Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #653570
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-07
Last occurrence
2023-02-07
Unique reports
1
Quality
-21

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
preempt_count_add
vmlinux 0x6a
2
preempt_count_add
vmlinux 0x6a
3
preempt_count_add
vmlinux 0x6a
4
? preempt_count_add
vmlinux 0x6a
5
preempt_count_add
vmlinux 0x6a
6
preempt_count_add
vmlinux 0x6a
7
? preempt_count_add
vmlinux 0x6a
8
? preempt_count_add
vmlinux 0x6a
9
preempt_count_add
vmlinux 0x6a
BUG: unable to handle page fault for address: ffffffffc0601de0
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0019) - reserved bit violation
PGD 31015067 P4D 31015067 PUD 31017067 PMD 8e6a067 PTE fffff4a708e1a161
Oops: 0019 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 1669 Comm: gnome-shell Not tainted 6.0.7-301.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vmw_mmap+0x0/0x170 [vmwgfx]
Code: Unable to access opcode bytes at RIP 0xffffffffc0601db6.
RSP: 0018:ffffad08c5b47d60 EFLAGS: 00010202
RAX: ffffffffc0601de0 RBX: ffff93253b4f2ef8 RCX: 0000000000000002
RDX: ffff932503fc4df8 RSI: ffff93255bc90258 RDI: ffff93256d414a00
RBP: ffff93253b4f2f08 R08: 00000000000000c8 R09: 00000000000000c8
R10: ffff93255bc90258 R11: 00007f8686755000 R12: 00007f8654800000
R13: ffff93252791e578 R14: 0000000000000008 R15: ffff932505b8c440
FS:  00007f8681b365c0(0000) GS:ffff93257dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc0601db6 CR3: 000000006bd8a002 CR4: 00000000000706f0
Call Trace:
 <TASK>
 mmap_region+0x434/0x670
 do_mmap+0x33d/0x530
 vm_mmap_pgoff+0xbf/0x160
 ? syscall_exit_to_user_mode+0x17/0x40
 ksys_mmap_pgoff+0x181/0x1f0
 do_syscall_64+0x5b/0x80
 ? fpregs_restore_userregs+0x53/0xe0
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f8685528857
Code: ff ff eb e7 e8 9a 6f 01 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 41 89 ca 41 f7 c1 ff 0f 00 00 75 10 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 21 c3 48 8b 05 a9 d5 0c 00 64 c7 00 16 00 00
RSP: 002b:00007ffe923177f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 0000563666189060 RCX: 00007f8685528857
RDX: 0000000000000003 RSI: 0000000000208000 RDI: 0000000000000000
RBP: 00005636668c3f00 R08: 0000000000000008 R09: 0000000100b9c000
R10: 0000000000000001 R11: 0000000000000246 R12: 0000563663e253c0
R13: 0000563666189070 R14: 00005636661890a8 R15: 000056366555b000
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink rfkill qrtr sunrpc snd_intel8x0 intel_rapl_msr snd_ac97_codec intel_rapl_common ac97_bus snd_seq snd_seq_device intel_powerclamp snd_pcm snd_timer snd rapl soundcore joydev vboxguest pcspkr i2c_piix4 zram vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni e1000 polyval_generic drm_ttm_helper ttm ghash_clmulni_intel serio_raw video ata_generic pata_acpi ip6_tables ip_tables fuse
CR2: ffffffffc0601de0