Kerneloops

Similar reports
Problem #611355
Component
kernel
Last affected version
0:6.4.15-200.fc38
Executable
unknown
First occurrence
2023-09-10
Last occurrence
2023-10-03
Unique reports
12
Quality
-56

Statistics

Operating system Unique / Total count
Fedora 38 12 / 14
Operating system Count
Fedora 38 14
Architecture Count
x86_64 14
Related packages Count
kernel-core 14
 0:6.4.15-200.fc38 8
 0:6.4.14-200.fc38 6

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? drm_atomic_check_only
vmlinux 0x92f
2
? drm_atomic_check_only
vmlinux 0x92f
3
? drm_atomic_check_only
vmlinux 0x92f
4
? drm_atomic_check_only
vmlinux 0x92f
5
? drm_atomic_check_only
vmlinux 0x92f
6
? drm_atomic_check_only
vmlinux 0x92f
7
? drm_atomic_check_only
vmlinux 0x92f
8
? drm_atomic_check_only
vmlinux 0x92f
9
drm_atomic_check_only
vmlinux 0x92f
10
drm_atomic_check_only
vmlinux 0x92f
11
drm_atomic_check_only
vmlinux 0x92f
12
drm_atomic_check_only
vmlinux 0x92f
13
? drm_atomic_check_only
vmlinux 0x92f
14
? drm_atomic_check_only
vmlinux 0x92f
15
drm_atomic_check_only
vmlinux 0x92f
16
drm_atomic_check_only
vmlinux 0x92f
17
? drm_atomic_check_only
vmlinux 0x92f
18
? drm_atomic_check_only
vmlinux 0x92f
19
? drm_atomic_check_only
vmlinux 0x92f
20
? drm_atomic_check_only
vmlinux 0x92f
21
drm_atomic_check_only
vmlinux 0x92f
WARNING: CPU: 4 PID: 40007 at mm/gup.c:1105 __get_user_pages+0x57b/0x670
Modules linked in: xt_nat veth xt_conntrack xt_MASQUERADE nf_conntrack_netlink xt_addrtype nft_compat br_netfilter bridge stp llc overlay hid_logitech_hidpp hid_logitech_dj uinput rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc binfmt_misc vfat fat iwlmvm snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils mac80211 snd_hda_codec_realtek intel_rapl_msr snd_soc_core intel_rapl_common snd_hda_codec_generic edac_mce_amd snd_compress snd_hda_codec_hdmi ac97_bus kvm_amd snd_hda_intel snd_pcm_dmaengine libarc4 snd_intel_dspcfg snd_pci_ps snd_intel_sdw_acpi snd_rpl_pci_acp6x uvcvideo kvm iwlwifi snd_pci_acp6x snd_hda_codec uvc videobuf2_vmalloc videobuf2_memops snd_hda_core videobuf2_v4l2 btusb videobuf2_common
 snd_hwdep btrtl snd_seq btbcm btintel snd_seq_device btmtk videodev snd_pcm irqbypass bluetooth mc snd_pci_acp5x cfg80211 asus_nb_wmi snd_timer rapl wmi_bmof snd_rn_pci_acp3x snd_acp_config snd snd_soc_acpi hid_sensor_accel_3d soundcore snd_pci_acp3x pcspkr i2c_piix4 k10temp acpi_cpufreq hid_sensor_trigger hid_sensor_iio_common industrialio_triggered_buffer kfifo_buf industrialio amd_pmc asus_wireless joydev loop zram amdgpu nouveau nvme mxm_wmi hid_asus drm_suballoc_helper i2c_algo_bit nvme_core iommu_v2 drm_ttm_helper asus_wmi drm_buddy crct10dif_pclmul ttm crc32_pclmul gpu_sched crc32c_intel ucsi_acpi ledtrig_audio hid_multitouch drm_display_helper polyval_clmulni sparse_keymap polyval_generic hid_sensor_hub ghash_clmulni_intel sha512_ssse3 typec_ucsi amd_sfh ccp cec sp5100_tco typec platform_profile nvme_common rfkill i2c_hid_acpi video i2c_hid wmi ip6_tables ip_tables fuse
CPU: 4 PID: 40007 Comm: chrome_crashpad Not tainted 6.4.14-200.fc38.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. ROG Flow X13 GV301QC_GV301QC/GV301QC, BIOS GV301QC.415 04/14/2023
RIP: 0010:__get_user_pages+0x57b/0x670
Code: 00 e9 cb fd ff ff 48 03 bd 88 00 00 00 e9 c7 fb ff ff 48 81 e1 00 f0 ff ff e9 4b fc ff ff 48 81 e2 00 f0 ff ff e9 b5 fc ff ff <0f> 0b e9 21 fb ff ff f6 c3 04 0f 85 4d ff ff ff 49 8b 3f 48 89 f8
RSP: 0018:ffffb447d0b03c30 EFLAGS: 00010202
RAX: ffff992f3d988b40 RBX: 000000000005100a RCX: 00007ffd0f0ddfff
RDX: 0000000000000000 RSI: 00007facf79c6000 RDI: ffff992f342b5200
RBP: ffff992f30b32100 R08: ffff992ec616f108 R09: 0000000000000001
R10: ffff992ec616f180 R11: ffff992ec616f10c R12: 0000000000000000
R13: ffff992f3d988b40 R14: ffffb447d0b03cf4 R15: ffffb447d0b03cf4
FS:  00007fc33c41afc0(0000) GS:ffff99319e700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc33c3262b0 CR3: 00000002c2b14000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? __get_user_pages+0x57b/0x670
 ? __warn+0x81/0x130
 ? __get_user_pages+0x57b/0x670
 ? report_bug+0x171/0x1a0
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __get_user_pages+0x57b/0x670
 get_user_pages_remote+0x14a/0x400
 __access_remote_vm+0x1bf/0x420
 mem_rw.isra.0+0x111/0x1d0
 vfs_read+0xac/0x320
 ? srso_alias_return_thunk+0x5/0x7f
 ? __seccomp_filter+0x32c/0x4f0
 __x64_sys_pread64+0x98/0xd0
 do_syscall_64+0x60/0x90
 ? srso_alias_return_thunk+0x5/0x7f
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? srso_alias_return_thunk+0x5/0x7f
 ? do_syscall_64+0x6c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fc33c305efd
Code: e8 48 89 75 f0 89 7d f8 48 89 4d e0 e8 dc 55 f8 ff 4c 8b 55 e0 48 8b 55 e8 41 89 c0 48 8b 75 f0 8b 7d f8 b8 11 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 45 f8 e8 2f 56 f8 ff 48 8b
RSP: 002b:00007ffe48abced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000011
RAX: ffffffffffffffda RBX: 00007ffe48abe348 RCX: 00007fc33c305efd
RDX: 0000000000001000 RSI: 00007ffe48abd1f0 RDI: 0000000000000007
RBP: 00007ffe48abcef0 R08: 0000000000000000 R09: 00000000096264d8
R10: 00007facf79c5848 R11: 0000000000000293 R12: 00007ffe48abd1f0
R13: 00000f2c0023c360 R14: 00007facf79c5848 R15: 0000000000001000
 </TASK>