Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #169217
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-04
Last occurrence
2021-06-04
Unique reports
1
Quality
-22

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Operating system Count
Fedora 34 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0x3e2
2
kfree
vmlinux 0x3e2
3
kfree
vmlinux 0x3e2
4
kfree
vmlinux 0x3e2
5
? kfree
vmlinux 0x3e2
6
? kfree
vmlinux 0x3e2
7
? kfree
vmlinux 0x3e2
8
? kfree
vmlinux 0x3e2
WARNING: CPU: 1 PID: 383 at arch/x86/include/asm/kfence.h:44 kfence_protect_page+0x21/0x80
Modules linked in: uinput rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc ccm cmac bnep nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc vfat fat ath9k ath9k_common intel_rapl_msr intel_rapl_common ath9k_hw mac80211 x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel ath kvm mei_hdcp iTCO_wdt intel_pmc_bxt iTCO_vendor_support at24 dell_laptop cfg80211 dell_smm_hwmon uvcvideo snd_hda_codec_realtek ath3k snd_hda_codec_generic ledtrig_audio btusb snd_hda_codec_hdmi videobuf2_vmalloc videobuf2_memops videobuf2_v4l2
 snd_hda_intel videobuf2_common snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec btrtl btbcm btintel videodev snd_hda_core snd_hwdep irqbypass rapl bluetooth snd_seq intel_cstate intel_uncore rtsx_usb_ms snd_seq_device memstick snd_pcm dell_wmi dell_smbios dcdbas mc joydev pcspkr dell_wmi_descriptor sparse_keymap ecdh_generic wmi_bmof ecc rfkill i2c_i801 mei_me lpc_ich i2c_smbus snd_timer mei snd libarc4 soundcore dw_dmac zram ip_tables i915 nouveau drm_ttm_helper ttm i2c_algo_bit drm_kms_helper hid_rmi rmi_core hid_logitech_hidpp cec mxm_wmi drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw r8169 hid_logitech_dj wmi i2c_hid_acpi i2c_hid video pinctrl_lynxpoint rtsx_usb_sdmmc mmc_core rtsx_usb fuse
CPU: 1 PID: 383 Comm: irq/39-DLL0662: Tainted: G      D W         5.12.8-300.fc34.x86_64 #1
Hardware name: Dell Inc. Vostro 3446/06XK30, BIOS A15 05/23/2019
RIP: 0010:kfence_protect_page+0x21/0x80
Code: ff 0f 1f 84 00 00 00 00 00 55 48 89 fd 53 89 f3 48 83 ec 08 48 8d 74 24 04 e8 db e0 d7 ff 48 85 c0 74 07 83 7c 24 04 01 74 0b <0f> 0b 48 83 c4 08 31 c0 5b 5d c3 48 8b 38 48 89 c2 84 db 75 36 48
RSP: 0018:ffffa2e58055fd70 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa2e58055fd74
RDX: ffffa2e58055fd74 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000010
R13: ffffa2e58055fe18 R14: 0000000000000001 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff892c67a80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000001 CR3: 0000000225e7c006 CR4: 00000000001706e0
Call Trace:
 kfence_unprotect+0x13/0x30
 page_fault_oops+0x89/0x270
 exc_page_fault+0x67/0x150
 asm_exc_page_fault+0x1e/0x30
RIP: 0010:0x1
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd7.
RSP: 0018:ffffa2e58055fec0 EFLAGS: 00010246
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffa2e58055fed0
RBP: ffff892b48e72780 R08: ffffffffb5a5e6c0 R09: 0000000000000000
R10: ffffa2e58055fa01 R11: 0000000000000000 R12: ffff892b48e733c4
R13: 0000000000000000 R14: ffff892b48e72780 R15: 0000000000000001
 ? task_work_run+0x65/0xa0
 ? do_exit+0x351/0xab0
 ? kthread+0x11b/0x140
 ? rewind_stack_do_exit+0x17/0x20