Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #694722
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-10
Last occurrence
2022-11-10
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ep_remove
vmlinux 0xed
2
? ep_remove
vmlinux 0xed
3
? ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
? ep_remove
vmlinux 0xed
6
? ep_remove
vmlinux 0xed
7
? ep_remove
vmlinux 0xed
8
? ep_remove
vmlinux 0xed
9
? ep_remove
vmlinux 0xed
10
? ep_remove
vmlinux 0xed
11
? ep_remove
vmlinux 0xed
12
? ep_remove
vmlinux 0xed
13
? ep_remove
vmlinux 0xed
14
? ep_remove
vmlinux 0xed
BUG: unable to handle page fault for address: 00000078cd064bc1
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP PTI
CPU: 0 PID: 35228 Comm: Netlink Monitor Tainted: P           OE      6.0.5-200.fc36.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. G750JW/G750JW, BIOS G750JW.208 08/19/2013
RIP: 0010:0x78cd064bc1
Code: Unable to access opcode bytes at RIP 0x78cd064b97.
RSP: 0018:ffffb68645557b40 EFLAGS: 00010206
RAX: 0000000000000000 RBX: 0000000000000080 RCX: 0000000000000000
RDX: ffffffff91dd2e38 RSI: ffff94109fe2db48 RDI: ffff94112ed4be00
RBP: 0000000000000050 R08: 00000078cd064bc1 R09: 0000000000000060
R10: 0000000000000040 R11: 0000000000000000 R12: 000000000000000a
R13: ffff94109fe2db98 R14: 0000000000000002 R15: ffff94109fe2db48
FS:  00007f5388a7c640(0000) GS:ffff941217000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000078cd064bc1 CR3: 00000001c263a001 CR4: 00000000001706f0
Call Trace:
 <TASK>
 ? rtnl_dump_all+0xcf/0x100
 ? netlink_dump+0x123/0x310
 ? netlink_recvmsg+0x24e/0x410
 ? bpf_lsm_socket_sendmsg+0x10/0x10
 ? ____sys_recvmsg+0x98/0x1a0
 ? ___sys_recvmsg+0x80/0xb0
 ? __sys_recvmsg+0x65/0xa0
 ? do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_user_addr_fault+0x1ef/0x690
 ? exc_page_fault+0x70/0x170
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls xt_mark xt_connmark tun rfcomm snd_seq_dummy snd_hrtimer nouveau mxm_wmi drm_ttm_helper ttm drm_display_helper cec xt_comment nft_compat nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc uvcvideo snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_codec_generic snd_hda_intel wl(POE) snd_intel_dspcfg videobuf2_vmalloc videobuf2_memops snd_intel_sdw_acpi videobuf2_v4l2 snd_hda_codec videobuf2_common snd_hda_core vfat fat videodev snd_hwdep snd_seq intel_rapl_msr btusb mc btrtl btbcm snd_seq_device intel_rapl_common snd_pcm snd_timer btintel btmtk snd bluetooth x86_pkg_temp_thermal intel_powerclamp soundcore at24 coretemp kvm_intel kvm asus_nb_wmi mei_pxp mei_hdcp mei_me i2c_i801 mei irqbypass asus_wmi i2c_smbus cfg80211 iTCO_wdt
 intel_pmc_bxt iTCO_vendor_support ledtrig_audio sparse_keymap platform_profile rfkill lpc_ich rapl intel_cstate intel_uncore asus_wireless joydev pcspkr zram hid_logitech_hidpp crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel alx serio_raw mdio hid_logitech_dj wmi video ip6_tables ip_tables pkcs8_key_parser fuse
CR2: 00000078cd064bc1