Kerneloops

Similar reports
Problem #722617
Component
kernel
Last affected version
0:6.10.12-200.fc40
Executable
unknown
First occurrence
2024-10-16
Last occurrence
2024-10-16
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
Fedora 40 1 / 1
Operating system Count
Fedora 40 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.10.12-200.fc40 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? __run_timers
vmlinux 0x272
2
? __run_timers
vmlinux 0x272
3
? __run_timers
vmlinux 0x272
4
? __run_timers
vmlinux 0x272
5
? __run_timers
vmlinux 0x272
6
? __run_timers
vmlinux 0x272
7
__run_timers
vmlinux 0x272
8
? __run_timers
vmlinux 0x272
9
__run_timers
vmlinux 0x272
10
__run_timers
vmlinux 0x272
11
? __run_timers
vmlinux 0x272
12
__run_timers
vmlinux 0x272
13
? __run_timers
vmlinux 0x272
14
__run_timers
vmlinux 0x272
15
? __run_timers
vmlinux 0x272
16
__run_timers
vmlinux 0x272
BUG: unable to handle page fault for address: 000002047dc6bdec
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 4114 Comm: kworker/1:1 Not tainted 6.10.12-200.fc40.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
Workqueue: events kfree_rcu_work
RIP: 0010:kvfree_rcu_list+0x1e/0xb0
Code: 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 65 48 8b 2d 82 20 e5 73 53 48 89 fb eb 0a e8 27 2a fd 00 48 85 db 74 66 <48> 8b 7b 08 48 89 d8 48 8b 1b 48 29 f8 48 3d ff 0f 00 00 77 58 e8
RSP: 0018:ffffb18d0597fde8 EFLAGS: 00010206
RAX: 0000000000000000 RBX: 000002047dc6bde4 RCX: 0000000000200015
RDX: 0000000000000000 RSI: ffffd419016c9640 RDI: 0000000000040000
RBP: ffff8d461fa40000 R08: ffff8d461b259a80 R09: 0000000000200015
R10: 0000000000200015 R11: 0000000000000007 R12: ffffb18d0597fe20
R13: ffffb18d0597fe20 R14: ffff8d45cf5332a0 R15: ffffb18d0597fe10
FS:  0000000000000000(0000) GS:ffff8d4639e80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000002047dc6bdec CR3: 00000000062b6005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ? __die_body.cold+0x19/0x27
 ? page_fault_oops+0x15a/0x2f0
 ? exc_page_fault+0x7e/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? kvfree_rcu_list+0x1e/0xb0
 ? kvfree_rcu_list+0x19/0xb0
 kfree_rcu_work+0x1a4/0x1b0
 ? disk_check_events+0x88/0x100
 process_one_work+0x176/0x330
 worker_thread+0x266/0x3a0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xcf/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x31/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Modules linked in: uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables snd_seq_midi snd_seq_midi_event intel_rapl_msr intel_rapl_common intel_uncore_frequency_common intel_pmc_core qrtr intel_vsec pmt_telemetry pmt_class vmw_balloon rapl vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock snd_ens1371 snd_ac97_codec snd_rawmidi gameport ac97_bus snd_seq snd_seq_device snd_pcm snd_timer pcspkr snd vmxnet3 soundcore sunrpc vmw_vmci i2c_piix4 binfmt_misc pktcdvd joydev loop nfnetlink zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic mptspi ghash_clmulni_intel nvme scsi_transport_spi vmwgfx sha512_ssse3 nvme_core sha256_ssse3 mptscsih sha1_ssse3 mptbase nvme_auth drm_ttm_helper ttm ata_generic pata_acpi serio_raw ip6_tables
 ip_tables fuse
CR2: 000002047dc6bdec