Kerneloops

Similar reports
Problem #706833
Component
kernel Tainted
Last affected version
0:3.10.0-327.el7
Executable
unknown
First occurrence
2020-10-25
Last occurrence
2021-09-07
Unique reports
7
Quality
-13

Statistics

Operating system Unique / Total count
CentOS 7 7 / 93
Operating system Count
CentOS 7 93
Architecture Count
x86_64 93
Related packages Count
kernel 93
 0:3.10.0-327.el7 93

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff816351f1
Build id: 3.10.0-327.el7.x86_64
0x19
2
print_bad_pte
vmlinux 0xffffffff811927cf
Build id: 3.10.0-327.el7.x86_64
0x1af
3
handle_mm_fault
vmlinux 0xffffffff81197972
Build id: 3.10.0-327.el7.x86_64
0xea2
4
__do_page_fault
vmlinux 0xffffffff81640e22
Build id: 3.10.0-327.el7.x86_64
0x152
5
do_page_fault
vmlinux 0xffffffff81641113
Build id: 3.10.0-327.el7.x86_64
0x23
6
page_fault
vmlinux 0xffffffff8163d408
Build id: 3.10.0-327.el7.x86_64
0x28
BUG: Bad page map in process calico  pte:f00002e6f00002e6 pmd:00000000
addr:000000c000606000 vm_flags:00100073 anon_vma:ffff8801004e15c0 mapping:          (null) index:c000606
CPU: 3 PID: 21516 Comm: calico Tainted: G    B          ------------ T 3.10.0-327.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
000000c000606000 0000000087f48e93 ffff880136adbdf0 ffffffff816351f1
ffff880136adbe38 ffffffff811927cf f00002e6f00002e6 000000000c000606
000000c000606000 ffff880176276018 ffff880345ad6510 ffff880029718640
Call Trace:
[<ffffffff816351f1>] dump_stack+0x19/0x1b
[<ffffffff811927cf>] print_bad_pte+0x1af/0x250
[<ffffffff81197972>] handle_mm_fault+0xea2/0xf50
[<ffffffff81640e22>] __do_page_fault+0x152/0x420
[<ffffffff81641113>] do_page_fault+0x23/0x80
[<ffffffff8163d408>] page_fault+0x28/0x30