Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #653570
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-12-16
Last occurrence
2022-12-16
Unique reports
1
Quality
-25

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
preempt_count_add
vmlinux 0x6a
2
? preempt_count_add
vmlinux 0x6a
3
preempt_count_add
vmlinux 0x6a
4
preempt_count_add
vmlinux 0x6a
5
preempt_count_add
vmlinux 0x6a
6
? preempt_count_add
vmlinux 0x6a
7
? preempt_count_add
vmlinux 0x6a
8
? preempt_count_add
vmlinux 0x6a
9
? preempt_count_add
vmlinux 0x6a
10
preempt_count_add
vmlinux 0x6a
BUG: unable to handle page fault for address: ffffffff4eccd922
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 21015067 P4D 21015067 PUD 0 
Oops: 0010 [#1] PREEMPT SMP PTI
CPU: 0 PID: 618 Comm: systemd-resolve Not tainted 6.0.12-300.fc37.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./G41 Series, BIOS 080015  05/24/2018
RIP: 0010:0xffffffff4eccd922
Code: Unable to access opcode bytes at RIP 0xffffffff4eccd8f8.
RSP: 0018:ffff9b3a00913cf8 EFLAGS: 00010246
RAX: 0000000000800100 RBX: ffff8f1113589400 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff8f118438107e
RBP: ffff9b3a00913d68 R08: 000000000000004c R09: 0000000000000000
R10: 000000000000004c R11: 000000000000dd86 R12: ffff8f1189b1df80
R13: ffff9b3a00913dc8 R14: 00002c28440007e0 R15: 0000000000000062
FS:  00007febee42bfc0(0000) GS:ffff8f11bbc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff4eccd8f8 CR3: 0000000103a04000 CR4: 00000000000406f0
Call Trace:
 <TASK>
 inet6_recvmsg+0xf0/0x100
 ? sock_recvmsg+0x1c/0x70
 __sys_recvfrom+0xcb/0x140
 __x64_sys_recvfrom+0x20/0x30
 do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7febedf30a5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d ad db 0c 00 00 41 89 ca 74 20 45 31 c9 45 31 c0 b8 2d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 6b c3 66 2e 0f 1f 84 00 00 00 00 00 55 48 83
RSP: 002b:00007fffa818a2b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 00007febedf30a5d
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000018
RBP: 00007fffa818a850 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fffa818a868 R14: 00007fffa818a2f8 R15: 00007fffa818a8c0
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr sunrpc snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep coretemp snd_seq snd_seq_device snd_pcm snd_timer iTCO_wdt intel_pmc_bxt iTCO_vendor_support joydev gpio_ich kvm_intel ch341 kvm snd soundcore irqbypass lpc_ich pcspkr i2c_i801 i2c_smbus zram i915 drm_buddy video drm_display_helper cec r8169 serio_raw ttm ata_generic pata_acpi ip6_tables ip_tables fuse
CR2: ffffffff4eccd922