Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #673760
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-08-30
Last occurrence
2023-01-19
Unique reports
6
Quality
-41

Statistics

Operating system Unique / Total count
Fedora 36 6 / 8
Operating system Count
Fedora 36 8
Architecture Count
x86_64 8

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
? ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
9
ktime_get
vmlinux 0x38
10
ktime_get
vmlinux 0x38
11
ktime_get
vmlinux 0x38
12
ktime_get
vmlinux 0x38
13
? ktime_get
vmlinux 0x38
14
? ktime_get
vmlinux 0x38
15
ktime_get
vmlinux 0x38
16
? ktime_get
vmlinux 0x38
17
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: fffffe0000077004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 21ffc2067 P4D 21ffc2067 PUD 21ffc0067 PMD 21ffbf067 PTE 8000000217d0b161
Oops: 0003 [#1] PREEMPT SMP NOPTI
CPU: 2 PID: 10182 Comm: kworker/2:1 Tainted: G             L    5.18.18-200.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events netstamp_clear
RIP: 0010:do_sync_core+0x24/0x30
Code: 0f 0b 0f 0b 66 90 0f 1f 44 00 00 eb 0b 0f 1f 00 0f 01 e8 c3 cc cc cc cc 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 c6 1b 03 a1 <48> cf c3 cc cc cc cc 0f 1f 44 00 00 0f 1f 44 00 00 41 57 41 56 49
RSP: 0000:ffffbda085f97d48 EFLAGS: 00010092
RAX: 0000000000000010 RBX: 0000000000000001 RCX: 00000000fffffffc
RDX: 0000000000000001 RSI: ffffffffa31969a0 RDI: 0000000000000000
RBP: 0000000000000246 R08: ffff9c66c005fd60 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000002 R14: ffff9c67d7d32b80 R15: 0000000000000004
FS:  0000000000000000(0000) GS:ffff9c67d7d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe0000077004 CR3: 000000003de10005 CR4: 00000000000306e0
Call Trace:
 <TASK>
 ? do_sync_core+0x26/0x30
 smp_call_function_many_cond+0x121/0x2c0
 ? text_poke_loc_init+0x150/0x150
 ? text_poke_loc_init+0x150/0x150
 on_each_cpu_cond_mask+0x3c/0x70
 text_poke_bp_batch+0xa1/0x250
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x5a/0x90
 static_key_disable+0x16/0x20
 process_one_work+0x1c4/0x380
 worker_thread+0x4d/0x380
 ? _raw_spin_lock_irqsave+0x23/0x50
 ? process_one_work+0x380/0x380
 kthread+0xe6/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 </TASK>
Modules linked in: tls uinput isofs snd_seq_dummy snd_hrtimer vboxvideo drm_vram_helper nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr vboxsf sunrpc snd_intel8x0 snd_ac97_codec intel_rapl_msr ac97_bus intel_rapl_common snd_seq snd_seq_device snd_pcm joydev pcspkr i2c_piix4 snd_timer snd soundcore vboxguest zram e1000 vmwgfx crc32c_intel serio_raw drm_ttm_helper ttm ata_generic pata_acpi video ip6_tables ip_tables fuse
CR2: fffffe0000077004