Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #576007
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-16
Last occurrence
2021-06-17
Unique reports
1
Quality
-21

Statistics

Operating system Unique / Total count
Fedora 33 1 / 2
Operating system Count
Fedora 33 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
suspend_devices_and_enter
vmlinux 0xfd
2
suspend_devices_and_enter
vmlinux 0xfd
3
suspend_devices_and_enter
vmlinux 0xfd
4
suspend_devices_and_enter
vmlinux 0xfd
5
suspend_devices_and_enter
vmlinux 0xfd
6
? suspend_devices_and_enter
vmlinux 0xfd
7
suspend_devices_and_enter
vmlinux 0xfd
8
? suspend_devices_and_enter
vmlinux 0xfd
9
suspend_devices_and_enter
vmlinux 0xfd
BUG: unable to handle page fault for address: 000001a0000008df
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0 
Oops: 0002 [#2] SMP NOPTI
CPU: 2 PID: 22 Comm: kworker/2:0 Tainted: G      D           5.8.14-300.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
Workqueue: events bpf_prog_free_deferred
RIP: 0010:btf_put+0x18/0x80
Code: 89 f6 48 8b 04 f0 c3 31 c0 c3 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 85 ff 74 1f 55 b8 ff ff ff ff 53 48 89 fb 48 8d 7f 54 <f0> 0f c1 43 54 83 f8 01 74 08 85 c0 7e 43 5b 5d c3 c3 48 c7 c7 00
RSP: 0018:ffff9d9f404dbe28 EFLAGS: 00010206
RAX: 00000000ffffffff RBX: 000001a00000088b RCX: 0000000000000003
RDX: 0000000000004e01 RSI: 0000000000000202 RDI: 000001a0000008df
RBP: 0000000000000202 R08: ffff8fae274d2000 R09: ffffffffadadc048
R10: 0000000000000000 R11: ffff8fae9f1ccb48 R12: ffff8faeb21f9400
R13: ffff8fae908e3218 R14: ffff8faeb95600c0 R15: ffff8faeb21f9610
FS:  0000000000000000(0000) GS:ffff8faeb9e80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000001a0000008df CR3: 00000000a68b4006 CR4: 00000000003606e0
Call Trace:
 bpf_map_put+0x59/0xb0
 __bpf_free_used_maps+0x6f/0x80
 bpf_prog_free_deferred+0x20/0x100
 process_one_work+0x1b4/0x370
 worker_thread+0x53/0x3e0
 ? process_one_work+0x370/0x370
 kthread+0x11b/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x1f/0x30
Modules linked in: uinput nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter snd_seq_midi snd_seq_midi_event vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr intel_rapl_common rapl vmw_balloon snd_ens1371 snd_ac97_codec gameport ac97_bus snd_rawmidi snd_seq snd_seq_device snd_pcm joydev snd_timer snd vmw_vmci soundcore i2c_piix4 zram ip_tables crct10dif_pclmul crc32_pclmul crc32c_intel vmwgfx drm_kms_helper cec ghash_clmulni_intel ttm serio_raw drm mptspi scsi_transport_spi mptscsih e1000 mptbase ata_generic pata_acpi fuse
CR2: 000001a0000008df