Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #557597
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-31
Last occurrence
2023-03-31
Unique reports
1
Quality
-51

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
drm_atomic_nonblocking_commit
vmlinux 0x13
2
drm_atomic_nonblocking_commit
vmlinux 0x13
3
drm_atomic_nonblocking_commit
vmlinux 0x13
4
drm_atomic_nonblocking_commit
vmlinux 0x13
5
? drm_atomic_nonblocking_commit
vmlinux 0x13
6
drm_atomic_nonblocking_commit
vmlinux 0x13
7
? drm_atomic_nonblocking_commit
vmlinux 0x13
8
drm_atomic_nonblocking_commit
vmlinux 0x13
9
drm_atomic_nonblocking_commit
vmlinux 0x13
10
drm_atomic_nonblocking_commit
vmlinux 0x13
11
drm_atomic_nonblocking_commit
vmlinux 0x13
12
? drm_atomic_nonblocking_commit
vmlinux 0x13
13
? drm_atomic_nonblocking_commit
vmlinux 0x13
14
? drm_atomic_nonblocking_commit
vmlinux 0x13
15
? drm_atomic_nonblocking_commit
vmlinux 0x13
16
? drm_atomic_nonblocking_commit
vmlinux 0x13
17
? drm_atomic_nonblocking_commit
vmlinux 0x13
18
? drm_atomic_nonblocking_commit
vmlinux 0x13
19
? drm_atomic_nonblocking_commit
vmlinux 0x13
20
drm_atomic_nonblocking_commit
vmlinux 0x13
BUG: Bad page map in process pool-org.gnome.  pte:400000000000 pmd:307e4a067
addr:00007f10e15f5000 vm_flags:08100073 anon_vma:ffff9c7bd8c8e138 mapping:0000000000000000 index:7f10e15f5
 unmap_vmas+0xea/0x180
file:(null) fault:0x0 mmap:0x0 read_folio:0x0
 exit_mmap+0xd4/0x2b0
 __mmput+0x49/0x130
 begin_new_exec+0x4c2/0xb10
 ? load_elf_phdrs+0x6c/0xc0
 load_elf_binary+0x2c2/0x1770
 ? _raw_read_lock+0x13/0x40
 bprm_execve+0x282/0x650
 do_execveat_common.isra.0+0x1ad/0x250
 __x64_sys_execve+0x32/0x40
 do_syscall_64+0x5b/0x80
 ? do_syscall_64+0x67/0x80
 ? do_dup2+0x7b/0xc0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f1140d9145b
Code: Unable to access opcode bytes at 0x7f1140d91431.
RSP: 002b:00007f10e37fc478 EFLAGS: 00000293 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1140d9145b
RDX: 00007fffc17adbf0 RSI: 00007f10e37fc520 RDI: 00007f109438e3e0
RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f10e37fe6c0
R10: 0000000000000000 R11: 0000000000000293 R12: 00007f10e37fc520
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
 </TASK>
CPU: 0 PID: 59111 Comm: pool-org.gnome. Tainted: G    B              6.2.8-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. B85-HD3/B85-HD3, BIOS F1 RH 04/22/2013
Call Trace: