Kerneloops

Similar reports
Problem #575416
Component
kernel Tainted
Last affected version
0:6.3.4-201.fc38
Executable
unknown
First occurrence
2023-06-04
Last occurrence
2023-06-04
Unique reports
1
Quality
-44

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.3.4-201.fc38 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
asm_exc_control_protection
vmlinux 0x26
2
asm_exc_control_protection
vmlinux 0x26
3
asm_exc_control_protection
vmlinux 0x26
4
asm_exc_control_protection
vmlinux 0x26
5
asm_exc_control_protection
vmlinux 0x26
6
asm_exc_control_protection
vmlinux 0x26
7
asm_exc_control_protection
vmlinux 0x26
8
asm_exc_control_protection
vmlinux 0x26
9
asm_exc_control_protection
vmlinux 0x26
10
asm_exc_control_protection
vmlinux 0x26
11
asm_exc_control_protection
vmlinux 0x26
12
asm_exc_control_protection
vmlinux 0x26
13
? asm_exc_control_protection
vmlinux 0x26
14
? asm_exc_control_protection
vmlinux 0x26
15
? asm_exc_control_protection
vmlinux 0x26
16
? asm_exc_control_protection
vmlinux 0x26
17
? asm_exc_control_protection
vmlinux 0x26
18
asm_exc_control_protection
vmlinux 0x26
kernel BUG at arch/x86/kernel/jump_label.c:73!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 1877 Comm: systemd-sleep Tainted: P           OE      6.3.4-201.fc38.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./B360M/OEM, BIOS L0.01 07/17/2019
RIP: 0010:__jump_label_patch+0x10e/0x110
Code: eb 9c 0f 0b 0f 0b 48 c7 c3 18 36 d0 92 41 56 45 89 e1 49 89 d8 4c 89 e9 4c 89 ea 4c 89 ee 48 c7 c7 f0 22 8c 91 e8 f2 22 16 00 <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00
RSP: 0018:ffffac578198fc00 EFLAGS: 00010246
RAX: 00000000000000a8 RBX: ffffffff9120afc1 RCX: 0000000000000027
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff91999dc21540
RBP: ffffac578198fc30 R08: 0000000000000000 R09: ffffac578198faa8
R10: 0000000000000003 R11: ffffffff92146108 R12: 0000000000000002
R13: ffffffffc4768748 R14: 0000000000000001 R15: ffff919669ee43e0
FS:  00007fe1ed06a940(0000) GS:ffff91999dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdfc52a2b68 CR3: 0000000134be6003 CR4: 00000000003706f0
Call Trace:
 <TASK>
 arch_jump_label_transform_queue+0x37/0x80
 __jump_label_update+0x6e/0x120
 jump_label_update+0x9c/0x100
 static_key_slow_inc_cpuslocked+0x51/0x90
 static_key_slow_inc+0x1a/0x30
 freeze_processes+0xae/0xc0
 pm_suspend+0x1bd/0x590
 state_store+0x6c/0xd0
 kernfs_fop_write_iter+0x133/0x1d0
 vfs_write+0x236/0x3f0
 ksys_write+0x6f/0xf0
 do_syscall_64+0x5d/0x90
 ? __sys_sendmsg+0x7a/0xd0
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? do_syscall_64+0x6c/0x90
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? exc_page_fault+0x7c/0x180
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fe1ed323164
Code: 89 02 48 c7 c0 ff ff ff ff eb bd 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d 7d b4 0d 00 00 74 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89
RSP: 002b:00007ffdae8a0fa8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe1ed323164
RDX: 0000000000000004 RSI: 00007ffdae8a10a0 RDI: 0000000000000004
RBP: 00007ffdae8a0fd0 R08: 0000560cdaecf190 R09: 0000000000000001
R10: 0000560cda119d95 R11: 0000000000000202 R12: 0000000000000004
R13: 00007ffdae8a10a0 R14: 0000560cdaece2c0 R15: 0000000000000004
 </TASK>
Modules linked in: snd_seq_dummy snd_hrtimer nvidia_drm(POE) nvidia_modeset(POE) nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nvidia_uvm(POE) nfnetlink qrtr nvidia(POE) sunrpc binfmt_misc vfat fat snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils intel_rapl_msr soundwire_bus intel_rapl_common intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp snd_soc_skl coretemp snd_soc_hdac_hda kvm_intel snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_compress ledtrig_audio kvm snd_hda_codec_hdmi ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec
 mei_pxp snd_hda_core mei_hdcp snd_hwdep snd_seq iTCO_wdt ee1004 intel_pmc_bxt iTCO_vendor_support snd_seq_device irqbypass rapl intel_cstate snd_pcm mei_me snd_timer intel_uncore snd i2c_i801 wmi_bmof i2c_smbus pcspkr soundcore mei intel_pch_thermal joydev acpi_pad acpi_tad loop zram hid_logitech_hidpp crct10dif_pclmul crc32_pclmul nvme crc32c_intel polyval_clmulni polyval_generic nvme_core ghash_clmulni_intel e1000e sha512_ssse3 nvme_common video wmi hid_logitech_dj ip6_tables ip_tables fuse