Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #691210
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-20
Last occurrence
2023-01-20
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? enqueue_task_fair
vmlinux 0x87
2
? enqueue_task_fair
vmlinux 0x87
3
? enqueue_task_fair
vmlinux 0x87
4
? enqueue_task_fair
vmlinux 0x87
5
? enqueue_task_fair
vmlinux 0x87
6
? enqueue_task_fair
vmlinux 0x87
7
? enqueue_task_fair
vmlinux 0x87
8
? enqueue_task_fair
vmlinux 0x87
9
? enqueue_task_fair
vmlinux 0x87
10
? enqueue_task_fair
vmlinux 0x87
11
? enqueue_task_fair
vmlinux 0x87
12
? enqueue_task_fair
vmlinux 0x87
13
? enqueue_task_fair
vmlinux 0x87
14
? enqueue_task_fair
vmlinux 0x87
BUG: unable to handle page fault for address: ffff951d5e8f19c0
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD ae001067 P4D ae001067 PUD ae005067 PMD 800000041e8001e3 
Oops: 0011 [#2] PREEMPT SMP NOPTI
CPU: 4 PID: 2646 Comm: Chrome_ChildIOT Tainted: G      D            6.0.15-300.fc37.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME B450M-A, BIOS 3802 04/28/2022
RIP: 0010:0xffff951d5e8f19c0
Code: ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffffb30dca157cd0 EFLAGS: 00010246
RAX: 0000000000400040 RBX: ffffb30dca157cd0 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffffb17aac9a RDI: 00000000ffffffff
RBP: ffff951a4090d180 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000004 R12: 000000000000c350
R13: 0000000000000000 R14: ffff951aa56e7568 R15: ffff951aa56e7568
FS:  00007f692fbfb6c0(0000) GS:ffff951d5e900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff951d5e8f19c0 CR3: 00000001464b8000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? __schedule+0x332/0x12c0
 ? timerqueue_add+0x62/0xb0
 ? enqueue_hrtimer+0x2f/0x80
 ? preempt_count_add+0x6a/0xa0
 ? _raw_write_lock_irq+0x19/0x40
 ? ep_eventpoll_poll+0x10/0x10
 ? __x64_sys_epoll_wait+0x5f/0xe0
 ? do_syscall_64+0x5b/0x80
 ? __x64_sys_epoll_wait+0x5f/0xe0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr sunrpc snd_hda_codec_realtek intel_rapl_msr snd_hda_codec_generic intel_rapl_common snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi edac_mce_amd snd_hda_codec snd_hda_core snd_hwdep snd_seq kvm_amd snd_seq_device snd_pcm eeepc_wmi kvm asus_wmi ledtrig_audio sparse_keymap snd_timer platform_profile joydev snd rfkill irqbypass video rapl i2c_piix4 wmi_bmof k10temp pcspkr soundcore gpio_amdpt acpi_cpufreq gpio_generic zram amdgpu drm_ttm_helper ttm crct10dif_pclmul iommu_v2 gpu_sched crc32_pclmul drm_buddy crc32c_intel polyval_clmulni drm_display_helper polyval_generic ccp r8169 cec sp5100_tco ghash_clmulni_intel wmi ip6_tables ip_tables fuse
CR2: ffff951d5e8f19c0