Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-11-20
Last occurrence
2021-11-20
Unique reports
1
Quality
-55

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? _raw_spin_lock_irq
vmlinux 0x21
2
? _raw_spin_lock_irq
vmlinux 0x21
3
? _raw_spin_lock_irq
vmlinux 0x21
4
? _raw_spin_lock_irq
vmlinux 0x21
5
? _raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
? _raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
? _raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
13
? _raw_spin_lock_irq
vmlinux 0x21
14
? _raw_spin_lock_irq
vmlinux 0x21
15
? _raw_spin_lock_irq
vmlinux 0x21
16
? _raw_spin_lock_irq
vmlinux 0x21
17
? _raw_spin_lock_irq
vmlinux 0x21
BUG: kernel NULL pointer dereference, address: 0000000000000250
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP PTI
CPU: 0 PID: 13550 Comm: pool Tainted: P      D    OE     5.11.12-300.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:bubblefs_lookup+0x3b/0x50 [bubblefs]
Code: 48 89 f3 e8 3d 13 49 ce 48 8b b5 50 02 00 00 48 c7 c7 b1 20 6e c0 48 83 c6 04 e8 26 13 49 ce 48 8b 43 30 48 c7 c7 c5 20 6e c0 <48> 8b b0 50 02 00 00 48 83 c6 04 e8 0b 13 49 ce 31 c0 5b 5d c3 0f
RSP: 0018:ffffb4e5021bfc58 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff97d7bfd17780 RCX: 0000000000000027
RDX: ffff97d89bc18ac8 RSI: 0000000000000001 RDI: ffffffffc06e20c5
RBP: ffff97d7bff67c80 R08: 0000000000000000 R09: ffffb4e5021bfa90
R10: ffffb4e5021bfa88 R11: ffffffff8fb44f08 R12: ffff97d7bfd17780
R13: 0000000000000009 R14: ffffb4e5021bfd50 R15: 0000000000000009
FS:  00007fa4e5011640(0000) GS:ffff97d89bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000250 CR3: 0000000051886006 CR4: 00000000000706f0
Call Trace:
 ? __lookup_slow+0x74/0x130
 ? walk_component+0x11b/0x190
 ? path_init+0x2bd/0x3e0
 ? path_lookupat+0x6d/0x1b0
 ? filename_lookup+0x9b/0x180
 ? strncpy_from_user+0x81/0x190
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 ? vfs_statx+0x64/0x100
 ? update_rq_clock+0x33/0x1a0
 ? __do_sys_newfstatat+0x1e/0x40
 ? __set_task_comm+0x38/0x140
 ? __do_sys_prctl+0x147/0x6f0
 ? __set_current_blocked+0x36/0x50
 ? exit_to_user_mode_prepare+0x1e/0x1b0
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Modules linked in: bubblefs(POE) loop uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink rfkill ip6table_filter ip6_tables iptable_filter sunrpc intel_rapl_msr intel_rapl_common intel_powerclamp snd_intel8x0 snd_ac97_codec rapl ac97_bus snd_seq joydev snd_seq_device snd_pcm snd_timer snd soundcore vboxguest i2c_piix4 pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm drm e1000 crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw ata_generic pata_acpi video fuse [last unloaded: bubblefs]
CR2: 0000000000000250