Kerneloops

Similar reports
Problem #748131
Component
kernel Tainted
Last affected version
0:6.11.10-200.fc40
Executable
unknown
First occurrence
2024-12-05
Last occurrence
2024-12-05
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 40 1 / 2
Operating system Count
Fedora 40 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:6.11.10-200.fc40 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? follow_pte
vmlinux 0x1f0
2
? follow_pte
vmlinux 0x1f0
3
? follow_pte
vmlinux 0x1f0
4
? follow_pte
vmlinux 0x1f0
5
follow_pte
vmlinux 0x1f0
6
follow_pte
vmlinux 0x1f0
7
follow_pte
vmlinux 0x1f0
8
follow_pte
vmlinux 0x1f0
9
follow_pte
vmlinux 0x1f0
10
follow_pte
vmlinux 0x1f0
11
follow_pte
vmlinux 0x1f0
12
? follow_pte
vmlinux 0x1f0
13
follow_pte
vmlinux 0x1f0
14
? follow_pte
vmlinux 0x1f0
15
follow_pte
vmlinux 0x1f0
16
? follow_pte
vmlinux 0x1f0
17
follow_pte
vmlinux 0x1f0
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 6 UID: 0 PID: 13 Comm: kworker/u512:1 Tainted: G           OE      6.11.10-200.fc40.x86_64 #1
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Workqueue: netns cleanup_net
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffbe1f4009fd80 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9538631036c0 RCX: 0000000000000001
RDX: ffff953940b2d200 RSI: ffff9538746935a0 RDI: ffff9538631036c0
RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000080040003 R11: 00000000000002a0 R12: ffff9538631036c0
R13: ffff953863104190 R14: ffff953874693580 R15: 0000000000000004
FS:  0000000000000000(0000) GS:ffff953989f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000019306000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 <TASK>
 ? __die_body.cold+0x19/0x27
 ? page_fault_oops+0x15a/0x2f0
 ? exc_page_fault+0x7e/0x180
 ? asm_exc_page_fault+0x26/0x30
 nf_queue_nf_hook_drop+0x27/0x30
 __nf_unregister_net_hook+0x119/0x1e0
 nf_unregister_net_hooks+0x68/0x90
 ops_exit_list+0x30/0x70
 cleanup_net+0x27e/0x450
 process_one_work+0x176/0x330
 worker_thread+0x252/0x390
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xcf/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x31/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Modules linked in: nosfw(OE) xsk_diag vsock_diag isofs uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables snd_seq_midi snd_seq_midi_event qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc binfmt_misc snd_ens1371 snd_ac97_codec intel_rapl_msr intel_rapl_common intel_uncore_frequency_common gameport intel_pmc_core intel_vsec snd_rawmidi pmt_telemetry pmt_class ac97_bus snd_seq rapl snd_seq_device vmw_balloon snd_pcm snd_timer snd soundcore vmw_vmci i2c_piix4 i2c_smbus pktcdvd joydev loop nfnetlink zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel vmwgfx sha512_ssse3 sha256_ssse3 mptspi scsi_transport_spi sha1_ssse3 mptscsih drm_ttm_helper mptbase ttm e1000 serio_raw ata_generic pata_acpi
 ip6_tables ip_tables fuse
CR2: 0000000000000000