Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-04-09
Last occurrence
2023-04-09
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
schedule
vmlinux 0x43
2
schedule
vmlinux 0x43
3
schedule
vmlinux 0x43
4
schedule
vmlinux 0x43
5
schedule
vmlinux 0x43
6
? schedule
vmlinux 0x43
7
? schedule
vmlinux 0x43
8
? schedule
vmlinux 0x43
9
? schedule
vmlinux 0x43
10
? schedule
vmlinux 0x43
11
? schedule
vmlinux 0x43
12
schedule
vmlinux 0x43
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 3200 Comm: cat Tainted: G           OE      6.2.9-100.fc36.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:test_seqf_stop+0x9/0x30 [hello]
Code: cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 53 48 89 f3 <48> 8b 36 48 c7 c7 99 10 71 c0 e8 d8 87 a8 ca 48 89 df 5b e9 6f 79
RSP: 0018:ffffb49d017ebd40 EFLAGS: 00010246
RAX: ffffffffc0710070 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8cbac775c438
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000017
R10: 000000000000000a R11: ffffffff8d1447c8 R12: ffffb49d017ebdf0
R13: ffffb49d017ebdc8 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f968af79740(0000) GS:ffff8cbafbcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000a04ea000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 seq_read_iter+0x3b0/0x470
 proc_reg_read_iter+0x4d/0x90
 vfs_read+0x23c/0x310
 ksys_read+0x6b/0xf0
 do_syscall_64+0x5b/0x80
 ? handle_mm_fault+0xff/0x2f0
 ? preempt_count_add+0x47/0xa0
 ? up_read+0x37/0x70
 ? do_user_addr_fault+0x1ef/0x710
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f968ad01b92
Code: c0 e9 b2 fe ff ff 50 48 8d 3d 9a cd 0b 00 e8 75 f7 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
RSP: 002b:00007ffd0879dd28 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007f968af58000 RCX: 00007f968ad01b92
RDX: 0000000000020000 RSI: 00007f968af58000 RDI: 0000000000000003
RBP: 0000000000020000 R08: 00000000ffffffff R09: 0000000000000000
R10: 0000000000000022 R11: 0000000000000246 R12: 00007f968af58000
R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000020000
 </TASK>
Modules linked in: hello(OE) uinput isofs snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc binfmt_misc intel_rapl_msr vmw_balloon intel_rapl_common joydev pcspkr vmw_vmci i2c_piix4 zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel nvme sha512_ssse3 vmwgfx nvme_core serio_raw vmxnet3 drm_ttm_helper nvme_common ttm ata_generic pata_acpi ip6_tables ip_tables fuse
CR2: 0000000000000000