Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-12
Last occurrence
2023-03-12
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? schedule
vmlinux 0x67
2
? schedule
vmlinux 0x67
3
? schedule
vmlinux 0x67
4
? schedule
vmlinux 0x67
5
? schedule
vmlinux 0x67
6
? schedule
vmlinux 0x67
7
? schedule
vmlinux 0x67
8
? schedule
vmlinux 0x67
9
? schedule
vmlinux 0x67
10
? schedule
vmlinux 0x67
11
? schedule
vmlinux 0x67
12
? schedule
vmlinux 0x67
13
? schedule
vmlinux 0x67
BUG: unable to handle page fault for address: ffffac3c502afe48
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD 100000067 P4D 100000067 PUD 1001f6067 PMD 10af8f067 PTE 800000011161d163
Oops: 0011 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 106274 Comm: firefox-bin Tainted: G           OE      6.1.14-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. AB350-Gaming 3/AB350-Gaming 3-CF, BIOS F52e 12/14/2021
RIP: 0010:0xffffac3c502afe48
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffffac3c502afa50 EFLAGS: 00010246
RAX: 0000000000400000 RBX: ffffac3c502afa50 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffffb2749b33 RDI: 00000000ffffffff
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 000000000000000a R11: 0000000000000000 R12: 000000000000c350
R13: 0000000000000000 R14: 0000000000000000 R15: ffff892dfe2d7e00
FS:  00007f793f8ea780(0000) GS:ffff892eeea80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffac3c502afe48 CR3: 00000003766a0000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? __pollwait+0xe0/0xe0
 ? __pollwait+0xe0/0xe0
 ? __pollwait+0xe0/0xe0
 ? __pollwait+0xe0/0xe0
 ? __pollwait+0xe0/0xe0
 ? __pollwait+0xe0/0xe0
 ? __x64_sys_poll+0x93/0x120
 ? do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
 </TASK>
Modules linked in: uinput tls snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc binfmt_misc vfat fat joydev snd_hda_codec_realtek snd_hda_codec_generic intel_rapl_msr snd_hda_codec_hdmi ledtrig_audio intel_rapl_common edac_mce_amd snd_hda_intel uvcvideo btusb snd_intel_dspcfg btrtl snd_intel_sdw_acpi videobuf2_vmalloc snd_usb_audio kvm snd_hda_codec btbcm videobuf2_memops snd_usbmidi_lib snd_hda_core videobuf2_v4l2 snd_rawmidi videobuf2_common btintel snd_hwdep irqbypass btmtk snd_seq videodev rapl snd_seq_device mc bluetooth snd_pcm razermouse(OE) gigabyte_wmi wmi_bmof snd_timer snd pcspkr k10temp soundcore i2c_piix4 rfkill gpio_amdpt gpio_generic acpi_cpufreq loop zram amdgpu drm_ttm_helper ttm iommu_v2 video
 crct10dif_pclmul crc32_pclmul gpu_sched crc32c_intel polyval_clmulni drm_buddy polyval_generic drm_display_helper ghash_clmulni_intel sha512_ssse3 cec ccp sp5100_tco hid_semitek r8169 wmi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CR2: ffffac3c502afe48