Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640739
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2022-12-29
Last occurrence
2022-12-29
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? enqueue_task_fair
vmlinux 0x87
2
? enqueue_task_fair
vmlinux 0x87
3
? enqueue_task_fair
vmlinux 0x87
4
? enqueue_task_fair
vmlinux 0x87
5
? enqueue_task_fair
vmlinux 0x87
6
? enqueue_task_fair
vmlinux 0x87
7
? enqueue_task_fair
vmlinux 0x87
8
? enqueue_task_fair
vmlinux 0x87
9
? enqueue_task_fair
vmlinux 0x87
10
? enqueue_task_fair
vmlinux 0x87
11
? enqueue_task_fair
vmlinux 0x87
12
? enqueue_task_fair
vmlinux 0x87
13
? enqueue_task_fair
vmlinux 0x87
BUG: unable to handle page fault for address: fffffdff9b44f308
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 12 PID: 625974 Comm: htop Not tainted 6.0.15-300.fc37.x86_64 #1
Hardware name: To Be Filled By O.E.M. X570 Taichi/X570 Taichi, BIOS P5.00 10/19/2022
RIP: 0010:0xfffffdff9b44f308
Code: Unable to access opcode bytes at RIP 0xfffffdff9b44f2de.
RSP: 0018:ffffbfcca53a7cf0 EFLAGS: 00010202
RAX: ffffffffffffffff RBX: ffff99a7412549d8 RCX: 000000000000016b
RDX: 0000000000000000 RSI: 0000000000000031 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000002 R09: 000000000000001f
R10: 000055b424333000 R11: ffff99a8d5c47102 R12: 000000000000001f
R13: 000000000000b000 R14: 0000000000de69f7 R15: 000055b424337000
FS:  00007fd392b0fc40(0000) GS:ffff99b63ed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffdff9b44f2de CR3: 00000005cf620000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? show_map_vma+0x4f/0x140
 ? show_map+0xa/0x20
 ? seq_read_iter+0x2aa/0x450
 ? seq_read+0xc0/0xe0
 ? vfs_read+0x97/0x2f0
 ? __do_sys_newfstatat+0x3d/0x50
 ? ksys_read+0x5b/0xd0
 ? do_syscall_64+0x5b/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls uinput rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_conntrack xt_MASQUERADE nf_conntrack_netlink ipt_REJECT nf_nat_tftp nf_conntrack_tftp xt_addrtype nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct br_netfilter nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack bridge nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw stp iptable_security llc overlay ip_set nf_tables nfnetlink ip6table_filter iptable_filter qrtr bnep sunrpc binfmt_misc iwlmvm snd_hda_codec_realtek vfat snd_hda_codec_generic intel_rapl_msr fat ledtrig_audio snd_hda_codec_hdmi squashfs snd_hda_intel intel_rapl_common snd_intel_dspcfg loop mac80211 snd_intel_sdw_acpi snd_hda_codec libarc4 snd_hda_core edac_mce_amd btusb snd_hwdep snd_seq btrtl kvm_amd snd_seq_device btbcm iwlwifi snd_pcm btintel kvm btmtk
 snd_timer joydev snd bluetooth cfg80211 rapl wmi_bmof pcspkr k10temp i2c_piix4 soundcore rfkill acpi_cpufreq zram amdgpu drm_ttm_helper ttm iommu_v2 crct10dif_pclmul gpu_sched crc32_pclmul mxm_wmi nvme drm_buddy crc32c_intel igb polyval_clmulni drm_display_helper polyval_generic nvme_core ccp cec ghash_clmulni_intel sp5100_tco dca nvme_common wmi vfio_pci vfio_pci_core irqbypass vfio_virqfd vfio_iommu_type1 vfio scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CR2: fffffdff9b44f308