Kerneloops

Similar reports
Problem #621347
Component
kernel Tainted
Last affected version
0:5.7.9-200.fc32
Executable
unknown
First occurrence
2021-02-26
Last occurrence
2021-02-26
Unique reports
1
Quality
-26

Statistics

Operating system Unique / Total count
Fedora 32 1 / 1
Operating system Count
Fedora 32 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:5.7.9-200.fc32 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
call_timer_fn
vmlinux 0x2d
2
call_timer_fn
vmlinux 0x2d
3
? call_timer_fn
vmlinux 0x2d
4
call_timer_fn
vmlinux 0x2d
5
? call_timer_fn
vmlinux 0x2d
6
? call_timer_fn
vmlinux 0x2d
7
call_timer_fn
vmlinux 0x2d
8
? call_timer_fn
vmlinux 0x2d
9
call_timer_fn
vmlinux 0x2d
WARNING: CPU: 3 PID: 962 at fs/buffer.c:1122 mark_buffer_dirty+0xd5/0xf0
Modules linked in: vfat fat uas usb_storage usblp rfcomm xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle iptable_raw iptable_security bridge stp llc ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter cmac bnep vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) binfmt_misc sunrpc squashfs loop snd_hda_codec_idt snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core snd_hwdep uvcvideo videobuf2_vmalloc videobuf2_memops snd_seq videobuf2_v4l2 videobuf2_common snd_seq_device videodev snd_pcm snd_timer btusb btrtl btbcm btintel bluetooth mc nvidia_drm(POE)
 nvidia_modeset(POE) iwldvm nvidia_uvm(POE) mac80211 libarc4 iwlwifi nvidia(POE) dell_rbtn ecdh_generic ecc dell_laptop ledtrig_audio snd intel_rapl_msr intel_rapl_common soundcore ipmi_devintf ipmi_msghandler ppdev dell_wmi cfg80211 x86_pkg_temp_thermal intel_powerclamp coretemp rfkill kvm_intel kvm irqbypass mei_wdt rapl intel_cstate mei_hdcp intel_uncore iTCO_wdt iTCO_vendor_support dell_smbios dcdbas dell_smm_hwmon sparse_keymap joydev pcspkr dell_smo8800 wmi_bmof dell_wmi_descriptor parport_pc parport mei_me mei i2c_i801 lpc_ich ip_tables i915 crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel i2c_algo_bit cec e1000e drm_kms_helper firewire_ohci sdhci_pci cqhci serio_raw sdhci firewire_core mmc_core drm crc_itu_t wmi video fuse
CPU: 3 PID: 962 Comm: jbd2/dm-2-8 Tainted: P        W  OE     5.7.9-200.fc32.x86_64 #1
Hardware name: Dell Inc. Latitude E6520/0J4TFW, BIOS A05 05/24/2011
RIP: 0010:mark_buffer_dirty+0xd5/0xf0
Code: c3 48 85 c0 74 2b 48 89 c6 48 89 ef 31 d2 e8 82 fe ff ff 48 89 ef e8 8a 07 fa ff 48 8b 3b be 04 00 00 00 5b 5d e9 eb 38 ff ff <0f> 0b e9 39 ff ff ff 48 89 ef eb bc 66 66 2e 0f 1f 84 00 00 00 00
RSP: 0018:ffff9f2e40f97cd8 EFLAGS: 00010246
RAX: 0000000000116418 RBX: ffff90d4ef88a3a8 RCX: ffff90d44380c4b0
RDX: ffff90d4a4c3e300 RSI: ffff90d4a4c3e300 RDI: ffff90d4ef88a3a8
RBP: ffff9f2e40f97ea0 R08: ffff90d4ef88a3a8 R09: 0000000000000000
R10: 00000000000313ce R11: 0000000000000000 R12: 0000000000000001
R13: ffff90d4dae543a8 R14: ffff90d4ef88a3a8 R15: ffff90d4a4c3e300
FS:  0000000000000000(0000) GS:ffff90d4f5ac0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ba105b3000 CR3: 000000009480a005 CR4: 00000000000606e0
Call Trace:
 __jbd2_journal_refile_buffer+0xb0/0xe0
 jbd2_journal_commit_transaction+0x12b2/0x1976
 ? __switch_to_asm+0x34/0x70
 kjournald2+0x9b/0x250
 ? finish_wait+0x80/0x80
 ? jbd2_journal_init_inode+0x100/0x100
 kthread+0x115/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x35/0x40