Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-08
Last occurrence
2023-03-08
Unique reports
1
Quality
-51

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? schedule
vmlinux 0x67
2
? schedule
vmlinux 0x67
3
? schedule
vmlinux 0x67
4
? schedule
vmlinux 0x67
5
? schedule
vmlinux 0x67
6
? schedule
vmlinux 0x67
7
? schedule
vmlinux 0x67
8
? schedule
vmlinux 0x67
9
? schedule
vmlinux 0x67
10
? schedule
vmlinux 0x67
11
? schedule
vmlinux 0x67
12
? schedule
vmlinux 0x67
13
? schedule
vmlinux 0x67
14
? schedule
vmlinux 0x67
15
? schedule
vmlinux 0x67
16
? schedule
vmlinux 0x67
BUG: unable to handle page fault for address: 00000000feae31c0
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 8 PID: 3374 Comm: Chrome_ChildIOT Tainted: P           OE      6.1.14-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. B450 GAMING X/B450 GAMING X, BIOS F50 11/27/2019
RIP: 0010:0xfeae31c0
Code: Unable to access opcode bytes at 0xfeae3196.
RSP: 0018:ffffa494031dbc88 EFLAGS: 00010046
RAX: ffff994900a08000 RBX: ffff99495e72dc08 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffffff84d56a22 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000000 R12: 000000018412cf68
R13: 0000000000000000 R14: ffff994ffeae31c0 R15: ffffffff84de6bef
FS:  00007f0741bfc6c0(0000) GS:ffff994ffec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000feae31c0 CR3: 00000001db91c000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? enqueue_hrtimer+0x2f/0x80
 ? schedule+0x5d/0xe0
 ? schedule_hrtimeout_range_clock+0xb5/0x100
 ? __hrtimer_init+0xe0/0xe0
 ? do_epoll_wait+0x684/0x7a0
 ? do_epoll_wait+0x684/0x7a0
 ? ep_eventpoll_poll+0x10/0x10
 ? __x64_sys_epoll_wait+0x5f/0xe0
 ? do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? __x64_sys_epoll_ctl+0x5c/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: tls uinput xt_conntrack xt_MASQUERADE bridge stp llc xt_addrtype nft_compat tun joydev apple_mfi_fastcharge snd_seq_dummy snd_hrtimer nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nvidia(POE) rfkill ip_set nf_tables nfnetlink qrtr sunrpc binfmt_misc vfat fat snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_usb_audio snd_hda_intel snd_intel_dspcfg snd_usbmidi_lib intel_rapl_msr snd_intel_sdw_acpi snd_rawmidi uvcvideo intel_rapl_common snd_hda_codec edac_mce_amd snd_hda_core pwc snd_hwdep snd_seq videobuf2_vmalloc videobuf2_memops kvm_amd videobuf2_v4l2 snd_seq_device videobuf2_common snd_pcm videodev kvm mc snd_timer snd pcspkr irqbypass soundcore gigabyte_wmi video wmi_bmof rapl k10temp
 i2c_piix4 gpio_amdpt gpio_generic acpi_cpufreq zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme ghash_clmulni_intel sha512_ssse3 sp5100_tco nvme_core ccp r8169 nvme_common wmi ip6_tables ip_tables fuse
CR2: 00000000feae31c0