Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533103
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-05-25
Last occurrence
2021-05-25
Unique reports
1
Quality
-46

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? pfifo_fast_enqueue
vmlinux 0x150
2
? pfifo_fast_enqueue
vmlinux 0x150
3
? pfifo_fast_enqueue
vmlinux 0x150
4
? pfifo_fast_enqueue
vmlinux 0x150
5
? pfifo_fast_enqueue
vmlinux 0x150
6
? pfifo_fast_enqueue
vmlinux 0x150
7
? pfifo_fast_enqueue
vmlinux 0x150
8
? pfifo_fast_enqueue
vmlinux 0x150
9
? pfifo_fast_enqueue
vmlinux 0x150
10
? pfifo_fast_enqueue
vmlinux 0x150
11
? pfifo_fast_enqueue
vmlinux 0x150
12
? pfifo_fast_enqueue
vmlinux 0x150
13
? pfifo_fast_enqueue
vmlinux 0x150
14
? pfifo_fast_enqueue
vmlinux 0x150
15
? pfifo_fast_enqueue
vmlinux 0x150
BUG: unable to handle page fault for address: 00000037433ac9e5
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#2] SMP PTI
CPU: 2 PID: 2936 Comm: Netlink Monitor Tainted: G      D           5.12.5-200.fc33.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PV/H81M-S2PV, BIOS F6 PO 04/18/2014
RIP: 0010:0x37433ac9e5
Code: Unable to access opcode bytes at RIP 0x37433ac9bb.
RSP: 0018:ffffaacd83a13b48 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 00000037433ac9e5 RCX: 0000000000000000
RDX: ffffaacd83a13bc8 RSI: ffff8e278302c600 RDI: ffff8e28431cfd00
RBP: ffff8e278302c600 R08: 0000000000000001 R09: 0000000000000000
R10: 00000000000001cd R11: 000000007ffff000 R12: ffff8e28431cfd00
R13: 0000000000000000 R14: 0000000000000002 R15: 00000000ffffffa1
FS:  00007f973cb9e640(0000) GS:ffff8e286b300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000037433ac9e5 CR3: 00000001081c4002 CR4: 00000000001706e0
Call Trace:
 ? rtnetlink_rcv_msg+0x2ba/0x360
 ? rtnl_calcit.isra.0+0x100/0x100
 ? netlink_rcv_skb+0x50/0xf0
 ? netlink_unicast+0x1d3/0x290
 ? netlink_sendmsg+0x233/0x450
 ? sock_sendmsg+0x5e/0x60
 ? ____sys_sendmsg+0x22e/0x270
 ? import_iovec+0x17/0x20
 ? sendmsg_copy_msghdr+0x5c/0x80
 ? _copy_from_user+0x3c/0x80
 ? ___sys_sendmsg+0x75/0xb0
 ? ___sys_recvmsg+0x7b/0xe0
 ? __sys_sendmsg+0x49/0x80
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xae
Modules linked in: uinput xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter vfat fat intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp snd_hda_codec_realtek snd_hda_codec_generic kvm_intel ledtrig_audio snd_hda_codec_hdmi kvm snd_hda_intel snd_intel_dspcfg irqbypass snd_intel_sdw_acpi rapl snd_hda_codec intel_cstate snd_hda_core intel_uncore snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd mei_hdcp ppdev joydev at24 pcspkr iTCO_wdt intel_pmc_bxt iTCO_vendor_support soundcore
 i2c_i801 lpc_ich parport_pc mei_me parport i2c_smbus mei auth_rpcgss sunrpc zram ip_tables amdgpu iommu_v2 gpu_sched i915 radeon drm_ttm_helper ttm crct10dif_pclmul crc32_pclmul crc32c_intel i2c_algo_bit drm_kms_helper ghash_clmulni_intel cec drm r8169 video fuse
CR2: 00000037433ac9e5