Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-09-02
Last occurrence
2021-09-02
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? _raw_spin_lock_irq
vmlinux 0x21
2
? _raw_spin_lock_irq
vmlinux 0x21
3
? _raw_spin_lock_irq
vmlinux 0x21
4
? _raw_spin_lock_irq
vmlinux 0x21
5
? _raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
? _raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
? _raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
13
? _raw_spin_lock_irq
vmlinux 0x21
14
? _raw_spin_lock_irq
vmlinux 0x21
15
? _raw_spin_lock_irq
vmlinux 0x21
invalid opcode: 0000 [#1] SMP NOPTI
CPU: 1 PID: 1645 Comm: dnf Not tainted 5.11.12-300.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:btrfs_lookup_dentry+0xb/0x510
Code: c4 10 5b 4c 89 e0 41 5c c3 49 c7 c4 f4 ff ff ff 48 83 c4 10 4c 89 e0 5b 41 5c c3 0f 1f 40 00 0f 1f 44 00 00 e7 48 89 e5 41 57 <49> c7 e7 dc ff ff ff 41 56 41 e7 41 54 41 52 53 48 83 e7 40 44 8b
RSP: 0018:ffffb1c6c357fc50 EFLAGS: 00010206
RAX: ffffffff974a4f50 RBX: ffff983b821ca900 RCX: 0000000000000006
RDX: 0000000000000008 RSI: ffff983b821c9840 RDI: ffff983bae71cad8
RBP: 00000000c357fc58 R08: 000000000000000d R09: ffff983b81a97034
R10: 0000000000000000 R11: ffffff8598d1c7d1 R12: ffff983b821c9840
R13: 0000000000000008 R14: ffffb1c6c357fd50 R15: 0000000000000008
FS:  00007f2e65965740(0000) GS:ffff983bfdd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4695616000 CR3: 000000004d32e000 CR4: 00000000000506e0
Call Trace:
 ? btrfs_lookup+0xe/0x30
 ? __lookup_slow+0x74/0x130
 ? walk_component+0x11b/0x190
 ? path_init+0x2bd/0x3e0
 ? path_lookupat+0x6d/0x1b0
 ? filename_lookup+0x9b/0x180
 ? strncpy_from_user+0x81/0x190
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 ? vfs_statx+0x64/0x100
 ? __do_sys_newfstatat+0x1e/0x40
 ? path_setxattr+0x60/0xb0
 ? exit_to_user_mode_prepare+0x1e/0x1b0
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Modules linked in: uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter vboxsf sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq edac_mce_amd kvm_amd ccp kvm snd_seq_device snd_pcm irqbypass snd_timer snd soundcore joydev pcspkr vboxguest i2c_piix4 zram ip_tables vmwgfx drm_kms_helper cec ttm crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel e1000 serio_raw ata_generic pata_acpi video fuse