: 2088 Comm: pkla-check-auth Not tainted 5.8.15-301.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:__rb_insert_augmented+0x5f/0x1d0
Code: 0f 84 a7 00 00 00 49 8b 40 08 4c 89 c3 48 39 f8 0f 84 cd 00 00 00 48 89 45 10 49 89 68 08 48 85 c0 74 0a 48 89 e9 48 83 c9 01 <48> 89 08 48 8b 45 00 49 89 00 48 89 5d 00 48 83 e0 fc 74 58 48 3b
RSP: 0018:ffffb43843923d58 EFLAGS: 00010282
RAX: 0000000000400000 RBX: ffff9fddd59e4440 RCX: ffff9fddd5fa4cd9
RDX: ffffffff98291730 RSI: ffff9fddd9e511b8 RDI: ffff9fdd86ee3760
RBP: ffff9fddd5fa4cd8 R08: ffff9fddd59e4440 R09: 0000000000000000
R10: ffff9fddd9e511b8 R11: ffff9fdd86ee3760 R12: ffff9fddd9e511b8
R13: ffff9fdd86ee34d0 R14: ffff9fdd86ee3708 R15: ffff9fdd86ee37d0
FS:  0000000000000000(0000) GS:ffff9fdddbc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000400000 CR3: 00000000d6fb4006 CR4: 00000000000606f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ? _cond_resched+0x16/0x40
 vma_link+0x19d/0x1c0
 mmap_region+0x477/0x6e0
 do_mmap+0x42f/0x540
 vm_mmap_pgoff+0xb0/0xf0
 ksys_mmap_pgoff+0x18a/0x250
 do_syscall_64+0x4d/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fb5501b8a86
Code: 5d 41 5c c3 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 5a 5b 5d c3 0f 1f 80 00 00 00 00 c7 05 c6 f6
RSP: 002b:00007ffdb4f9f328 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 0000000000000802 RCX: 00007fb5501b8a86
RDX: 0000000000000001 RSI: 000000000001f170 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000000
R10: 0000000000000802 R11: 0000000000000246 R12: 00007fb550185000
R13: 000000000001e000 R14: 0000000000000000 R15: 0000000000000000
Modules linked in: uinput nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink rfkill ip6table_filter ip6_tables iptable_filter sunrpc snd_intel8x0 snd_ac97_codec intel_rapl_msr intel_rapl_common intel_powerclamp ac97_bus snd_seq snd_seq_device rapl snd_pcm joydev snd_timer snd soundcore i2c_piix4 vboxguest pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm drm crct10dif_pclmul crc32_pclmul crc32c_intel ata_generic ghash_clmulni_intel e1000 serio_raw pata_acpi video fuse
CR2: 0000000000400000