Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #169217
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-10
Last occurrence
2021-02-10
Unique reports
1
Quality
-24

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0xb3
2
kfree
vmlinux 0xb3
3
kfree
vmlinux 0xb3
4
kfree
vmlinux 0xb3
5
kfree
vmlinux 0xb3
6
? kfree
vmlinux 0xb3
7
kfree
vmlinux 0xb3
8
kfree
vmlinux 0xb3
9
kfree
vmlinux 0xb3
10
kfree
vmlinux 0xb3
11
kfree
vmlinux 0xb3
BUG: unable to handle page fault for address: ffffd320f56f6008
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP PTI
CPU: 1 PID: 1366 Comm: gnome-shell Tainted: G    B             5.10.13-200.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:unmap_page_range+0x96d/0xe20
Code: 00 00 eb a3 48 c1 e7 06 48 03 3d de 79 1f 01 48 83 7c 24 10 00 49 89 fd 0f 85 d5 02 00 00 48 89 df 31 f6 e8 a5 f2 dc ff 66 90 <49> 8b 55 08 48 8d 42 ff 83 e2 01 49 0f 44 c5 f6 40 18 01 0f 85 41
RSP: 0018:ffffa2a1031a3b50 EFLAGS: 00010246
RAX: 000000000000001f RBX: ffff895a5484f018 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff895a5484f018
RBP: 0000000000000000 R08: ffff895a54866258 R09: ffffa2a1031a37c8
R10: ffffa2a1031a37c0 R11: ffffffffacb44748 R12: 00007fe502603004
R13: ffffd320f56f6000 R14: ffffa2a1031a3c98 R15: 00007fe502604004
FS:  0000000000000000(0000) GS:ffff895b5bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffd320f56f6008 CR3: 0000000014930005 CR4: 00000000000706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 unmap_vmas+0x6a/0xd0
 exit_mmap+0x97/0x170
 mmput+0x61/0x140
 begin_new_exec+0x389/0x970
 load_elf_binary+0x734/0x1730
 ? __kernel_read+0x191/0x2b0
 bprm_execve+0x2c9/0x680
 do_execveat_common+0x192/0x1c0
 __x64_sys_execve+0x39/0x50
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fe54d78023b
Code: Unable to access opcode bytes at RIP 0x7fe54d780211.
RSP: 002b:00007ffe94886328 EFLAGS: 00000206 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00007ffe94886459 RCX: 00007fe54d78023b
RDX: 00005597c4573000 RSI: 00007fe528361190 RDI: 00007ffe94886459
RBP: 00007fe5496b0408 R08: 0000000000000000 R09: 00005597c1c233a0
R10: 00007fe528361190 R11: 0000000000000206 R12: 00007fe528361190
R13: 0000000000000041 R14: 00007ffe94886462 R15: 00007ffe94889efe
Modules linked in: tun bridge stp llc ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg soundwire_intel soundwire_generic_allocation snd_soc_core snd_compress intel_rapl_msr snd_pcm_dmaengine soundwire_cadence intel_rapl_common snd_hda_codec snd_hda_core ac97_bus snd_hwdep kvm_intel snd_seq snd_seq_device kvm snd_pcm irqbypass rapl joydev snd_timer snd i2c_piix4 vboxguest soundcore zram ip_tables xfs vmwgfx drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec ttm ghash_clmulni_intel drm serio_raw virtio_net net_failover failover ata_generic pata_acpi video fuse
CR2: ffffd320f56f6008