Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #674113
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-03-21
Last occurrence
2022-03-21
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? __ia32_compat_sys_ioctl
vmlinux 0x171
2
__ia32_compat_sys_ioctl
vmlinux 0x171
3
? __ia32_compat_sys_ioctl
vmlinux 0x171
4
? __ia32_compat_sys_ioctl
vmlinux 0x171
5
__ia32_compat_sys_ioctl
vmlinux 0x171
6
__ia32_compat_sys_ioctl
vmlinux 0x171
7
__ia32_compat_sys_ioctl
vmlinux 0x171
8
__ia32_compat_sys_ioctl
vmlinux 0x171
9
__ia32_compat_sys_ioctl
vmlinux 0x171
10
__ia32_compat_sys_ioctl
vmlinux 0x171
11
__ia32_compat_sys_ioctl
vmlinux 0x171
12
__ia32_compat_sys_ioctl
vmlinux 0x171
13
__ia32_compat_sys_ioctl
vmlinux 0x171
14
? __ia32_compat_sys_ioctl
vmlinux 0x171
15
__ia32_compat_sys_ioctl
vmlinux 0x171
16
? __ia32_compat_sys_ioctl
vmlinux 0x171
17
__ia32_compat_sys_ioctl
vmlinux 0x171
BUG: unable to handle page fault for address: fffffe0000077004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 41ffbe067 P4D 41ffbe067 PUD 41ffbd067 PMD 41ffbc067 PTE 800000040fc8b161
Oops: 0003 [#1] PREEMPT SMP NOPTI
CPU: 2 PID: 78 Comm: kworker/2:2 Tainted: G           OE     5.16.15-201.fc35.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events once_deferred
RIP: 0010:do_sync_core+0x20/0x30
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 eb 07 0f 1f 00 0f 01 e8 c3 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 a2 0c 03 9a <48> cf c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f 44 00 00 41
RSP: 0000:ffffac3dc0353d38 EFLAGS: 00010096
RAX: 0000000000000010 RBX: 0000000000000246 RCX: 00000000fffffff8
RDX: 00000000000000ff RSI: ffffffff9c16f1a0 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffff9148400666c0 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000000 R12: ffff914b4fcb2780
R13: 0000000000000001 R14: ffff914b4fcb2780 R15: 0000000000000008
FS:  0000000000000000(0000) GS:ffff914b4fc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe0000077004 CR3: 000000003de10002 CR4: 00000000000306e0
Call Trace:
 <TASK>
 ? do_sync_core+0x22/0x30
 smp_call_function_many_cond+0x11b/0x2b0
 ? text_poke_loc_init+0x100/0x100
 ? text_poke_loc_init+0x100/0x100
 on_each_cpu_cond_mask+0x3c/0x70
 text_poke_bp_batch+0x1b8/0x1e0
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x59/0x90
 static_key_disable+0x16/0x20
 once_deferred+0x1a/0x30
 process_one_work+0x1e5/0x3c0
 worker_thread+0x50/0x3b0
 ? rescuer_thread+0x370/0x370
 kthread+0x169/0x190
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
 </TASK>
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr vboxsf(OE) sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device intel_rapl_msr snd_pcm intel_rapl_common snd_timer snd pktcdvd soundcore pcspkr i2c_piix4 joydev zram ip_tables vmwgfx drm_kms_helper cec ttm drm serio_raw ata_generic crc32c_intel e1000 vboxguest(OE) pata_acpi video ipmi_devintf ipmi_msghandler fuse
CR2: fffffe0000077004