Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640739
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-04
Last occurrence
2023-01-04
Unique reports
1
Quality
-55

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? enqueue_task_fair
vmlinux 0x87
2
? enqueue_task_fair
vmlinux 0x87
3
? enqueue_task_fair
vmlinux 0x87
4
? enqueue_task_fair
vmlinux 0x87
5
? enqueue_task_fair
vmlinux 0x87
6
? enqueue_task_fair
vmlinux 0x87
7
? enqueue_task_fair
vmlinux 0x87
8
? enqueue_task_fair
vmlinux 0x87
9
? enqueue_task_fair
vmlinux 0x87
10
? enqueue_task_fair
vmlinux 0x87
11
? enqueue_task_fair
vmlinux 0x87
12
? enqueue_task_fair
vmlinux 0x87
13
? enqueue_task_fair
vmlinux 0x87
14
? enqueue_task_fair
vmlinux 0x87
15
? enqueue_task_fair
vmlinux 0x87
16
? enqueue_task_fair
vmlinux 0x87
17
? enqueue_task_fair
vmlinux 0x87
18
? enqueue_task_fair
vmlinux 0x87
BUG: unable to handle page fault for address: 0000002a5fd9d784
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP PTI
CPU: 0 PID: 833 Comm: NetworkManager Tainted: G         C         6.0.15-300.fc37.x86_64 #1
Hardware name: To be filled by O.E.M. To be filled by O.E.M./H61, BIOS 4.6.5 11/24/2020
RIP: 0010:0x2a5fd9d784
Code: Unable to access opcode bytes at RIP 0x2a5fd9d75a.
RSP: 0018:ffffb2c7010f7a20 EFLAGS: 00010206
RAX: 00000000ffffffa1 RBX: 0000000000000028 RCX: 0000002a5fd9d784
RDX: ffffb2c7010f7aa8 RSI: ffff8b14ad2e1c00 RDI: ffff8b13e44a1600
RBP: ffff8b14ad2e1c00 R08: ffffffff8bd8b860 R09: 0000000000000000
R10: 000000007ffff000 R11: 0000000000000000 R12: ffff8b13e44a1600
R13: 000000000000000a R14: 0000000000000000 R15: 0000000000000000
FS:  00007f78408764c0(0000) GS:ffff8b14d7200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000002a5fd9d784 CR3: 000000010b9b6005 CR4: 00000000001706f0
Call Trace:
 <TASK>
 ? rtnetlink_rcv_msg+0x140/0x3b0
 ? rtnl_calcit.isra.0+0x110/0x110
 ? netlink_rcv_skb+0x51/0x100
 ? netlink_unicast+0x21e/0x360
 ? netlink_sendmsg+0x242/0x4a0
 ? sock_sendmsg+0x5f/0x70
 ? ____sys_sendmsg+0x267/0x2b0
 ? ___sys_sendmsg+0x9a/0xe0
 ? __sys_sendmsg+0x68/0xa0
 ? do_syscall_64+0x5b/0x80
 ? __sys_recvmsg+0x89/0xa0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? __irq_exit_rcu+0x3d/0x140
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls binfmt_misc uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables cfg80211 nfnetlink rfkill qrtr sunrpc squashfs loop snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel iTCO_wdt intel_rapl_msr intel_rapl_common snd_intel_dspcfg x86_pkg_temp_thermal intel_pmc_bxt intel_powerclamp r8188eu(C) iTCO_vendor_support coretemp at24 snd_intel_sdw_acpi rapl intel_cstate libarc4 snd_usb_audio snd_hda_codec intel_uncore pcspkr snd_usbmidi_lib snd_rawmidi snd_hda_core mc snd_hwdep i2c_i801 snd_seq snd_seq_device i2c_smbus snd_pcm snd_timer snd joydev soundcore lpc_ich zram i915 crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic drm_buddy drm_display_helper ghash_clmulni_intel
 r8169 cec ttm video ip6_tables ip_tables fuse
CR2: 0000002a5fd9d784