Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #575977
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-01-17
Last occurrence
2021-01-17
Unique reports
1
Quality
-24

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
__switch_to
vmlinux 0x7f
2
__switch_to
vmlinux 0x7f
3
__switch_to
vmlinux 0x7f
4
__switch_to
vmlinux 0x7f
5
__switch_to
vmlinux 0x7f
6
__switch_to
vmlinux 0x7f
7
? __switch_to
vmlinux 0x7f
8
? __switch_to
vmlinux 0x7f
9
__switch_to
vmlinux 0x7f
10
__switch_to
vmlinux 0x7f
11
__switch_to
vmlinux 0x7f
BUG: unable to handle page fault for address: ffffb73a2d371fa8
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 4 PID: 2334 Comm: GUsbEventThread Not tainted 5.9.16-200.fc33.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. To be filled by O.E.M./970A-DS3P, BIOS F1 04/08/2013
RIP: 0010:locks_remove_file+0x13/0x170
Code: ff e9 75 fe ff ff 0f 0b eb f1 41 bc db ff ff ff e9 82 fe ff ff 66 90 0f 1f 44 00 00 41 55 41 54 55 53 48 83 ec 10 48 8b 47 20 <4c> 8b a0 70 01 00 00 4d 85 e4 0f 84 0c 01 00 00 48 89 fe 48 89 fd
RSP: 0018:ffffbcf8c0d7fcc0 EFLAGS: 00010286
RAX: ffffb73a2d371e38 RBX: 00000000480a801d RCX: ffff973a29e5c000
RDX: ffff9739e5ab3cd0 RSI: 0000000000000000 RDI: ffff9739e5ab3c00
RBP: ffff9739e5ab3c00 R08: 0000000000000001 R09: ffff973a2d371e38
R10: 0000000000000010 R11: ffff9739e5ab3c10 R12: ffffb73a2d371e38
R13: ffff9739e81c0f20 R14: ffff973a2d0ef9c0 R15: ffff973a006ea6c0
FS:  00007f983b5ce640(0000) GS:ffff973a32d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffb73a2d371fa8 CR3: 00000002d1c80000 CR4: 00000000000406e0
Call Trace:
 __fput+0x70/0x240
 task_work_run+0x65/0xa0
 do_exit+0x352/0xae0
 do_group_exit+0x33/0xa0
 get_signal+0x179/0x8d0
 arch_do_signal+0x30/0x700
 ? __seccomp_filter+0x7f/0x6c0
 ? hrtimer_interrupt+0x180/0x280
 exit_to_user_mode_prepare+0xf7/0x160
 syscall_exit_to_user_mode+0x31/0x1b0
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f984fede80f
Code: Unable to access opcode bytes at RIP 0x7f984fede7e5.
RSP: 002b:00007f983b5cd940 EFLAGS: 00000293 ORIG_RAX: 0000000000000007
RAX: fffffffffffffdfc RBX: 0000000000000002 RCX: 00007f984fede80f
RDX: 00000000000007d0 RSI: 0000000000000002 RDI: 00007f9834000b60
RBP: 0000558bd7c6e990 R08: 0000000000000000 R09: 00000000000007d0
R10: 00007f984f5d5bf8 R11: 0000000000000293 R12: 0000558bd7c6eb30
R13: 00000000000007d0 R14: 0000558bd7c6eb70 R15: 00007f983b5ce640
Modules linked in: nls_utf8 uinput isofs xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc edac_mce_amd kvm_amd ccp kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_hda_intel snd_intel_dspcfg pcspkr fam15h_power k10temp snd_hda_codec snd_seq snd_hda_core sp5100_tco snd_seq_device snd_hwdep snd_pcm i2c_piix4 snd_timer snd soundcore acpi_cpufreq zram ip_tables nouveau video mxm_wmi wmi i2c_algo_bit drm_kms_helper crct10dif_pclmul crc32_pclmul cec crc32c_intel
 ata_generic pata_acpi ghash_clmulni_intel serio_raw pata_atiixp ttm drm r8169 uas usb_storage fuse
CR2: ffffb73a2d371fa8