Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-01-08
Last occurrence
2022-01-08
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? kfree
vmlinux 0xb3
2
kfree
vmlinux 0xb3
3
kfree
vmlinux 0xb3
4
? kfree
vmlinux 0xb3
5
? kfree
vmlinux 0xb3
6
kfree
vmlinux 0xb3
7
kfree
vmlinux 0xb3
8
kfree
vmlinux 0xb3
9
kfree
vmlinux 0xb3
10
? kfree
vmlinux 0xb3
11
kfree
vmlinux 0xb3
12
? kfree
vmlinux 0xb3
13
kfree
vmlinux 0xb3
NETDEV WATCHDOG: enp0s3 (e1000): transmit queue 0 timed out
WARNING: CPU: 2 PID: 24 at net/sched/sch_generic.c:442 dev_watchdog+0x24d/0x260
Modules linked in: xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device intel_rapl_msr snd_pcm intel_rapl_common joydev rapl snd_timer snd pcspkr i2c_piix4 soundcore vboxguest zram ip_tables vmwgfx drm_kms_helper cec ttm crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel serio_raw e1000 ata_generic pata_acpi video fuse
CPU: 2 PID: 24 Comm: ksoftirqd/2 Tainted: G             L    5.11.14-200.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:dev_watchdog+0x24d/0x260
Code: 09 a3 fd ff eb a9 4c 89 f7 c6 05 ca c8 2f 01 01 e8 18 80 fa ff 44 89 e9 4c 89 f6 48 c7 c7 f0 79 48 a5 48 89 c2 e8 89 29 16 00 <0f> 0b eb 8a 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44
RSP: 0018:ffffa9cc400dfdb0 EFLAGS: 00010282
RAX: 000000000000003b RBX: ffff9552c7ce9e00 RCX: ffff9553ceb18ac8
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9553ceb18ac0
RBP: ffff9552c22f03dc R08: 0000000000000000 R09: ffffa9cc400dfbe0
R10: ffffa9cc400dfbd8 R11: ffffffffa5b44f08 R12: ffff9552c22f0480
R13: 0000000000000000 R14: ffff9552c22f0000 R15: ffff9552c7ce9e80
FS:  0000000000000000(0000) GS:ffff9553ceb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000023af717578f8 CR3: 0000000151218006 CR4: 00000000000706e0
Call Trace:
 ? pfifo_fast_enqueue+0x150/0x150
 call_timer_fn+0x29/0xf0
 __run_timers.part.0+0x1af/0x210
 ? kvm_sched_clock_read+0xd/0x20
 ? sched_clock+0x5/0x10
 run_timer_softirq+0x26/0x50
 __do_softirq+0xcf/0x28f
 run_ksoftirqd+0x26/0x40
 smpboot_thread_fn+0xc5/0x160
 ? smpboot_register_percpu_thread+0xf0/0xf0
 kthread+0x11b/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x22/0x30