Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #753452
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-03-23
Last occurrence
2022-03-23
Unique reports
1
Quality
-51

Statistics

Operating system Unique / Total count
Fedora 35 1 / 1
Operating system Count
Fedora 35 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? perf_event_task_tick
vmlinux 0x69
2
? perf_event_task_tick
vmlinux 0x69
3
? perf_event_task_tick
vmlinux 0x69
4
? perf_event_task_tick
vmlinux 0x69
5
? perf_event_task_tick
vmlinux 0x69
6
? perf_event_task_tick
vmlinux 0x69
7
? perf_event_task_tick
vmlinux 0x69
8
? perf_event_task_tick
vmlinux 0x69
9
? perf_event_task_tick
vmlinux 0x69
10
? perf_event_task_tick
vmlinux 0x69
11
? perf_event_task_tick
vmlinux 0x69
12
? perf_event_task_tick
vmlinux 0x69
13
? perf_event_task_tick
vmlinux 0x69
14
? perf_event_task_tick
vmlinux 0x69
15
? perf_event_task_tick
vmlinux 0x69
16
? perf_event_task_tick
vmlinux 0x69
17
? perf_event_task_tick
vmlinux 0x69
BUG: unable to handle page fault for address: 0000000000010008
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 5 PID: 4271 Comm: Worker Launcher Not tainted 5.16.16-200.fc35.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./B450M Steel Legend, BIOS P2.90 11/27/2019
RIP: 0010:0x10008
Code: Unable to access opcode bytes at RIP 0xffde.
RSP: 0018:ffffa7cbca86fb50 EFLAGS: 00010246
RAX: 0000000000010008 RBX: ffff9aa58090d1e0 RCX: 8000000000000867
RDX: 0017ffffc008b01c RSI: 00007fd86783c000 RDI: ffffdf3d48ca9f80
RBP: ffffdf3d48ca9f80 R08: ffff9aa69cb83258 R09: 0000000000000000
R10: 0000000000000020 R11: ffffffffffffffff R12: 8000000232a7e867
R13: 00007fd86783c000 R14: 00007fd86783d000 R15: ffffa7cbca86fcb8
FS:  00007fd87d5dd640(0000) GS:ffff9aac80b40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000010008 CR3: 0000000531e10000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? folio_mark_dirty+0x32/0x60
 ? unmap_page_range+0xbb2/0xe30
 ? unmap_vmas+0x6a/0xd0
 ? lru_add_drain_cpu+0x7e/0x130
 ? exit_mmap+0x86/0x1b0
 ? __mmput+0x4a/0x130
 ? do_exit+0x309/0xb40
 ? __futex_unqueue+0x25/0x30
 ? do_group_exit+0x33/0xa0
 ? get_signal+0xaf/0x9c0
 ? arch_do_signal_or_restart+0x109/0x740
 ? do_futex+0x14b/0x1f0
 ? __x64_sys_futex+0x63/0x1a0
 ? exit_to_user_mode_prepare+0x119/0x230
 ? syscall_exit_to_user_mode+0x18/0x40
 ? do_syscall_64+0x48/0x90
 ? entry_SYSCALL_64_after_hwframe+0x44/0xae
 </TASK>
Modules linked in: binfmt_misc uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc snd_hda_codec_realtek snd_hda_codec_generic intel_rapl_msr intel_rapl_common ledtrig_audio snd_hda_codec_hdmi edac_mce_amd snd_hda_intel snd_usb_audio snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec btusb snd_hda_core snd_usbmidi_lib btrtl snd_hwdep kvm_amd btbcm btintel snd_rawmidi uvcvideo snd_seq kvm snd_seq_device videobuf2_vmalloc videobuf2_memops bluetooth videobuf2_v4l2 videobuf2_common irqbypass videodev snd_pcm rapl joydev ecdh_generic mc snd_timer rfkill snd k10temp wmi_bmof i2c_piix4 pcspkr soundcore gpio_amdpt gpio_generic acpi_cpufreq zram ip_tables amdgpu drm_ttm_helper ttm iommu_v2 gpu_sched i2c_algo_bit drm_kms_helper
 crct10dif_pclmul crc32_pclmul crc32c_intel cec drm ghash_clmulni_intel sp5100_tco ccp r8169 wmi video ipmi_devintf ipmi_msghandler fuse
CR2: 0000000000010008