Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #815977
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-01-12
Last occurrence
2021-01-12
Unique reports
1
Quality
-22

Statistics

Operating system Unique / Total count
Fedora 31 1 / 1
Operating system Count
Fedora 31 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
pfifo_fast_enqueue
vmlinux 0x150
2
? pfifo_fast_enqueue
vmlinux 0x150
3
pfifo_fast_enqueue
vmlinux 0x150
4
pfifo_fast_enqueue
vmlinux 0x150
5
? pfifo_fast_enqueue
vmlinux 0x150
6
pfifo_fast_enqueue
vmlinux 0x150
7
? pfifo_fast_enqueue
vmlinux 0x150
8
pfifo_fast_enqueue
vmlinux 0x150
WARNING: CPU: 0 PID: 399 at arch/x86/mm/tlb.c:485 switch_mm_irqs_off+0x5af/0x650
Modules linked in: overlay binfmt_misc uinput rfcomm ccm xt_CHECKSUM xt_MASQUERADE nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_REJECT nf_reject_ipv6 ip6t_rpfilter ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables vboxnetadp(OE) iptable_filter vboxnetflt(OE) vboxdrv(OE) cmac vmnet(OE) bnep ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) sunrpc vfat fat squashfs loop snd_soc_skl iwlmvm uvcvideo snd_soc_sst_ipc videobuf2_vmalloc snd_soc_sst_dsp videobuf2_memops videobuf2_v4l2 snd_hda_ext_core btusb snd_soc_acpi_intel_match snd_hda_codec_hdmi videobuf2_common mac80211 btrtl snd_soc_acpi btbcm videodev snd_soc_core btintel bluetooth
 snd_hda_codec_realtek libarc4 snd_hda_codec_generic ledtrig_audio mc snd_compress iwlwifi ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_hda_codec ecdh_generic mei_hdcp ecc snd_hda_core snd_hwdep x86_pkg_temp_thermal iTCO_wdt intel_powerclamp intel_pmc_bxt coretemp iTCO_vendor_support kvm_intel snd_seq snd_seq_device intel_rapl_msr snd_pcm kvm irqbypass cfg80211 rapl intel_cstate asus_nb_wmi snd_timer intel_uncore asus_wmi sparse_keymap snd mei_me i2c_i801 pcspkr rfkill intel_xhci_usb_role_switch soundcore i2c_smbus processor_thermal_device mei roles intel_rapl_common joydev intel_pch_thermal intel_soc_dts_iosf idma64 int3403_thermal int340x_thermal_zone acpi_als kfifo_buf acpi_pad industrialio asus_wireless int3400_thermal acpi_thermal_rel ip_tables i915 i2c_algo_bit drm_kms_helper hid_multitouch crct10dif_pclmul crc32_pclmul crc32c_intel cec ghash_clmulni_intel drm serio_raw wmi i2c_hid video fuse
CPU: 0 PID: 399 Comm: kworker/0:1H Tainted: G          IOE     5.8.15-101.fc31.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. UX330UA/UX330UA, BIOS UX330UA.300 07/07/2016
Workqueue:  0x0 (kblockd)
RIP: 0010:switch_mm_irqs_off+0x5af/0x650
Code: 40 fb 5d 66 39 f2 74 08 65 48 c7 01 00 00 00 00 83 c2 01 48 83 c1 10 66 83 fa 06 75 de 65 c6 05 7b 40 fb 5d 00 e9 d0 fb ff ff <0f> 0b e8 6a f7 ff ff e9 e4 fa ff ff 0f 0b e9 c8 fa ff ff 0f 0b e9
RSP: 0018:ffff9e95003ebe10 EFLAGS: 00010097
RAX: 00000001fc0ce005 RBX: 0000000000000005 RCX: 0000000000000006
RDX: 00000001fc0ce006 RSI: 00000001fc0ce000 RDI: 0000000000000000
RBP: ffff8f8a276cf700 R08: 00005be5d76c9e71 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8f8a276cf700
R13: ffff8f8a276b8000 R14: 0000000000000000 R15: 0000000000000005
FS:  0000000000000000(0000) GS:ffff8f8a2e000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001fc0ce005 CR4: 00000000003626f0
Call Trace:
 __schedule+0x32d/0x820
 ? __blk_mq_run_hw_queue+0x55/0x110
 schedule+0x4a/0xb0
 worker_thread+0xcf/0x3b0
 ? process_one_work+0x370/0x370
 kthread+0xfe/0x140
 ? kthread_park+0x90/0x90
 ret_from_fork+0x22/0x30