Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #760778
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-06-18
Last occurrence
2023-06-18
Unique reports
1
Quality
-46

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? switch_mm_irqs_off
vmlinux 0x303
2
? switch_mm_irqs_off
vmlinux 0x303
3
? switch_mm_irqs_off
vmlinux 0x303
4
? switch_mm_irqs_off
vmlinux 0x303
5
? switch_mm_irqs_off
vmlinux 0x303
6
? switch_mm_irqs_off
vmlinux 0x303
7
? switch_mm_irqs_off
vmlinux 0x303
8
switch_mm_irqs_off
vmlinux 0x303
9
switch_mm_irqs_off
vmlinux 0x303
10
switch_mm_irqs_off
vmlinux 0x303
11
switch_mm_irqs_off
vmlinux 0x303
12
switch_mm_irqs_off
vmlinux 0x303
13
switch_mm_irqs_off
vmlinux 0x303
14
switch_mm_irqs_off
vmlinux 0x303
15
? switch_mm_irqs_off
vmlinux 0x303
16
switch_mm_irqs_off
vmlinux 0x303
17
? switch_mm_irqs_off
vmlinux 0x303
18
switch_mm_irqs_off
vmlinux 0x303
general protection fault, probably for non-canonical address 0xfe8d69d62bd9e9db: 0000 [#2] PREEMPT SMP NOPTI
CPU: 0 PID: 536 Comm: kworker/u16:12 Tainted: G      D            6.3.8-200.fc38.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. GA-780T-D3L/GA-780T-D3L, BIOS FG 11/09/2012
Workqueue: btrfs-delalloc btrfs_work_helper
RIP: 0010:__kmem_cache_alloc_node+0x1ba/0x320
Code: 2b 14 25 28 00 00 00 0f 85 74 01 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 41 8b 47 28 4d 8b 07 48 01 f8 <48> 8b 18 48 89 c1 49 33 9f b8 00 00 00 48 0f c9 48 31 cb 41 f6 c0
RSP: 0018:ffffbab100927c88 EFLAGS: 00010286
RAX: fe8d69d62bd9e9db RBX: 0000000000000c40 RCX: 0000000000000050
RDX: 000000000e12a000 RSI: 0000000000000c40 RDI: fe8d69d62bd9e9ab
RBP: 0000000000000c40 R08: 00000000000390c0 R09: ffff971dc49e3280
R10: 0000000000000001 R11: 0000000000000003 R12: 0000000000000000
R13: 00000000ffffffff R14: 0000000000000050 R15: ffff971e80042600
FS:  0000000000000000(0000) GS:ffff971ebbc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000562cb525b098 CR3: 0000000020e5a000 CR4: 00000000000006f0
Call Trace:
 <TASK>
 ? die_addr+0x36/0x90
 ? exc_general_protection+0x1be/0x420
 ? release_pages+0x10e/0x5b0
 ? asm_exc_general_protection+0x26/0x30
 ? __kmem_cache_alloc_node+0x1ba/0x320
 ? __kmem_cache_alloc_node+0x277/0x320
 ? btrfs_submit_compressed_write+0x47/0x190
 kmalloc_trace+0x2a/0xa0
 btrfs_submit_compressed_write+0x47/0x190
 submit_compressed_extents+0x2d4/0x4d0
 async_cow_submit+0x3b/0x90
 btrfs_work_helper+0x14f/0x380
 process_one_work+0x1c7/0x3d0
 worker_thread+0x51/0x390
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xde/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 </TASK>
Modules linked in: uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr sunrpc binfmt_misc snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel ppdev snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec edac_mce_amd snd_hda_core snd_hwdep snd_seq ccp snd_seq_device snd_pcm pcspkr kvm joydev irqbypass snd_timer k10temp snd soundcore parport_pc parport acpi_cpufreq i2c_piix4 squashfs loop zram nouveau drm_ttm_helper ttm video i2c_algo_bit mxm_wmi ata_generic wmi pata_acpi drm_display_helper serio_raw sp5100_tco pata_atiixp cec r8169 ip6_tables ip_tables fuse