Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #519643
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-08-30
Last occurrence
2022-08-30
Unique reports
1
Quality
-26

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
perf_trace_track_foreign_dirty
vmlinux 0x62
2
perf_trace_track_foreign_dirty
vmlinux 0x62
3
perf_trace_track_foreign_dirty
vmlinux 0x62
4
perf_trace_track_foreign_dirty
vmlinux 0x62
5
perf_trace_track_foreign_dirty
vmlinux 0x62
6
perf_trace_track_foreign_dirty
vmlinux 0x62
7
perf_trace_track_foreign_dirty
vmlinux 0x62
8
? perf_trace_track_foreign_dirty
vmlinux 0x62
9
perf_trace_track_foreign_dirty
vmlinux 0x62
10
? perf_trace_track_foreign_dirty
vmlinux 0x62
11
perf_trace_track_foreign_dirty
vmlinux 0x62
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 2467 Comm: kworker/u256:6 Tainted: G           OE     5.17.4-200.fc35.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019
Workqueue: netns cleanup_net
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0000:ffffa86982a6fdc0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8b78c4ddf700 RCX: 0000000000000001
RDX: ffff8b78fd4ba900 RSI: ffff8b78c4ddf720 RDI: ffff8b78c6918000
RBP: ffff8b78c6918000 R08: 0000000000000000 R09: 0000000000000000
R10: ffff8b78caab2000 R11: 0000000000000300 R12: ffff8b78c6918000
R13: ffff8b78c69189d0 R14: ffff8b78c4ddf700 R15: ffff8b78ed26d3d4
FS:  0000000000000000(0000) GS:ffff8b793be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000000160c8004 CR4: 00000000003706f0
Call Trace:
 <TASK>
 nf_queue_nf_hook_drop+0x23/0x30
 __nf_unregister_net_hook+0xfb/0x1a0
 nf_unregister_net_hooks+0x66/0x80
 ops_exit_list+0x30/0x60
 cleanup_net+0x203/0x390
 process_one_work+0x1e2/0x3b0
 worker_thread+0x50/0x3a0
 ? rescuer_thread+0x370/0x370
 kthread+0xe5/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 </TASK>
Modules linked in: nosfw(OE) xsk_diag vsock_diag binfmt_misc uinput isofs snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 snd_ac97_codec intel_rapl_msr intel_rapl_common gameport rapl snd_rawmidi ac97_bus snd_seq vmw_balloon snd_seq_device snd_pcm joydev snd_timer snd vmw_vmci soundcore i2c_piix4 zram ip_tables vmwgfx drm_ttm_helper ttm drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel mptspi serio_raw scsi_transport_spi e1000 mptscsih mptbase ata_generic pata_acpi ipmi_devintf ipmi_msghandler fuse
CR2: 0000000000000000