Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640739
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-01
Last occurrence
2023-01-01
Unique reports
1
Quality
-52

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? enqueue_task_fair
vmlinux 0x87
2
? enqueue_task_fair
vmlinux 0x87
3
? enqueue_task_fair
vmlinux 0x87
4
? enqueue_task_fair
vmlinux 0x87
5
? enqueue_task_fair
vmlinux 0x87
6
? enqueue_task_fair
vmlinux 0x87
7
? enqueue_task_fair
vmlinux 0x87
8
? enqueue_task_fair
vmlinux 0x87
9
? enqueue_task_fair
vmlinux 0x87
10
? enqueue_task_fair
vmlinux 0x87
11
? enqueue_task_fair
vmlinux 0x87
12
? enqueue_task_fair
vmlinux 0x87
13
? enqueue_task_fair
vmlinux 0x87
14
? enqueue_task_fair
vmlinux 0x87
15
? enqueue_task_fair
vmlinux 0x87
16
? enqueue_task_fair
vmlinux 0x87
17
? enqueue_task_fair
vmlinux 0x87
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#2] PREEMPT SMP NOPTI
CPU: 5 PID: 1952 Comm: gnome-shell Tainted: G      D            6.0.15-300.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. B450 AORUS ELITE V2/B450 AORUS ELITE V2, BIOS F63 01/24/2022
RIP: 0010:sprintf+0x4e/0x60
Code: 24 08 48 8d 44 24 18 48 c7 04 24 00 00 00 00 4c 89 44 24 38 4c 89 4c 24 40 c7 04 24 10 00 00 00 48 89 44 24 10 e8 d2 f9 ff ff <c9> e9 5c 89 88 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 53 49 89 c8
RSP: 0018:ffffb1ac0749bcd0 EFLAGS: 00010046
RAX: ffffffff8e779c9e RBX: ffffa09115038710 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffffb1ac07473c90
RBP: 0000000000000000 R08: ffffb1ac07473c90 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000400 R14: 0000000000000008 R15: 0000000000000001
FS:  00007f8dbdffb6c0(0000) GS:ffffa0942eb40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001140ae000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? __wake_up_common+0x76/0x180
 ? eventfd_write+0x20a/0x300
 ? wake_up_q+0x90/0x90
 ? vfs_write+0xb9/0x3e0
 ? __fget_light+0x9d/0x100
 ? ksys_write+0x5b/0xd0
 ? do_syscall_64+0x5b/0x80
 ? ksys_read+0xb4/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? ksys_read+0xb4/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? ksys_write+0xb4/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr sunrpc vfat fat snd_hda_codec_realtek intel_rapl_msr snd_hda_codec_generic intel_rapl_common snd_hda_codec_hdmi ledtrig_audio snd_hda_intel snd_intel_dspcfg edac_mce_amd snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device kvm snd_pcm snd_timer irqbypass rapl snd gigabyte_wmi joydev wmi_bmof pcspkr nzxt_kraken2 soundcore i2c_piix4 k10temp gpio_amdpt gpio_generic acpi_cpufreq zram amdgpu drm_ttm_helper ttm iommu_v2 gpu_sched crct10dif_pclmul nvme crc32_pclmul drm_buddy crc32c_intel polyval_clmulni drm_display_helper ccp polyval_generic r8169 nvme_core ghash_clmulni_intel cec sp5100_tco wmi nvme_common scsi_dh_rdac scsi_dh_emc
 scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CR2: 0000000000000000