Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-11-20
Last occurrence
2021-11-20
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? _raw_spin_lock_irq
vmlinux 0x21
2
? _raw_spin_lock_irq
vmlinux 0x21
3
? _raw_spin_lock_irq
vmlinux 0x21
4
? _raw_spin_lock_irq
vmlinux 0x21
5
? _raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
? _raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
? _raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
13
? _raw_spin_lock_irq
vmlinux 0x21
BUG: kernel NULL pointer dereference, address: 0000000000000250
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 80000000d8640067 P4D 80000000d8640067 PUD d86d4067 PMD 0 
Oops: 0000 [#5] SMP PTI
CPU: 0 PID: 13564 Comm: git Tainted: P      D    OE     5.11.12-300.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:bubblefs_lookup+0x3b/0x50 [bubblefs]
Code: 48 89 f3 e8 3d 13 49 ce 48 8b b5 50 02 00 00 48 c7 c7 b1 20 6e c0 48 83 c6 04 e8 26 13 49 ce 48 8b 43 30 48 c7 c7 c5 20 6e c0 <48> 8b b0 50 02 00 00 48 83 c6 04 e8 0b 13 49 ce 31 c0 5b 5d c3 0f
RSP: 0018:ffffb4e503d8fc58 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff97d7d5578780 RCX: 0000000000000027
RDX: ffff97d89bc18ac8 RSI: 0000000000000001 RDI: ffffffffc06e20c5
RBP: ffff97d7bff67c80 R08: 0000000000000000 R09: ffffb4e503d8fa90
R10: ffffb4e503d8fa88 R11: ffffffff8fb44f08 R12: ffff97d7d5578780
R13: 0000000000000001 R14: ffffb4e503d8fd50 R15: 0000000000000001
FS:  00007f72d1048c00(0000) GS:ffff97d89bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000250 CR3: 00000000d875e002 CR4: 00000000000706f0
Call Trace:
 ? __lookup_slow+0x74/0x130
 ? walk_component+0x11b/0x190
 ? security_inode_permission+0x30/0x50
 ? path_lookupat+0x6d/0x1b0
 ? filename_lookup+0x9b/0x180
 ? strncpy_from_user+0x81/0x190
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 ? vfs_statx+0x64/0x100
 ? __do_sys_newstat+0x26/0x40
 ? exit_to_user_mode_prepare+0x7e/0x1b0
 ? do_syscall_64+0x33/0x40
 ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Modules linked in: bubblefs(POE) loop uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink rfkill ip6table_filter ip6_tables iptable_filter sunrpc intel_rapl_msr intel_rapl_common intel_powerclamp snd_intel8x0 snd_ac97_codec rapl ac97_bus snd_seq joydev snd_seq_device snd_pcm snd_timer snd soundcore vboxguest i2c_piix4 pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm drm e1000 crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw ata_generic pata_acpi video fuse [last unloaded: bubblefs]
CR2: 0000000000000250