Kerneloops

Similar reports
Problem #682089
Component
kernel Tainted
Last affected version
0:5.15.18-100.fc34
Executable
unknown
First occurrence
2021-07-29
Last occurrence
2022-03-08
Unique reports
3
Quality
-36

Graphs

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Fedora 34 3 / 3
Operating system Count
Fedora 34 3
Fedora 33 1
Architecture Count
x86_64 4
Related packages Count
kernel-core 2
 0:5.14.18-100.fc33 1
 0:5.15.18-100.fc34 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? proc_reg_llseek
vmlinux 0x46
2
proc_reg_llseek
vmlinux 0x46
3
? proc_reg_llseek
vmlinux 0x46
4
proc_reg_llseek
vmlinux 0x46
5
proc_reg_llseek
vmlinux 0x46
6
proc_reg_llseek
vmlinux 0x46
7
proc_reg_llseek
vmlinux 0x46
8
proc_reg_llseek
vmlinux 0x46
9
proc_reg_llseek
vmlinux 0x46
10
proc_reg_llseek
vmlinux 0x46
11
proc_reg_llseek
vmlinux 0x46
12
? proc_reg_llseek
vmlinux 0x46
13
proc_reg_llseek
vmlinux 0x46
14
? proc_reg_llseek
vmlinux 0x46
15
proc_reg_llseek
vmlinux 0x46
BUG: unable to handle page fault for address: fffffe000006b004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 1b04c6067 P4D 1b04c6067 PUD 1b04c4067 PMD 1b04c3067 PTE 80000001a9b0b161
Oops: 0003 [#1] SMP PTI
CPU: 2 PID: 148 Comm: kworker/2:2 Tainted: G           OE     5.13.4-200.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events netstamp_clear
RIP: 0010:do_sync_core+0x20/0x30
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 eb 07 0f 1f 00 0f 01 e8 c3 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 72 0e 03 b8 <48> cf c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f 44 00 00 41
RSP: 0000:ffffb166c0cffd68 EFLAGS: 00010096
RAX: 0000000000000010 RBX: 0000000000000001 RCX: 00000000fffffffc
RDX: 000000000000000f RSI: ffffffffb9f61a60 RDI: 0000000000000000
RBP: ffff9c16e9b2bdc0 R08: ffff9c164006c220 R09: 0000000000000000
R10: 0000000000000004 R11: 0000000000000000 R12: 0000000000000246
R13: 0000000000000000 R14: 0000000000000004 R15: ffff9c16e9b2bdc0
FS:  0000000000000000(0000) GS:ffff9c16e9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe000006b004 CR3: 000000017cc10003 CR4: 00000000000306e0
Call Trace:
 ? do_sync_core+0x22/0x30
 smp_call_function_many_cond+0xd7/0x2c0
 ? text_poke_loc_init+0x100/0x100
 on_each_cpu_cond_mask+0x19/0x20
 text_poke_bp_batch+0x1b8/0x1e0
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x59/0x90
 static_key_disable+0x16/0x20
 process_one_work+0x1ec/0x380
 worker_thread+0x53/0x3e0
 ? process_one_work+0x380/0x380
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: nft_objref nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat iptable_mangle iptable_raw iptable_security ip6table_filter ip6_tables iptable_filter ip_tables uinput nls_utf8 isofs snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc snd_intel8x0 snd_ac97_codec intel_rapl_msr ac97_bus snd_seq intel_rapl_common snd_seq_device snd_pcm rapl pcspkr snd_timer snd soundcore joydev i2c_piix4 zram vmwgfx drm_kms_helper cec ttm drm e1000 crc32c_intel serio_raw vboxguest(OE) ata_generic pata_acpi video fuse [last unloaded: ip_tables]
CR2: fffffe000006b004