Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #648557
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-02
Last occurrence
2022-12-08
Unique reports
1
Quality
-42

Graphs

Statistics

Operating system Unique / Total count
Fedora 36 2 / 2
Fedora 37 1 / 1
Operating system Count
Fedora 36 2
Fedora 37 1
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? ep_remove
vmlinux 0xed
2
ep_remove
vmlinux 0xed
3
? ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
ep_remove
vmlinux 0xed
6
ep_remove
vmlinux 0xed
7
ep_remove
vmlinux 0xed
8
ep_remove
vmlinux 0xed
9
ep_remove
vmlinux 0xed
10
ep_remove
vmlinux 0xed
11
ep_remove
vmlinux 0xed
12
ep_remove
vmlinux 0xed
13
ep_remove
vmlinux 0xed
14
? ep_remove
vmlinux 0xed
15
? ep_remove
vmlinux 0xed
16
ep_remove
vmlinux 0xed
17
? ep_remove
vmlinux 0xed
18
ep_remove
vmlinux 0xed
BUG: unable to handle page fault for address: fffffe0000077004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 21ffc2067 P4D 21ffc2067 PUD 21ffc0067 PMD 21ffbf067 PTE 8000000217d0b161
Oops: 0003 [#1] PREEMPT SMP NOPTI
CPU: 2 PID: 55 Comm: kworker/2:1 Not tainted 6.0.5-200.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events once_deferred
RIP: 0010:do_sync_core+0x24/0x30
Code: 74 00 0f 1f 40 00 0f 1f 44 00 00 eb 0b 0f 1f 00 0f 01 e8 c3 cc cc cc cc 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 86 4e 03 ab <48> cf c3 cc cc cc cc 0f 1f 44 00 00 0f 1f 44 00 00 41 57 b9 0e 00
RSP: 0000:ffff9f7700307d40 EFLAGS: 00010082
RAX: 0000000000000010 RBX: 0000000000000001 RCX: 00000000fffffffc
RDX: 0000000000000001 RSI: ffffffffad319820 RDI: 0000000000000000
RBP: 0000000000000246 R08: ffff8fa0400663c0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000002 R14: ffff8fa157d32c00 R15: 0000000000000004
FS:  0000000000000000(0000) GS:ffff8fa157d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe0000077004 CR3: 0000000137010003 CR4: 00000000000306e0
Call Trace:
 <TASK>
 ? do_sync_core+0x26/0x30
 smp_call_function_many_cond+0x126/0x310
 ? text_poke_memset+0x10/0x10
 ? text_poke_memset+0x10/0x10
 on_each_cpu_cond_mask+0x3c/0x70
 text_poke_bp_batch+0xa2/0x260
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x5a/0x90
 static_key_disable+0x16/0x20
 once_deferred+0x1a/0x30
 process_one_work+0x1c4/0x380
 worker_thread+0x4d/0x380
 ? _raw_spin_lock_irqsave+0x23/0x50
 ? rescuer_thread+0x380/0x380
 kthread+0xe6/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 </TASK>
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter rfkill ebtables ip6table_filter ip6_tables iptable_filter ip_tables qrtr sunrpc snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep intel_rapl_msr snd_seq joydev intel_rapl_common rapl snd_seq_device snd_pcm snd_timer pcspkr snd soundcore i2c_piix4 vboxguest zram uas vmwgfx usb_storage ata_generic crc32c_intel e1000 drm_ttm_helper pata_acpi ttm serio_raw video fuse
CR2: fffffe0000077004