Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-10
Last occurrence
2021-02-10
Unique reports
1
Quality
-31

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0xb3
2
kfree
vmlinux 0xb3
3
kfree
vmlinux 0xb3
4
kfree
vmlinux 0xb3
5
? kfree
vmlinux 0xb3
6
kfree
vmlinux 0xb3
7
kfree
vmlinux 0xb3
8
kfree
vmlinux 0xb3
9
? kfree
vmlinux 0xb3
10
? kfree
vmlinux 0xb3
11
kfree
vmlinux 0xb3
12
kfree
vmlinux 0xb3
13
kfree
vmlinux 0xb3
BUG: unable to handle page fault for address: ffffd320d7359c88
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] SMP PTI
CPU: 0 PID: 1074 Comm: gnome-shell Tainted: G    B D           5.10.13-200.fc33.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:unmap_page_range+0x96d/0xe20
Code: 00 00 eb a3 48 c1 e7 06 48 03 3d de 79 1f 01 48 83 7c 24 10 00 49 89 fd 0f 85 d5 02 00 00 48 89 df 31 f6 e8 a5 f2 dc ff 66 90 <49> 8b 55 08 48 8d 42 ff 83 e2 01 49 0f 44 c5 f6 40 18 01 0f 85 41
RSP: 0000:ffffa2a102d0bb70 EFLAGS: 00010246
RAX: 000000000000001f RBX: ffff895a481da560 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff895a481da560
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffffffffff
R10: 0000000000000000 R11: 0000000000000001 R12: 00007fe5002ac958
R13: ffffd320d7359c80 R14: ffffa2a102d0bcb8 R15: 00007fe5002ad958
FS:  0000000000000000(0000) GS:ffff895b5bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffd320d7359c88 CR3: 0000000003658002 CR4: 00000000000706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 unmap_vmas+0x6a/0xd0
 exit_mmap+0x97/0x170
 mmput+0x61/0x140
 do_exit+0x302/0xab0
 ? get_order+0x20/0x20
 do_group_exit+0x33/0xa0
 get_signal+0x16a/0x880
 arch_do_signal+0x30/0x710
 ? get_order+0x20/0x20
 ? get_order+0x20/0x20
 exit_to_user_mode_prepare+0xd5/0x140
 syscall_exit_to_user_mode+0x2d/0x190
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fe54d7a8a5f
Code: Unable to access opcode bytes at RIP 0x7fe54d7a8a35.
RSP: 002b:00007ffe94887da0 EFLAGS: 00000293 ORIG_RAX: 0000000000000007
RAX: 0000000000000006 RBX: 00007fe54e4fd140 RCX: 00007fe54d7a8a5f
RDX: 0000000000000ebc RSI: 0000000000000010 RDI: 00007fe52820a370
RBP: 00007fe52820a370 R08: 0000000000000000 R09: 000000000000001b
R10: 00007ffe949bc080 R11: 0000000000000293 R12: 0000000000000010
R13: 00007ffe94887de4 R14: 0000000000000ebc R15: 00005597c1921330
Modules linked in: uinput tun bridge stp llc ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg soundwire_intel soundwire_generic_allocation snd_soc_core snd_compress intel_rapl_msr snd_pcm_dmaengine soundwire_cadence intel_rapl_common snd_hda_codec snd_hda_core ac97_bus snd_hwdep kvm_intel snd_seq snd_seq_device kvm snd_pcm irqbypass rapl joydev snd_timer snd i2c_piix4 vboxguest soundcore zram ip_tables xfs vmwgfx drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec ttm ghash_clmulni_intel drm serio_raw virtio_net net_failover failover ata_generic pata_acpi video fuse
CR2: ffffd320d7359c88