Bug on Fedora 32 and GTX 1060 (Driver 450 and 455)

I have a GTX 1060 3GB (by MSI) card running on a fully patched Fedora 32 (kernel-5.8.15-201.fc32.x86_64). Frequently, but not every time, after Gnome has been locked, a kerneloops “Bug” occurs in the kernel according ABRT, but there is not enough information for a backtrace.

My screen will lock as is (i.e. off or with whatever screen image was on at the time), the keyboard and mouse are no longer responsive at all (I can’t even CTRL-ALT-F4 to switch to a CLI console). CAPS and NUM lock don’t work.

I can ssh into the PC and it’s otherwise fully operational. All server like services are working 100%.

It did it yesterday when I was running driver NVIDIA-Linux-x86_64-450.66, so I upgraded to NVIDIA-Linux-x86_64-455.28 and it did it today again.

The ABRT list of errors tells me something like this:

Reason: BUG: unable to handle page fault for address: 000000000000a580 [nvidia_modeset]

Crash_function: _nv002830kms

The backtrace info states:
    BUG: unable to handle page fault for address: 000000000000a580
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page
    PGD 0 P4D 0 
    Oops: 0000 [#1] SMP PTI
    CPU: 2 PID: 3365 Comm: Xorg Tainted: P           OE     5.8.15-201.fc32.x86_64 #1
    Hardware name: MSI MS-7758/Z77A-G41 (MS-7758), BIOS V2.11 07/09/2013
    RIP: 0010:_nv002666kms+0x60/0x100 [nvidia_modeset]
    Code: eb 40 0f 1f 84 00 00 00 00 00 48 c7 03 00 00 00 00 c6 43 08 00 41 8b 86 d0 00 00 00 83 c5 01 48 81 c3 98 05 00 00 39 e8 76 18 <48> 8b 3b 48 85 ff 74 ea 80 7b 08 00 75 d2 e8 bd d3 ff ff eb cb 0f
    RSP: 0018:ffffb82cc33f7cf8 EFLAGS: 00010202
    RAX: 0000000000000004 RBX: 000000000000a580 RCX: 0000000000000004
    RDX: 0000000000000001 RSI: 000000000000a580 RDI: ffff9981dadf1008
    RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000004 R11: 0000000000000001 R12: 000000000000a580
    R13: 000000000000a580 R14: ffff9981dadf1008 R15: 0000000000000001
    FS:  00007f371b2d2ec0(0000) GS:ffff998246d00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 000000000000a580 CR3: 0000000594e74004 CR4: 00000000000606e0
    Call Trace:
     ? _nv002830kms+0x3ca/0x1480 [nvidia_modeset]
     ? avc_has_extended_perms+0x4f/0x3d0
     ? _nv000568kms+0x50/0x50 [nvidia_modeset]
     ? __alloc_pages_nodemask+0x15c/0x320
     ? _nv000720kms+0x31/0xe0 [nvidia_modeset]
     ? _copy_from_user+0x2e/0x60
     ? _nv000568kms+0x50/0x50 [nvidia_modeset]
     ? nvKmsIoctl+0x96/0x1d0 [nvidia_modeset]
     ? perf_event_nmi_handler+0x40/0x50
     ? nvkms_ioctl+0xd5/0x150 [nvidia_modeset]
     ? nvidia_frontend_unlocked_ioctl+0x37/0x50 [nvidia]
     ? ksys_ioctl+0x82/0xc0
     ? __x64_sys_ioctl+0x16/0x20
     ? do_syscall_64+0x4d/0x90
     ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
    Modules linked in: nls_utf8 udf crc_itu_t ip6table_mangle ip6table_nat ebtable_filter ebtables ip6table_filter ip6_tables tun bridge stp llc rfkill nf_conntrack_pptp nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_ftp nf_log_ipv4 nf_log_common xt_LOG xt_recent xt_state ipt_REJECT nf_reject_ipv4 xt_conntrack iptable_filter xt_MASQUERADE iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_CHECKSUM iptable_mangle xfs pktcdvd intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm snd_usb_audio mei_hdcp at24 snd_usbmidi_lib iTCO_wdt intel_pmc_bxt snd_rawmidi iTCO_vendor_support ppdev mc snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_hda_codec irqbypass rapl joydev intel_cstate snd_hda_core intel_uncore snd_hwdep snd_seq snd_seq_device snd_pcm i2c_i801 pcspkr i2c_smbus snd_timer snd lpc_ich mei_me soundcore mei parport_pc parport binfmt_misc ip_tables
     nvidia_drm(POE) nvidia_modeset(POE) nvidia(POE) ata_generic pata_acpi crct10dif_pclmul drm_kms_helper crc32_pclmul crc32c_intel cec ghash_clmulni_intel drm r8169 pata_jmicron wmi video uas usb_storage fuse
    CR2: 000000000000a580

Let me know if you need the details from the DMESG output as well.

I’ll gladly assist in any way with information so that we can stop this from happening.