Kerneloops

Similar reports
Problem #611355
Component
kernel Tainted
Last affected version
0:6.4.14-200.fc38
Executable
unknown
First occurrence
2023-09-13
Last occurrence
2023-09-20
Unique reports
1
Quality
-62

Statistics

Operating system Unique / Total count
Fedora 38 1 / 4
Operating system Count
Fedora 38 4
Architecture Count
x86_64 4
Related packages Count
kernel-core 4
 0:6.4.14-200.fc38 4

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? drm_atomic_check_only
vmlinux 0x92f
2
? drm_atomic_check_only
vmlinux 0x92f
3
? drm_atomic_check_only
vmlinux 0x92f
4
? drm_atomic_check_only
vmlinux 0x92f
5
? drm_atomic_check_only
vmlinux 0x92f
6
? drm_atomic_check_only
vmlinux 0x92f
7
? drm_atomic_check_only
vmlinux 0x92f
8
? drm_atomic_check_only
vmlinux 0x92f
9
drm_atomic_check_only
vmlinux 0x92f
10
drm_atomic_check_only
vmlinux 0x92f
11
drm_atomic_check_only
vmlinux 0x92f
12
drm_atomic_check_only
vmlinux 0x92f
13
? drm_atomic_check_only
vmlinux 0x92f
14
? drm_atomic_check_only
vmlinux 0x92f
15
drm_atomic_check_only
vmlinux 0x92f
16
drm_atomic_check_only
vmlinux 0x92f
17
? drm_atomic_check_only
vmlinux 0x92f
18
? drm_atomic_check_only
vmlinux 0x92f
19
? drm_atomic_check_only
vmlinux 0x92f
20
? drm_atomic_check_only
vmlinux 0x92f
21
? drm_atomic_check_only
vmlinux 0x92f
22
drm_atomic_check_only
vmlinux 0x92f
WARNING: CPU: 13 PID: 3170810 at mm/gup.c:1105 __get_user_pages+0x57b/0x670
Modules linked in: veth tun snd_usb_audio snd_usbmidi_lib snd_rawmidi mc uas usb_storage uinput xt_conntrack xt_MASQUERADE nf_conntrack_netlink uhid xt_addrtype nft_compat br_netfilter bridge stp llc rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nvidia_drm(POE) nft_chain_nat nf_nat nvidia_modeset(POE) nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nvidia_uvm(POE) ip_set sunrpc nf_tables overlay nfnetlink qrtr bnep nvidia(POE) binfmt_misc vfat fat snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel snd_compress mt7921e ac97_bus snd_intel_dspcfg intel_rapl_msr snd_intel_sdw_acpi mt7921_common snd_pcm_dmaengine intel_rapl_common snd_hda_codec mt76_connac_lib edac_mce_amd snd_pci_ps snd_rpl_pci_acp6x mt76 snd_hda_core btusb
 snd_pci_acp6x snd_hwdep btrtl snd_pci_acp5x kvm_amd mac80211 btbcm snd_seq btintel snd_rn_pci_acp3x snd_seq_device btmtk snd_acp_config libarc4 snd_pcm kvm bluetooth cfg80211 snd_soc_acpi irqbypass snd_timer asus_nb_wmi acpi_cpufreq pcspkr snd_pci_acp3x k10temp rapl wmi_bmof snd i2c_piix4 soundcore asus_wireless amd_pmc joydev squashfs loop zram amdgpu hid_asus i2c_algo_bit asus_wmi drm_ttm_helper ttm ledtrig_audio sparse_keymap platform_profile drm_suballoc_helper iommu_v2 drm_buddy nvme crct10dif_pclmul gpu_sched crc32_pclmul crc32c_intel polyval_clmulni nvme_core polyval_generic drm_display_helper rfkill hid_multitouch ucsi_acpi ghash_clmulni_intel typec_ucsi sha512_ssse3 serio_raw ccp r8169 sp5100_tco cec nvme_common typec i2c_hid_acpi video i2c_hid wmi ip6_tables ip_tables fuse
CPU: 13 PID: 3170810 Comm: chrome_crashpad Tainted: P           OE      6.4.14-200.fc38.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. ROG Strix G513IC_G513IC/G513IC, BIOS G513IC.314 03/30/2022
RIP: 0010:__get_user_pages+0x57b/0x670
Code: 00 e9 cb fd ff ff 48 03 bd 88 00 00 00 e9 c7 fb ff ff 48 81 e1 00 f0 ff ff e9 4b fc ff ff 48 81 e2 00 f0 ff ff e9 b5 fc ff ff <0f> 0b e9 21 fb ff ff f6 c3 04 0f 85 4d ff ff ff 49 8b 3f 48 89 f8
RSP: 0018:ffffb8ecd59d7c30 EFLAGS: 00010202
RAX: ffff96425cb6c960 RBX: 000000000005100a RCX: 00007ffc14541fff
RDX: 0000000000000000 RSI: 00007fc8117cf000 RDI: ffff9643fb285180
RBP: ffff96434ba8b700 R08: ffff964347925e08 R09: 0000000000000001
R10: ffff964347925e80 R11: ffff964347925e0c R12: 0000000000000000
R13: ffff96425cb6c960 R14: ffffb8ecd59d7cf4 R15: ffffb8ecd59d7cf4
FS:  00007fa538e30fc0(0000) GS:ffff964817740000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00003cfc0037d020 CR3: 0000000130322000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 ? __get_user_pages+0x57b/0x670
 ? __warn+0x81/0x130
 ? __get_user_pages+0x57b/0x670
 ? report_bug+0x171/0x1a0
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __get_user_pages+0x57b/0x670
 get_user_pages_remote+0x14a/0x400
 __access_remote_vm+0x1bf/0x420
 mem_rw.isra.0+0x111/0x1d0
 vfs_read+0xac/0x320
 ? srso_return_thunk+0x5/0x10
 ? __seccomp_filter+0x32c/0x4f0
 __x64_sys_pread64+0x98/0xd0
 do_syscall_64+0x60/0x90
 ? srso_return_thunk+0x5/0x10
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? srso_return_thunk+0x5/0x10
 ? do_syscall_64+0x6c/0x90
 ? do_syscall_64+0x6c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fa538d05efd
Code: e8 48 89 75 f0 89 7d f8 48 89 4d e0 e8 dc 55 f8 ff 4c 8b 55 e0 48 8b 55 e8 41 89 c0 48 8b 75 f0 8b 7d f8 b8 11 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 45 f8 e8 2f 56 f8 ff 48 8b
RSP: 002b:00007fff0c2fbdc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000011
RAX: ffffffffffffffda RBX: 00007fff0c2fd238 RCX: 00007fa538d05efd
RDX: 0000000000001000 RSI: 00007fff0c2fc0e0 RDI: 0000000000000008
RBP: 00007fff0c2fbde0 R08: 0000000000000000 R09: 00000000096264d8
R10: 00007fc8117ce848 R11: 0000000000000293 R12: 00007fff0c2fc0e0
R13: 00003cfc0023c300 R14: 00007fc8117ce848 R15: 0000000000001000
 </TASK>