Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #648557
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-11-14
Last occurrence
2022-11-14
Unique reports
1
Quality
-48

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? ep_remove
vmlinux 0xed
2
? ep_remove
vmlinux 0xed
3
? ep_remove
vmlinux 0xed
4
? ep_remove
vmlinux 0xed
5
? ep_remove
vmlinux 0xed
6
? ep_remove
vmlinux 0xed
7
? ep_remove
vmlinux 0xed
8
? ep_remove
vmlinux 0xed
9
? ep_remove
vmlinux 0xed
10
? ep_remove
vmlinux 0xed
11
? ep_remove
vmlinux 0xed
12
? ep_remove
vmlinux 0xed
13
? ep_remove
vmlinux 0xed
14
? ep_remove
vmlinux 0xed
15
? ep_remove
vmlinux 0xed
16
? ep_remove
vmlinux 0xed
BUG: unable to handle page fault for address: 0000000085bad202
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 2522ff067 P4D 2522ff067 PUD 237293067 PMD 0 
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 2 PID: 4165 Comm: IOCP Thread 0 Not tainted 6.0.5-200.fc36.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./X470 Taichi, BIOS P1.50 07/03/2018
RIP: 0010:__ip_local_out+0x30/0x160
Code: 56 41 55 41 54 49 89 f4 55 48 89 fd 53 48 89 d3 48 8b ec 30 0f b7 42 70 0f b7 ba b8 00 00 00 48 03 ba c8 00 00 00 66 c1 c0 08 <66> 89 47 02 e8 17 d4 ff ff 48 8b 43 58 48 83 e0 fe 48 8b 38 f6 87
RSP: 0018:ffffab9708c6f9c8 EFLAGS: 00010286
RAX: 0000000048000000 RBX: ffff9e87043fba00 RCX: 0000000006fd859b
RDX: ffff9e87043ff700 RSI: ffff9e87051b6900 RDI: 0000000085bad200
RBP: ffffab9708c6f9c8 R08: 0000000000000000 R09: 0000000000000000
R10: ffff9e87051b6900 R11: 0000000000000000 R12: ffff9e87051b6900
R13: 0000000000000000 R14: ffff9e872bb25e40 R15: ffff9e87051b6c68
FS:  0000000000000000(0000) GS:ffff9e8a0ee80000(0063) knlGS:00000000dba48ac0
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000085bad202 CR3: 00000002112a2000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? ip_local_out+0x17/0x70
 ? __ip_queue_xmit+0x171/0x410
 ? __tcp_transmit_skb+0x9f6/0xbd0
 ? __tcp_send_ack.part.0+0x2f/0x180
 ? tcp_recvmsg_locked+0x1d9/0x8e0
 ? tcp_recvmsg+0x75/0x1d0
 ? inet_recvmsg+0x42/0x100
 ? sock_recvmsg+0x1c/0x70
 ? ____sys_recvmsg+0x98/0x1a0
 ? ___sys_recvmsg+0x80/0xb0
 ? __sys_recvmsg+0x65/0xa0
 ? __ia32_compat_sys_socketcall+0x323/0x330
 ? __do_fast_syscall_32+0x88/0xe0
 ? __do_fast_syscall_32+0x94/0xe0
 ? do_fast_syscall_32+0x2f/0x70
 ? entry_SYSCALL_compat_after_hwframe+0x62/0x6a
 </TASK>
Modules linked in: tls uinput rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci bnep sunrpc intel_rapl_msr intel_rapl_common snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi iwlmvm snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi edac_mce_amd snd_hda_codec kvm_amd snd_usb_audio mac80211 snd_hda_core snd_usbmidi_lib snd_hwdep snd_rawmidi libarc4 kvm btusb uvcvideo snd_seq btrtl videobuf2_vmalloc snd_seq_device irqbypass btbcm videobuf2_memops rapl iwlwifi snd_pcm videobuf2_v4l2 pcspkr wmi_bmof btintel videobuf2_common mxm_wmi btmtk k10temp i2c_piix4 snd_timer videodev cfg80211 snd bluetooth mc joydev soundcore rfkill gpio_amdpt gpio_generic
 zram amdgpu drm_ttm_helper ttm iommu_v2 gpu_sched igb crct10dif_pclmul drm_buddy crc32_pclmul crc32c_intel drm_display_helper polyval_clmulni polyval_generic ghash_clmulni_intel ccp cec sp5100_tco dca wmi ip6_tables ip_tables fuse
CR2: 0000000085bad202