Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #738760
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-07-27
Last occurrence
2022-07-27
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? update_irq_load_avg
vmlinux 0xf0
2
? update_irq_load_avg
vmlinux 0xf0
3
? update_irq_load_avg
vmlinux 0xf0
4
? update_irq_load_avg
vmlinux 0xf0
5
? update_irq_load_avg
vmlinux 0xf0
6
? update_irq_load_avg
vmlinux 0xf0
7
? update_irq_load_avg
vmlinux 0xf0
8
? update_irq_load_avg
vmlinux 0xf0
9
? update_irq_load_avg
vmlinux 0xf0
10
? update_irq_load_avg
vmlinux 0xf0
11
? update_irq_load_avg
vmlinux 0xf0
12
? update_irq_load_avg
vmlinux 0xf0
13
? update_irq_load_avg
vmlinux 0xf0
14
? update_irq_load_avg
vmlinux 0xf0
BUG: unable to handle page fault for address: ffffbb6585f63d20
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD 100000067 P4D 100000067 PUD 1001e6067 PMD 113cc9067 PTE 800000010a46a163
Oops: 0011 [#2] PREEMPT SMP NOPTI
CPU: 19 PID: 2239 Comm: gnome-shell Tainted: G      D           5.18.13-200.fc36.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. B550 AORUS PRO AC/B550 AORUS PRO AC, BIOS F11 12/31/2020
RIP: 0010:0xffffbb6585f63d20
Code: 00 00 19 e1 2f 9f ff ff ff ff 00 80 03 00 00 00 00 00 73 00 00 00 00 00 00 00 00 68 89 c5 8e 8f ff ff 38 00 00 00 00 00 00 00 <12> 03 00 00 00 00 00 00 00 80 03 00 00 00 00 00 12 08 00 00 00 00
RSP: 0018:ffffbb6585f6bd78 EFLAGS: 00010046
RAX: ffffbb6585f63d20 RBX: ffff8f8ecb6e7350 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffffbb6585f63c00
RBP: 0000000000000000 R08: ffffbb6585f63c00 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 00000000c0535be0 R14: ffffffff9f5f2bd3 R15: 0000000000000001
FS:  00007f93867fc640(0000) GS:ffff8f95dc0c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffbb6585f63d20 CR3: 000000013194c000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 ? __wake_up_common+0x76/0x180
 ? eventfd_write+0x202/0x2d0
 ? wake_up_q+0x90/0x90
 ? vfs_write+0xb3/0x290
 ? ksys_write+0x53/0xd0
 ? do_syscall_64+0x5b/0x80
 ? __x64_sys_epoll_wait+0x4d/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
 </TASK>
Modules linked in: tls uinput rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink sunrpc qrtr bnep iwlmvm snd_hda_codec_realtek mac80211 snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi intel_rapl_msr libarc4 snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi intel_rapl_common vfat fat iwlwifi snd_hda_codec btusb btrtl btbcm snd_hda_core btintel snd_hwdep edac_mce_amd snd_seq iwlmei btmtk snd_seq_device kvm_amd bluetooth snd_pcm cfg80211 kvm snd_timer snd ecdh_generic irqbypass rapl wmi_bmof gigabyte_wmi pcspkr gpio_amdpt k10temp i2c_piix4 mei joydev soundcore rfkill acpi_cpufreq gpio_generic zram uas usb_storage amdgpu drm_ttm_helper ttm iommu_v2 crct10dif_pclmul crc32_pclmul crc32c_intel gpu_sched nvme ghash_clmulni_intel
 drm_dp_helper r8169 ccp nvme_core sp5100_tco wmi ip6_tables ip_tables fuse
CR2: ffffbb6585f63d20