Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640739
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-11
Last occurrence
2023-01-11
Unique reports
1
Quality
-29

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
enqueue_task_fair
vmlinux 0x87
2
enqueue_task_fair
vmlinux 0x87
3
enqueue_task_fair
vmlinux 0x87
4
? enqueue_task_fair
vmlinux 0x87
5
? enqueue_task_fair
vmlinux 0x87
6
? enqueue_task_fair
vmlinux 0x87
7
? enqueue_task_fair
vmlinux 0x87
8
? enqueue_task_fair
vmlinux 0x87
9
? enqueue_task_fair
vmlinux 0x87
10
? enqueue_task_fair
vmlinux 0x87
11
enqueue_task_fair
vmlinux 0x87
BUG: unable to handle page fault for address: 00000000006c0074
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1666 Comm: pipewire-pulse Not tainted 6.0.15-300.fc37.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./G41 Series, BIOS 080015  05/24/2018
RIP: 0010:blkcg_maybe_throttle_current+0x7f/0x290
Code: b3 a7 ff 48 85 c0 0f 84 64 01 00 00 48 3d 80 75 d9 aa 0f 84 9a 01 00 00 4c 8b a8 e0 00 00 00 4d 85 ed 74 06 49 3b 6d 00 74 25 <48> 63 75 74 48 8d b8 d0 00 00 00 e8 21 1e 0d 00 49 89 c5 48 85 c0
RSP: 0018:ffffa7978314be00 EFLAGS: 00010246
RAX: ffff92aa91944400 RBX: ffff92aaafdc4f80 RCX: 0000000000000000
RDX: ffff92aaafdc4f80 RSI: ffffa7978314bdc0 RDI: ffffa7978314bf58
RBP: 00000000006c0000 R08: ffff92aaaff87f50 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f17d27196c0(0000) GS:ffff92abbbc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000006c0074 CR3: 000000002b32a000 CR4: 00000000000406e0
Call Trace:
 <TASK>
 exit_to_user_mode_prepare+0x14c/0x1f0
 syscall_exit_to_user_mode+0x17/0x40
 do_syscall_64+0x67/0x80
 ? ksys_write+0xb4/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? fpregs_restore_userregs+0x53/0xe0
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f17e0798fd6
Code: 10 89 7c 24 0c 89 4c 24 1c e8 26 b6 f7 ff 44 8b 54 24 1c 8b 54 24 18 41 89 c0 48 8b 74 24 10 8b 7c 24 0c b8 e8 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 76 b6 f7 ff 8b 44
RSP: 002b:00007f17d2718a80 EFLAGS: 00000293 ORIG_RAX: 00000000000000e8
RAX: 0000000000000001 RBX: 00007f17d2718c80 RCX: 00007f17e0798fd6
RDX: 0000000000000020 RSI: 00007f17d2718ab0 RDI: 0000000000000009
RBP: 00007f17d2718c50 R08: 0000000000000000 R09: 00007f17d2718c80
R10: 00000000ffffffff R11: 0000000000000293 R12: 00000000ffffffff
R13: 0000561750292960 R14: 00005617502928b8 R15: 00007f17d1f19000
 </TASK>
Modules linked in: usblp tls nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr joydev coretemp kvm_intel kvm i2c_i801 irqbypass i2c_smbus zram r8169 serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CR2: 00000000006c0074