Kerneloops

Similar reports
Problem #396940
Component
kernel
Last affected version
0:5.16.8-200.fc35
Executable
unknown
First occurrence
2022-02-19
Last occurrence
2022-04-20
Unique reports
4
Quality
-37

Statistics

Operating system Unique / Total count
Fedora 35 4 / 5
Operating system Count
Fedora 35 5
Architecture Count
x86_64 5
Related packages Count
kernel-core 2
 0:5.16.7-200.fc35 1
 0:5.16.8-200.fc35 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? __flush_work.isra.0
vmlinux 0xaf
2
__flush_work.isra.0
vmlinux 0xaf
3
? __flush_work.isra.0
vmlinux 0xaf
4
? __flush_work.isra.0
vmlinux 0xaf
5
__flush_work.isra.0
vmlinux 0xaf
6
__flush_work.isra.0
vmlinux 0xaf
7
__flush_work.isra.0
vmlinux 0xaf
8
__flush_work.isra.0
vmlinux 0xaf
9
__flush_work.isra.0
vmlinux 0xaf
10
__flush_work.isra.0
vmlinux 0xaf
11
__flush_work.isra.0
vmlinux 0xaf
12
__flush_work.isra.0
vmlinux 0xaf
13
? __flush_work.isra.0
vmlinux 0xaf
14
__flush_work.isra.0
vmlinux 0xaf
15
? __flush_work.isra.0
vmlinux 0xaf
16
__flush_work.isra.0
vmlinux 0xaf
BUG: unable to handle page fault for address: fffffe000003c004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 15ffc1067 P4D 15ffc1067 PUD 15ffc0067 PMD 15ffbf067 PTE 800000015ac8b161
Oops: 0003 [#1] PREEMPT SMP PTI
CPU: 1 PID: 659 Comm: kworker/1:3 Not tainted 5.16.8-200.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events netstamp_clear
RIP: 0010:do_sync_core+0x20/0x30
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 eb 07 0f 1f 00 0f 01 e8 c3 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 d2 06 03 a4 <48> cf c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f 44 00 00 41
RSP: 0000:ffffa4c90040fd48 EFLAGS: 00010092
RAX: 0000000000000010 RBX: 0000000000000246 RCX: 00000000fffffffc
RDX: 000000000000000f RSI: ffffffffa616f1a0 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffff890c00121648 R09: 0000000000000000
R10: 0000000000000004 R11: 0000000000000000 R12: ffff890c5acb2780
R13: 0000000000000001 R14: ffff890c5acb2780 R15: 0000000000000004
FS:  0000000000000000(0000) GS:ffff890c5ac80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe000003c004 CR3: 0000000078e10004 CR4: 00000000000306e0
Call Trace:
 <TASK>
 ? do_sync_core+0x22/0x30
 smp_call_function_many_cond+0x11e/0x2b0
 ? text_poke_loc_init+0x100/0x100
 ? text_poke_loc_init+0x100/0x100
 on_each_cpu_cond_mask+0x3c/0x70
 text_poke_bp_batch+0x1b8/0x1e0
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x59/0x90
 static_key_disable+0x16/0x20
 process_one_work+0x1e8/0x3c0
 worker_thread+0x50/0x3b0
 ? rescuer_thread+0x350/0x350
 kthread+0x16b/0x190
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x22/0x30
 </TASK>
Modules linked in: snd_seq_dummy snd_hrtimer ip6t_REJECT ipt_REJECT xt_multiport xt_cgroup xt_mark xt_owner nft_compat nft_counter nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr vboxsf sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm intel_rapl_msr intel_rapl_common snd_timer snd pktcdvd joydev rapl i2c_piix4 soundcore vboxguest pcspkr zram ip_tables vmwgfx drm_kms_helper cec ttm ata_generic crc32c_intel drm serio_raw pata_acpi e1000 video ipmi_devintf ipmi_msghandler fuse
CR2: fffffe000003c004