Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #24876
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-20
Last occurrence
2021-04-20
Unique reports
1
Quality
-19

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? kfree
vmlinux 0xb3
2
? kfree
vmlinux 0xb3
3
? kfree
vmlinux 0xb3
4
? kfree
vmlinux 0xb3
5
? kfree
vmlinux 0xb3
BUG: unable to handle page fault for address: ffffffffc039a8d8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD b5a15067 P4D b5a15067 PUD b5a17067 PMD 100366067 PTE 101e28061
Oops: 0003 [#2] SMP PTI
CPU: 1 PID: 488 Comm: systemd-udevd Tainted: G      D W  OE     5.11.14-200.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:0xffffffffc039a8d8
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffffa6a7c0223e50 EFLAGS: 00010202
RAX: ffffffffc039a8d8 RBX: 000000007fff0000 RCX: 000000007fff0000
RDX: ffff9b7bc0968000 RSI: ffffa6a7c019b038 RDI: ffffa6a7c0223e68
RBP: ffff9b7bc6147400 R08: 00007ffde09acaf0 R09: 00000000ffffff9c
R10: 0000000000000000 R11: 0000000000000000 R12: 000000007fff0000
R13: ffffa6a7c0223e68 R14: 0000000000000000 R15: ffffa6a7c019b000
FS:  00007fe7b4b75380(0000) GS:ffff9b7bdfb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc039a8d8 CR3: 0000000102316004 CR4: 00000000000706e0
Call Trace:
 ? __seccomp_filter+0xc9/0x6e0
 ? mntput_no_expire+0x37/0x250
 ? syscall_trace_enter.constprop.0+0x99/0x1c0
 ? do_syscall_64+0xf/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Modules linked in: snd_hda_intel snd_intel_dspcfg soundwire_intel soundwire_generic_allocation snd_soc_core snd_compress snd_pcm_dmaengine soundwire_cadence iTCO_wdt snd_hda_codec intel_pmc_bxt intel_rapl_msr sunrpc iTCO_vendor_support snd_hda_core ac97_bus snd_hwdep snd_seq snd_seq_device snd_pcm intel_rapl_common rapl vfat fat pcspkr snd_timer snd joydev lpc_ich soundcore i2c_piix4 zram ip_tables vmwgfx drm_kms_helper cec ttm drm crct10dif_pclmul crc32_pclmul crc32c_intel nvme ghash_clmulni_intel nvme_core serio_raw e1000 vboxguest(OE) video fuse
CR2: ffffffffc039a8d8