Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #760778
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2023-07-19
Last occurrence
2023-07-19
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? switch_mm_irqs_off
vmlinux 0x303
2
? switch_mm_irqs_off
vmlinux 0x303
3
? switch_mm_irqs_off
vmlinux 0x303
4
? switch_mm_irqs_off
vmlinux 0x303
5
? switch_mm_irqs_off
vmlinux 0x303
6
switch_mm_irqs_off
vmlinux 0x303
7
switch_mm_irqs_off
vmlinux 0x303
8
switch_mm_irqs_off
vmlinux 0x303
9
switch_mm_irqs_off
vmlinux 0x303
10
switch_mm_irqs_off
vmlinux 0x303
11
switch_mm_irqs_off
vmlinux 0x303
12
switch_mm_irqs_off
vmlinux 0x303
13
switch_mm_irqs_off
vmlinux 0x303
14
switch_mm_irqs_off
vmlinux 0x303
15
switch_mm_irqs_off
vmlinux 0x303
16
switch_mm_irqs_off
vmlinux 0x303
17
switch_mm_irqs_off
vmlinux 0x303
BUG: unable to handle page fault for address: fffff50bafa07f88
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 7 PID: 666 Comm: ethtool Not tainted 6.3.8-200.fc38.x86_64 #1
Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A99FX PRO R2.0, BIOS 2501 04/07/2014
RIP: 0010:_compound_head+0x0/0x40
Code: 05 e9 54 f1 c2 00 0f 1f 44 00 00 e9 4a f1 c2 00 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <48> 8b 47 08 a8 01 75 24 66 90 48 89 f8 e9 1e f1 c2 00 f7 c7 ff 0f
RSP: 0018:ffffbc4700557ad0 EFLAGS: 00010293
RAX: 0000000000000000 RBX: fffff50bafa07f80 RCX: 0000000000000000
RDX: 00000003ffffffff RSI: 00000000fffffffd RDI: fffff50bafa07f80
RBP: 00007f4db61f4000 R08: ffff94f5838da558 R09: 00007f4db6200000
R10: ffff94f580eed9b0 R11: ffff94f58b9a6c0c R12: c7aa423c82fc0264
R13: 00007f4db61f3000 R14: ffffbc4700557cd8 R15: ffffbc4700557be8
FS:  0000000000000000(0000) GS:ffff94f8aedc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff50bafa07f88 CR3: 000000010cf2e000 CR4: 00000000000406e0
Call Trace:
 <TASK>
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? exc_page_fault+0x172/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? __pfx__compound_head+0x10/0x10
 pfn_swap_entry_to_page+0x67/0x80
 unmap_page_range+0xf8e/0x13f0
 unmap_vmas+0xf8/0x190
 exit_mmap+0xdb/0x2f0
 __mmput+0x49/0x130
 do_exit+0x2e7/0xb10
 do_group_exit+0x31/0x80
 get_signal+0x9a5/0x9e0
 arch_do_signal_or_restart+0x3e/0x270
 exit_to_user_mode_prepare+0x195/0x1f0
 irqentry_exit_to_user_mode+0x9/0x30
 asm_exc_page_fault+0x26/0x30
RIP: 0033:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 002b:00007fff0fb2fe38 EFLAGS: 00010256
RAX: 000000000000000c RBX: 0000000000000000 RCX: 0000000000000368
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000004cc
RBP: 00007fff0fb2fea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000001000 R11: 0000000000000206 R12: 00007f4db63262c0
R13: 000000000000000b R14: 0000000000000000 R15: 00007f4db63262c0
 </TASK>
Modules linked in: edac_mce_amd kvm_amd eeepc_wmi asus_wmi ledtrig_audio sparse_keymap ccp platform_profile joydev rfkill pcspkr fam15h_power kvm sunrpc wmi_bmof k10temp mxm_wmi irqbypass soundcore i2c_piix4 acpi_cpufreq binfmt_misc loop zram amdgpu iommu_v2 drm_buddy gpu_sched radeon drm_ttm_helper ttm crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni video polyval_generic i2c_algo_bit ghash_clmulni_intel uas sha512_ssse3 drm_display_helper usb_storage r8169 cec sp5100_tco wmi hid_steam ff_memless ip6_tables ip_tables fuse
CR2: fffff50bafa07f88