Kerneloops

Similar reports
Problem #641274
Component
kernel
Last affected version
0:6.2.15-100.fc36
Executable
unknown
First occurrence
2023-04-04
Last occurrence
2023-12-26
Unique reports
1
Quality
-43

Graphs

Statistics

Operating system Unique / Total count
Fedora 36 8 / 9
Fedora 37 3 / 3
Fedora 38 1 / 1
Operating system Count
Fedora 36 9
Fedora 37 3
Fedora 38 1
Architecture Count
x86_64 13
Related packages Count
kernel-core 7
 0:6.2.15-100.fc36 7

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? free_pgtables
vmlinux 0xfe
2
free_pgtables
vmlinux 0xfe
3
? free_pgtables
vmlinux 0xfe
4
? free_pgtables
vmlinux 0xfe
5
free_pgtables
vmlinux 0xfe
6
free_pgtables
vmlinux 0xfe
7
? free_pgtables
vmlinux 0xfe
8
free_pgtables
vmlinux 0xfe
9
free_pgtables
vmlinux 0xfe
10
free_pgtables
vmlinux 0xfe
11
free_pgtables
vmlinux 0xfe
12
free_pgtables
vmlinux 0xfe
13
free_pgtables
vmlinux 0xfe
14
? free_pgtables
vmlinux 0xfe
15
? free_pgtables
vmlinux 0xfe
16
free_pgtables
vmlinux 0xfe
17
? free_pgtables
vmlinux 0xfe
18
free_pgtables
vmlinux 0xfe
BUG: unable to handle page fault for address: fffffe6bbc70c004
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 29ffc0067 P4D 29ffc0067 PUD 29ffbc067 PMD 29ffbb067 PTE 8000000295c8b161
Oops: 0003 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 215 Comm: kworker/1:3 Not tainted 6.2.8-100.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: events netstamp_clear
RIP: 0010:do_sync_core+0x24/0x30
Code: 90 90 90 90 90 90 0f 1f 44 00 00 eb 0b 0f 1f 00 0f 01 e8 c3 cc cc cc cc 8c d0 50 54 48 83 04 24 08 9c 8c c8 50 68 a6 ef 03 a0 <48> cf c3 cc cc cc cc 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90
RSP: 0000:ffff9f9a4045bd38 EFLAGS: 00010096
RAX: 0000000000000010 RBX: 0000000000000246 RCX: 00000000fffffffd
RDX: 0000000000000001 RSI: ffffffffa23185a0 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffff9332400724b0 R09: ffff9332400724b0
R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000001 R14: ffff9333d5cb2f80 R15: ffff9333d5d00000
FS:  0000000000000000(0000) GS:ffff9333d5c80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffe6bbc70c004 CR3: 0000000112010005 CR4: 00000000000306e0
Call Trace:
 <TASK>
 ? do_sync_core+0x26/0x30
 smp_call_function_many_cond+0x124/0x2f0
 ? __pfx_do_sync_core+0x10/0x10
 ? __pfx_do_sync_core+0x10/0x10
 on_each_cpu_cond_mask+0x3c/0x70
 text_poke_bp_batch+0xb7/0x300
 ? arch_jump_label_transform_queue+0x53/0x80
 text_poke_finish+0x1b/0x30
 arch_jump_label_transform_apply+0x16/0x30
 static_key_disable_cpuslocked+0x5a/0x90
 static_key_disable+0x16/0x20
 process_one_work+0x1c5/0x3c0
 worker_thread+0x4d/0x380
 ? _raw_spin_lock_irqsave+0x23/0x50
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe6/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x29/0x50
 </TASK>
Modules linked in: nf_nat_tftp rfkill nf_conntrack_tftp nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter iptable_filter qrtr sunrpc binfmt_misc intel_rapl_msr intel_rapl_common joydev rapl i2c_piix4 pcspkr vboxguest zram vmwgfx drm_ttm_helper crc32c_intel sha512_ssse3 e1000 ata_generic serio_raw video pata_acpi ttm wmi ip6_tables ip_tables fuse
CR2: fffffe6bbc70c004