Kerneloops

Similar reports
Problem #706833
Component
kernel Tainted
Last affected version
0:3.10.0-327.el7
Executable
unknown
First occurrence
2020-12-23
Last occurrence
2021-01-14
Unique reports
2
Quality
-13

Statistics

Operating system Unique / Total count
CentOS 7 2 / 6
Operating system Count
CentOS 7 6
Architecture Count
x86_64 6
Related packages Count
kernel 6
 0:3.10.0-327.el7 6

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff816351f1
Build id: 3.10.0-327.el7.x86_64
0x19
2
print_bad_pte
vmlinux 0xffffffff811927cf
Build id: 3.10.0-327.el7.x86_64
0x1af
3
handle_mm_fault
vmlinux 0xffffffff81197972
Build id: 3.10.0-327.el7.x86_64
0xea2
4
__do_page_fault
vmlinux 0xffffffff81640e22
Build id: 3.10.0-327.el7.x86_64
0x152
5
do_page_fault
vmlinux 0xffffffff81641113
Build id: 3.10.0-327.el7.x86_64
0x23
6
page_fault
vmlinux 0xffffffff8163d408
Build id: 3.10.0-327.el7.x86_64
0x28
BUG: Bad page map in process kubectl  pte:f000dee8f000dee8 pmd:00000000
addr:000000c000c00000 vm_flags:00100073 anon_vma:ffff881e9b30b600 mapping:          (null) index:c000c00
CPU: 23 PID: 19743 Comm: kubectl Tainted: G        W      ------------ T 3.10.0-327.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R720/0DCWD1, BIOS 2.2.2 01/16/2014
000000c000c00000 00000000f4bb025c ffff8806a743fdf0 ffffffff816351f1
ffff8806a743fe38 ffffffff811927cf f000dee8f000dee8 000000000c000c00
000000c000c00000 ffff880213acf030 ffff8809ab827cb0 ffff88006ea8abc0
Call Trace:
[<ffffffff816351f1>] dump_stack+0x19/0x1b
[<ffffffff811927cf>] print_bad_pte+0x1af/0x250
[<ffffffff81197972>] handle_mm_fault+0xea2/0xf50
[<ffffffff81640e22>] __do_page_fault+0x152/0x420
[<ffffffff81641113>] do_page_fault+0x23/0x80
[<ffffffff8163d408>] page_fault+0x28/0x30