Kerneloops

Similar reports
Problem #483633
Component
kernel
Last affected version
0:5.15.13-100.fc34
Executable
unknown
First occurrence
2021-08-26
Last occurrence
2022-07-27
Unique reports
5
Quality
-36

Graphs

Statistics

Operating system Unique / Total count
Fedora 33 2 / 2
Fedora 34 5 / 5
Operating system Count
Fedora 34 5
Fedora 33 2
Architecture Count
x86_64 7
Related packages Count
kernel-core 3
 0:5.14.12-100.fc33 2
 0:5.15.13-100.fc34 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? chrdev_open
vmlinux 0xe3
2
chrdev_open
vmlinux 0xe3
3
? chrdev_open
vmlinux 0xe3
4
chrdev_open
vmlinux 0xe3
5
chrdev_open
vmlinux 0xe3
6
chrdev_open
vmlinux 0xe3
7
chrdev_open
vmlinux 0xe3
8
chrdev_open
vmlinux 0xe3
9
chrdev_open
vmlinux 0xe3
10
chrdev_open
vmlinux 0xe3
11
chrdev_open
vmlinux 0xe3
12
chrdev_open
vmlinux 0xe3
13
? chrdev_open
vmlinux 0xe3
14
chrdev_open
vmlinux 0xe3
15
? chrdev_open
vmlinux 0xe3
16
chrdev_open
vmlinux 0xe3
BUG: unable to handle page fault for address: fffffe00000a0004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 299fc1067 P4D 299fc1067 PUD 299fbf067 PMD 299fbe067 PTE 800000028fccb161
Oops: 0003 [#1] SMP PTI
CPU: 3 PID: 573 Comm: kworker/3:2 Not tainted 5.13.12-200.fc34.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events once_deferred
RIP: 0010:do_sync_core+0x20/0x30
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 eb 07 0f 1f 00 0f 01 e8 c3 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 32 0f 03 a3 <48> cf c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f 44 00 00 41
RSP: 0000:ffffa0d0401ffd58 EFLAGS: 00010092
RAX: 0000000000000010 RBX: 0000000000000001 RCX: 00000000fffffffa
RDX: 000000000000003f RSI: ffffffffa4f60ba0 RDI: 0000000000000000
RBP: ffff9546cfcebdc0 R08: ffff954540065d20 R09: 0000000000000000
R10: 0000000000000006 R11: 0000000000000000 R12: 0000000000000246
R13: 0000000000000000 R14: 0000000000000006 R15: ffff9546cfcebdc0
FS:  0000000000000000(0000) GS:ffff9546cfcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe00000a0004 CR3: 000000017ec10005 CR4: 00000000000306e0
Call Trace:
 ? do_sync_core+0x22/0x30
 smp_call_function_many_cond+0xd7/0x2c0
 ? text_poke_loc_init+0x100/0x100
 on_each_cpu_cond_mask+0x19/0x20
 text_poke_bp_batch+0x1b8/0x1e0
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x59/0x90
 static_key_disable+0x16/0x20
 once_deferred+0x1a/0x30
 process_one_work+0x1ec/0x380
 worker_thread+0x53/0x3e0
 ? process_one_work+0x380/0x380
 kthread+0x127/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set rfkill nf_tables overlay nfnetlink ip6table_filter ip6_tables iptable_filter tun binfmt_misc sunrpc intel_rapl_msr intel_rapl_common rapl joydev i2c_piix4 vboxguest pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm crc32c_intel drm serio_raw e1000 ata_generic video pata_acpi fuse
CR2: fffffe00000a0004