Operating system | Unique / Total count |
---|---|
Fedora 40 | 2 / 2 |
Operating system | Count |
---|---|
Fedora 40 | 2 |
Architecture | Count |
---|---|
x86_64 | 2 |
Related packages | Count |
---|---|
kernel-core | 2 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 days.
BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 0 P4D 0 Oops: 0010 [#1] PREEMPT SMP PTI CPU: 0 PID: 3803 Comm: tracker-miner-f Tainted: G S OE 6.8.5-301.fc40.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020 RIP: 0010:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0018:ffffb3ce05e57d28 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff8ecb8c2a1500 RCX: 0000000000000000 RDX: ffffb3ce05e57d64 RSI: ffff8ecb8bb54ac8 RDI: ffff8ecb8c2a1500 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffffb3ce05e57d60 R11: 0000000000000000 R12: 000055ea9ae61020 R13: 00007ffcfc92a0bc R14: ffffb3ce05e57db0 R15: ffffffffffffffa1 FS: 00007efcbeec3840(0000) GS:ffff8ecbb9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000052396004 CR4: 00000000001706f0 Call Trace: <TASK> ? __die+0x23/0x70 ? page_fault_oops+0x174/0x530 ? try_to_unlazy+0x5a/0xc0 ? exc_page_fault+0x7f/0x180 ? asm_exc_page_fault+0x26/0x30 exportfs_encode_fh+0x34/0x80 do_sys_name_to_handle+0xd0/0x220 __x64_sys_name_to_handle_at+0xb4/0xd0 khook_x64_sys_call_stub+0x69/0x90 [LSDEfs] ? khook_x64_sys_call_stub+0x69/0x90 [LSDEfs] ? syscall_exit_to_user_mode+0x80/0x230 ? do_syscall_64+0x83/0x170 ? khook_x64_sys_call_stub+0x69/0x90 [LSDEfs] ? syscall_exit_to_user_mode+0x80/0x230 ? syscall_exit_to_user_mode+0x80/0x230 ? do_syscall_64+0x8f/0x170 ? syscall_exit_to_user_mode+0x80/0x230 ? do_syscall_64+0x8f/0x170 ? do_syscall_64+0x8f/0x170 ? syscall_exit_to_user_mode+0x80/0x230 ? do_syscall_64+0x8f/0x170 ? do_syscall_64+0x8f/0x170 ? do_syscall_64+0x8f/0x170 ? exc_page_fault+0x7f/0x180 ? entry_SYSCALL_64_after_hwframe+0x78/0x80 </TASK> Modules linked in: uinput snd_seq_dummy snd_hrtimer LSDEfs(OE) snd_seq_midi snd_seq_midi_event intel_rapl_msr intel_rapl_common rapl nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib vmw_balloon nft_reject_inet snd_ens1371 nf_reject_ipv4 nf_reject_ipv6 nft_reject snd_ac97_codec nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill snd_rawmidi gameport ip_set ac97_bus nf_tables pcspkr snd_seq snd_seq_device snd_pcm snd_timer snd soundcore i2c_piix4 vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport qrtr vsock vmw_vmci sunrpc binfmt_misc pktcdvd joydev loop nfnetlink zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 vmwgfx mptspi scsi_transport_spi mptscsih e1000 mptbase drm_ttm_helper ttm serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse CR2: 0000000000000000