Kerneloops

Similar reports
Problem #706833
Component
kernel Tainted
Last affected version
0:3.10.0-327.28.3.el7
Executable
unknown
First occurrence
2021-09-29
Last occurrence
2021-09-29
Unique reports
1
Quality
-18

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-327.28.3.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff81636453
Build id: 3.10.0-327.28.3.el7.x86_64
0x19
2
print_bad_pte
vmlinux 0xffffffff81192c3f
Build id: 3.10.0-327.28.3.el7.x86_64
0x1af
3
handle_mm_fault
vmlinux 0xffffffff81197de2
Build id: 3.10.0-327.28.3.el7.x86_64
0xea2
4
? update_curr
vmlinux 0xffffffff810c1537
Build id: 3.10.0-327.28.3.el7.x86_64
0x67
5
__do_page_fault
vmlinux 0xffffffff81642030
Build id: 3.10.0-327.28.3.el7.x86_64
0x150
6
do_page_fault
vmlinux 0xffffffff81642353
Build id: 3.10.0-327.28.3.el7.x86_64
0x23
7
page_fault
vmlinux 0xffffffff8163e648
Build id: 3.10.0-327.28.3.el7.x86_64
0x28
BUG: Bad page map in process go  pte:64396264 pmd:00000000
addr:000000c000a08000 vm_flags:00100073 anon_vma:ffff88202505a900 mapping:          (null) index:c000a08
CPU: 12 PID: 57270 Comm: go Tainted: G    B   W  OE  ------------ T 3.10.0-327.28.3.el7.x86_64 #1
Hardware name: Dell PowerEdge R630/0CNCJW, BIOS 1.3.6 06/03/2015
000000c000a08000 0000000074a3103f ffff8811b621fde8 ffffffff81636453
ffff8811b621fe30 ffffffff81192c3f 0000000064396264 000000000c000a08
000000c000a08000 ffff8815365bd028 ffff88123ac625e8 ffff880017ac6400
Call Trace:
[<ffffffff81636453>] dump_stack+0x19/0x1b
[<ffffffff81192c3f>] print_bad_pte+0x1af/0x250
[<ffffffff81197de2>] handle_mm_fault+0xea2/0xf50
[<ffffffff810c1537>] ? update_curr+0x67/0x150
[<ffffffff81642030>] __do_page_fault+0x150/0x450
[<ffffffff81642353>] do_page_fault+0x23/0x80
[<ffffffff8163e648>] page_fault+0x28/0x30