Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #24876
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-05
Last occurrence
2021-11-12
Unique reports
1
Quality
-18

Graphs

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Fedora 35 1 / 1
Operating system Count
Fedora 34 1
Fedora 35 1
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? kfree
vmlinux 0x3e2
2
? kfree
vmlinux 0x3e2
3
? kfree
vmlinux 0x3e2
4
? kfree
vmlinux 0x3e2
5
? kfree
vmlinux 0x3e2
BUG: unable to handle page fault for address: ffffffffc09a20c8
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD dda15067 P4D dda15067 PUD dda17067 PMD 102883067 PTE 0
Oops: 0010 [#2] SMP PTI
CPU: 0 PID: 1504 Comm: (-restore) Tainted: G      D    OE     5.12.8-300.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:0xffffffffc09a20c8
Code: Unable to access opcode bytes at RIP 0xffffffffc09a209e.
RSP: 0018:ffff9fb1005c7e88 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: ffff912e56cdb000 RSI: 0000000000000001 RDI: ffff912f40a01340
RBP: ffff9fb1005c7f58 R08: 00000000000000ff R09: 0000000000004000
R10: 00000000000000ff R11: ffff912e56bb8440 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f9d15f2b340(0000) GS:ffff912f5bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc09a209e CR3: 00000001194d6001 CR4: 00000000000706f0
Call Trace:
 ? __x64_sys_execveat+0x60/0x60
 ? __x64_sys_execve+0x5/0x40
 ? __x64_sys_execve+0x5/0x40
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xae
Modules linked in: snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct eset_rtp(OE-) nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set rfkill nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc uas usb_storage snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm intel_rapl_msr pcspkr joydev snd_timer snd vboxguest soundcore intel_rapl_common i2c_piix4 rapl zram ip_tables vmwgfx crct10dif_pclmul drm_kms_helper crc32_pclmul crc32c_intel cec ttm drm serio_raw ghash_clmulni_intel e1000 ata_generic video pata_acpi fuse
CR2: ffffffffc09a20c8