Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #555482
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-21
Last occurrence
2022-11-21
Unique reports
1
Quality
-50

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock
vmlinux 0x13
2
_raw_spin_lock
vmlinux 0x13
3
_raw_spin_lock
vmlinux 0x13
4
_raw_spin_lock
vmlinux 0x13
5
_raw_spin_lock
vmlinux 0x13
6
_raw_spin_lock
vmlinux 0x13
7
? _raw_spin_lock
vmlinux 0x13
8
? _raw_spin_lock
vmlinux 0x13
9
? _raw_spin_lock
vmlinux 0x13
10
? _raw_spin_lock
vmlinux 0x13
11
? _raw_spin_lock
vmlinux 0x13
12
? _raw_spin_lock
vmlinux 0x13
13
? _raw_spin_lock
vmlinux 0x13
14
? _raw_spin_lock
vmlinux 0x13
15
? _raw_spin_lock
vmlinux 0x13
16
? _raw_spin_lock
vmlinux 0x13
17
? _raw_spin_lock
vmlinux 0x13
18
_raw_spin_lock
vmlinux 0x13
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] PREEMPT SMP NOPTI
CPU: 1 PID: 576 Comm: systemd-udevd Tainted: G      D    OE      6.0.7-200.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:anon_vma_clone+0x7c/0x1f0
Code: 44 24 10 0f 84 d9 00 00 00 48 8b 3d c6 8b 99 02 be 00 28 00 00 e8 d4 60 04 00 49 89 c7 48 85 c0 0f 84 f1 00 00 00 49 8b 5d 08 <4c> 8b 33 4d 39 f4 74 16 4d 85 e4 0f 85 19 01 00 00 4d 89 f4 49 8d
RSP: 0018:ffffb17bc072fbb0 EFLAGS: 00010286
RAX: ffff94c502d909c0 RBX: 0000000000000000 RCX: 0000000000000048
RDX: ffff94c507de4f00 RSI: ffffffffb0325fac RDI: ffff94c507de4f00
RBP: ffff94c502ccdc80 R08: 0000000000000040 R09: 0000000000000040
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff94c502510e00 R14: ffff94c502ccdc80 R15: ffff94c502d909c0
FS:  00007f1164158580(0000) GS:ffff94c617d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000104d26006 CR4: 00000000000306e0
Call Trace:
 <TASK>
 anon_vma_fork+0x33/0x160
 dup_mm+0x383/0x5d0
 copy_process+0xef6/0x1a40
 kernel_clone+0xaf/0x3f0
 __do_sys_clone+0x64/0x70
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? _raw_spin_unlock+0x15/0x30
 ? alloc_fd+0xd1/0x170
 ? preempt_count_add+0x47/0xa0
 ? fd_install+0x5c/0xe0
 ? syscall_exit_to_user_mode_prepare+0x18e/0x1c0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f1164add3a7
Code: 00 66 90 f3 0f 1e fa 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 39 89 c2 85 c0 75 2c 64 48 8b 04 25 10 00 00
RSP: 002b:00007fff277419a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1164add3a7
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 00007f1164158850 R11: 0000000000000246 R12: 0000000000000001
R13: 00007fff27741b60 R14: 0000000000000040 R15: 00007fff27741ae0
 </TASK>
Modules linked in: intel_rapl_msr intel_rapl_common snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm pcspkr snd_timer i2c_piix4 snd soundcore joydev zram vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel e1000 drm_ttm_helper polyval_generic ttm ghash_clmulni_intel ata_generic pata_acpi serio_raw vboxguest(OE) video ip6_tables ip_tables fuse
CR2: 0000000000000000