Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-08-14
Last occurrence
2021-08-23
Unique reports
5
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 34 5 / 5
Architecture Count
x86_64 5

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
_raw_spin_lock_irq
vmlinux 0x21
5
? _raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
? _raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
? _raw_spin_lock_irq
vmlinux 0x21
10
? _raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
? _raw_spin_lock_irq
vmlinux 0x21
WARNING: CPU: 20 PID: 267 at arch/x86/platform/efi/quirks.c:712 efi_recover_from_page_fault+0x2a/0xc0
Modules linked in:
CPU: 20 PID: 267 Comm: kworker/u48:2 Tainted: G          I       5.11.12-300.fc34.x86_64 #1
Hardware name: Apple Inc. MacPro7,1/Mac-27AD2F918AE68F61, BIOS 1554.140.20.0.0 (iBridge: 18.16.14759.0.1,0) 06/22/2021
Workqueue: efi_rts_wq efi_call_rts
RIP: 0010:efi_recover_from_page_fault+0x2a/0xc0
Code: 0f 1f 44 00 00 8b 15 35 3d 5f 02 85 d2 74 09 48 81 ff ff 0f 00 00 77 01 c3 53 48 89 fe 48 c7 c7 20 da 39 b0 50 e8 85 f5 a9 00 <0f> 0b 83 3d 0d 3d 5f 02 0a 0f 84 60 eb a9 00 48 8b 3d 98 6f 44 02
RSP: 0000:ffffabefc0876ad8 EFLAGS: 00010096
RAX: 0000000000000047 RBX: ffff8fb50aa1c000 RCX: ffffffffb0b14ec8
RDX: c0000000ffffdfff RSI: 00000000ffffdfff RDI: 0000000000000046
RBP: ffffabefc0876bc8 R08: 0000000000000000 R09: ffffabefc0876908
R10: ffffabefc0876900 R11: ffffffffb0b44f08 R12: ffffabefc00c4000
R13: 0000000000000000 R14: 000000000000000b R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8fcc3fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffabefc00c4000 CR3: 0000000100216002 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 no_context+0x11e/0x350
 __bad_area_nosemaphore+0x52/0x170
 exc_page_fault+0xc4/0x150
 asm_exc_page_fault+0x1e/0x30
RIP: 0010:0xfffffffefe7d60c5
Code: 31 c9 48 29 f9 48 83 e1 0f 74 0c 4c 39 c1 49 0f 47 c8 49 29 c8 f3 a4 4c 89 c1 49 83 e0 0f 48 c1 e9 04 74 2c f3 0f 7f 44 24 18 <f3> 0f 6f 06 66 0f e7 07 48 83 c6 10 48 83 c7 10 e2 ee 0f ae f0 66
RSP: 0000:ffffabefc0876c78 EFLAGS: 00010286
RAX: fffffffefe628fc1 RBX: 0000000000000607 RCX: 0000000000000037
RDX: ffffabefc00c3d70 RSI: ffffabefc00c3fff RDI: fffffffefe629250
RBP: ffffabefc0876d00 R08: 0000000000000008 R09: ffffabefc00c4376
R10: 000000000000000b R11: fffffffefe7fa2b2 R12: 0000000000000000
R13: ffffffffb03f271a R14: ffffabefc00c3d70 R15: ffffabefc00c3df0
 ? __efi_call+0x25/0x30
 ? efi_call_rts+0x191/0x760
 ? process_one_work+0x1ec/0x380
 ? worker_thread+0x53/0x3e0
 ? process_one_work+0x380/0x380
 ? kthread+0x11b/0x140
 ? kthread_associate_blkcg+0xa0/0xa0
 ? ret_from_fork+0x1f/0x30