Kerneloops

Similar reports
Problem #706833
Component
kernel Tainted
Last affected version
0:3.10.0-327.el7
Executable
unknown
First occurrence
2021-05-22
Last occurrence
2021-05-22
Unique reports
1
Quality
-19

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-327.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff816351f1
Build id: 3.10.0-327.el7.x86_64
0x19
2
print_bad_pte
vmlinux 0xffffffff811927cf
Build id: 3.10.0-327.el7.x86_64
0x1af
3
handle_mm_fault
vmlinux 0xffffffff81197972
Build id: 3.10.0-327.el7.x86_64
0xea2
4
? do_futex
vmlinux 0xffffffff810e5092
Build id: 3.10.0-327.el7.x86_64
0x122
5
? update_curr
vmlinux 0xffffffff810c1457
Build id: 3.10.0-327.el7.x86_64
0x67
6
__do_page_fault
vmlinux 0xffffffff81640e22
Build id: 3.10.0-327.el7.x86_64
0x152
7
do_page_fault
vmlinux 0xffffffff81641113
Build id: 3.10.0-327.el7.x86_64
0x23
8
page_fault
vmlinux 0xffffffff8163d408
Build id: 3.10.0-327.el7.x86_64
0x28
BUG: Bad page map in process docker  pte:f000def8f000def8 pmd:00000000
addr:000000c000600010 vm_flags:00100073 anon_vma:ffff8804bfc37bc0 mapping:          (null) index:c000600
CPU: 3 PID: 26697 Comm: docker Tainted: G           OE  ------------   3.10.0-327.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R610/0W260J, BIOS 6.4.0 07/23/2013
000000c000600010 000000004f3d69a6 ffff88002ac47df0 ffffffff816351f1
ffff88002ac47e38 ffffffff811927cf f000def8f000def8 000000000c000600
000000c000600010 ffff880397db1018 ffff8803942697a0 ffff8800915a0c80
Call Trace:
[<ffffffff816351f1>] dump_stack+0x19/0x1b
[<ffffffff811927cf>] print_bad_pte+0x1af/0x250
[<ffffffff81197972>] handle_mm_fault+0xea2/0xf50
[<ffffffff810e5092>] ? do_futex+0x122/0x5b0
[<ffffffff810c1457>] ? update_curr+0x67/0x150
[<ffffffff81640e22>] __do_page_fault+0x152/0x420
[<ffffffff81641113>] do_page_fault+0x23/0x80
[<ffffffff8163d408>] page_fault+0x28/0x30