Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-28
Last occurrence
2021-02-28
Unique reports
1
Quality
-17

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
? ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: 000000000002fa8c
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 5 PID: 2568 Comm: kworker/u64:17 Tainted: G    B             5.8.15-301.fc33.x86_64 #1
Hardware name: System manufacturer System Product Name/ROG STRIX B450-F GAMING, BIOS 3103 06/17/2020
Workqueue: netns cleanup_net
RIP: 0010:inet_twsk_purge+0xd6/0x150
Code: c0 75 64 4c 89 ff e8 99 fd ff ff be 00 02 00 00 48 c7 c7 9f 3b a5 a6 e8 58 f0 68 ff e8 53 c2 11 00 49 8b 1c 24 f6 c3 01 75 14 <0f> b6 43 aa 3c 06 0f 84 4d ff ff ff 48 8b 1b f6 c3 01 74 ec 48 d1
RSP: 0018:ffffbc5e42267e08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 000000000002fae2 RCX: 0000000000000006
RDX: 0000000000000007 RSI: 000000000000000a RDI: ffffffffa859a880
RBP: 000000000000000a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff9eb6592beb88
R13: 0000000000017d71 R14: 0000000000017d71 R15: ffff9eb63dc44d18
FS:  0000000000000000(0000) GS:ffff9eb65e940000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000002fa8c CR3: 00000007f1fd6000 CR4: 0000000000340ee0
Call Trace:
 cleanup_net+0x1ff/0x320
 process_one_work+0x1b4/0x370
 worker_thread+0x53/0x3e0
 ? process_one_work+0x370/0x370
 kthread+0x11b/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x22/0x30
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc vfat fat snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_usb_audio snd_hda_intel snd_intel_dspcfg snd_usbmidi_lib snd_hda_codec snd_hda_core snd_rawmidi snd_hwdep uvcvideo snd_seq snd_seq_device videobuf2_vmalloc snd_pcm videobuf2_memops videobuf2_v4l2 videobuf2_common snd_timer videodev ucsi_ccg typec_ucsi typec edac_mce_amd eeepc_wmi asus_wmi snd mc kvm sparse_keymap irqbypass sp5100_tco rfkill soundcore k10temp i2c_piix4 i2c_nvidia_gpu rapl pcspkr gpio_amdpt wmi_bmof gpio_generic acpi_cpufreq zram ip_tables
 dm_crypt uas usb_storage nouveau radeon video mxm_wmi drm_kms_helper cec igb ttm crct10dif_pclmul crc32_pclmul crc32c_intel drm ccp ghash_clmulni_intel dca i2c_algo_bit wmi pinctrl_amd fuse
CR2: 000000000002fa8c