Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611701
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-01
Last occurrence
2022-11-09
Unique reports
2
Quality
-30

Statistics

Operating system Unique / Total count
Fedora 36 2 / 2
Operating system Count
Fedora 36 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? ep_remove
vmlinux 0xed
2
? ep_remove
vmlinux 0xed
3
? ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
? ep_remove
vmlinux 0xed
6
? ep_remove
vmlinux 0xed
7
? ep_remove
vmlinux 0xed
8
? ep_remove
vmlinux 0xed
9
? ep_remove
vmlinux 0xed
BUG: unable to handle page fault for address: 000000024e47a000
fbcon: Taking over console
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 5919 Comm: systemd-sleep Tainted: P           OE      6.0.5-200.fc36.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. AB350M-DS3H V2/AB350M-DS3H V2-CF, BIOS F50 12/02/2019
RIP: 0010:0x24e47a000
Code: Unable to access opcode bytes at RIP 0x24e479fd6.
RSP: 0018:ffffa92e10ecbd98 EFLAGS: 00010202
RAX: 000000024e47a000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff912f8a4bcb78
RBP: 000000024e47b000 R08: ffffffff8a94c480 R09: ffffa92e10ecbd30
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000003 R14: 0000000000000007 R15: 0000000000000006
FS:  00007fb8bb02db40(0000) GS:ffff91328ea40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000024e47a000 CR3: 000000025cb00000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? blocking_notifier_call_chain_robust+0x6e/0xd0
 ? pm_notifier_call_chain_robust+0x19/0x40
 ? pm_suspend.cold+0x16f/0x35e
 ? state_store+0x68/0xd0
 ? kernfs_fop_write_iter+0x11e/0x1f0
 ? vfs_write+0x222/0x3e0
 ? ksys_write+0x5b/0xd0
 ? do_syscall_64+0x5b/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls hid_apple hidp rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nvidia_drm(POE) nf_conntrack nvidia_modeset(POE) nf_defrag_ipv6 nf_defrag_ipv4 nvidia_uvm(POE) ip_set nf_tables nvidia(POE) nfnetlink qrtr bnep sunrpc snd_hda_codec_realtek snd_hda_codec_generic vfat ledtrig_audio snd_hda_codec_hdmi fat intel_rapl_msr snd_hda_intel intel_rapl_common snd_usb_audio snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec btusb snd_usbmidi_lib edac_mce_amd snd_hda_core btrtl snd_rawmidi snd_hwdep btbcm uvcvideo kvm_amd snd_seq btintel videobuf2_vmalloc snd_seq_device btmtk videobuf2_memops kvm videobuf2_v4l2 snd_pcm bluetooth videobuf2_common snd_timer videodev irqbypass rapl joydev gigabyte_wmi snd mc pcspkr rfkill k10temp wmi_bmof i2c_piix4 soundcore gpio_amdpt gpio_generic acpi_cpufreq zram
 hid_logitech_hidpp crct10dif_pclmul crc32_pclmul crc32c_intel nvme polyval_clmulni polyval_generic ccp nvme_core r8169 sp5100_tco ghash_clmulni_intel hid_logitech_dj nvme_common wmi ip6_tables ip_tables fuse
CR2: 000000024e47a000