Kerneloops

Similar reports
Problem #816823
Component
kernel
Last affected version
0:6.14.0-63.fc42
Executable
unknown
First occurrence
2025-10-01
Last occurrence
2025-10-01
Unique reports
1
Quality
-60

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.14.0-63.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? show_trace_log_lvl
vmlinux 0x1d3
2
? show_trace_log_lvl
vmlinux 0x1d3
3
? show_trace_log_lvl
vmlinux 0x1d3
4
? show_trace_log_lvl
vmlinux 0x1d3
5
? show_trace_log_lvl
vmlinux 0x1d3
6
? show_trace_log_lvl
vmlinux 0x1d3
7
? show_trace_log_lvl
vmlinux 0x1d3
8
? show_trace_log_lvl
vmlinux 0x1d3
9
? show_trace_log_lvl
vmlinux 0x1d3
10
? show_trace_log_lvl
vmlinux 0x1d3
11
show_trace_log_lvl
vmlinux 0x1d3
12
show_trace_log_lvl
vmlinux 0x1d3
13
show_trace_log_lvl
vmlinux 0x1d3
14
show_trace_log_lvl
vmlinux 0x1d3
15
show_trace_log_lvl
vmlinux 0x1d3
16
show_trace_log_lvl
vmlinux 0x1d3
17
show_trace_log_lvl
vmlinux 0x1d3
18
show_trace_log_lvl
vmlinux 0x1d3
19
show_trace_log_lvl
vmlinux 0x1d3
20
show_trace_log_lvl
vmlinux 0x1d3
21
? show_trace_log_lvl
vmlinux 0x1d3
22
show_trace_log_lvl
vmlinux 0x1d3
23
? show_trace_log_lvl
vmlinux 0x1d3
24
show_trace_log_lvl
vmlinux 0x1d3
Oops: general protection fault, probably for non-canonical address 0xe847bc9a116ebb8b: 0000 [#1] PREEMPT SMP NOPTI
fbcon: Taking over console
CPU: 8 UID: 0 PID: 230 Comm: modprobe Not tainted 6.14.0-63.fc42.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. ASUS TUF Gaming A17 FA707RM_FA707RM/FA707RM, BIOS FA707RM.315 11/30/2022
RIP: 0010:vms_gather_munmap_vmas+0x66/0x2c0
Code: 00 b9 01 00 00 00 e8 99 fc ff ff 41 89 c6 85 c0 0f 85 9e 01 00 00 48 8b 7d 00 31 f6 e8 13 6e d3 00 48 89 45 10 48 85 c0 74 08 <48> 8b 40 08 48 89 45 38 49 bd 00 01 00 00 20 00 00 00 eb 1a 4c 85
RSP: 0018:ffffa59fc07e7af0 EFLAGS: 00010282
RAX: e847bc9a116ebb83 RBX: ffffa59fc07e7c88 RCX: ffff8fc402f68d00
RDX: ffff8fc417b98b00 RSI: ffff8fc402f68d08 RDI: e847bc9a116ebb83
RBP: ffffa59fc07e7b78 R08: 0000000000000006 R09: 0000000000000030
R10: 00007ffe2aa9afff R11: 00007ffe2aabbfff R12: ffffa59fc07e7b30
R13: 00007fafd9709000 R14: 0000000000000000 R15: ffffa59fc07e7c88
FS:  0000000000000000(0000) GS:ffff8fc74e600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ff54111020 CR3: 000000011855c000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? show_trace_log_lvl+0x280/0x300
 ? show_trace_log_lvl+0x280/0x300
 ? show_trace_log_lvl+0x280/0x300
 ? do_vmi_align_munmap+0xec/0x1c0
 ? __die_body.cold+0x8/0x12
 ? die_addr+0x3c/0x60
 ? exc_general_protection+0x17a/0x400
 ? asm_exc_general_protection+0x26/0x30
 ? vms_gather_munmap_vmas+0x66/0x2c0
 do_vmi_align_munmap+0xec/0x1c0
 do_vmi_munmap+0xcc/0x170
 __vm_munmap+0xae/0x170
 elf_load+0x1c6/0x230
 load_elf_interp.isra.0+0x1b1/0x330
 load_elf_binary+0x9e3/0xef0
 exec_binprm+0x12c/0x300
 bprm_execve.part.0+0x141/0x1e0
 kernel_execve+0x112/0x140
 call_usermodehelper_exec_async+0xd0/0x190
 ? __pfx_call_usermodehelper_exec_async+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_call_usermodehelper_exec_async+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Modules linked in: