Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #823435
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-07-01
Last occurrence
2023-07-01
Unique reports
1
Quality
-36

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
do_one_initcall
vmlinux 0x56
2
do_one_initcall
vmlinux 0x56
3
? do_one_initcall
vmlinux 0x56
4
do_one_initcall
vmlinux 0x56
5
do_one_initcall
vmlinux 0x56
6
? do_one_initcall
vmlinux 0x56
7
do_one_initcall
vmlinux 0x56
8
do_one_initcall
vmlinux 0x56
9
do_one_initcall
vmlinux 0x56
10
do_one_initcall
vmlinux 0x56
11
do_one_initcall
vmlinux 0x56
12
do_one_initcall
vmlinux 0x56
13
do_one_initcall
vmlinux 0x56
14
do_one_initcall
vmlinux 0x56
15
do_one_initcall
vmlinux 0x56
16
do_one_initcall
vmlinux 0x56
general protection fault, probably for non-canonical address 0xc6ac5e7856a299b5: 0000 [#3] PREEMPT SMP PTI
CPU: 2 PID: 659 Comm: alsactl Tainted: G      D W          6.2.14-300.fc38.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:kmem_cache_alloc+0xfa/0x310
Code: 83 78 10 00 48 8b 38 0f 84 bf 01 00 00 48 85 ff 0f 84 b6 01 00 00 8b 45 28 4c 8b 45 00 48 8b 9d b8 00 00 00 48 01 f8 48 89 c1 <48> 33 18 48 0f c9 48 31 cb 41 f6 c0 0f 0f 85 d2 01 00 00 48 8d 8a
RSP: 0000:ffffafe600703970 EFLAGS: 00010292
RAX: c6ac5e7856a299b5 RBX: 7e64ac7b17326692 RCX: c6ac5e7856a299b5
RDX: 000000000082e002 RSI: 0000000000000d40 RDI: c6ac5e7856a2996d
RBP: ffff904107779100 R08: 00003fa4e40017e0 R09: ffff904108534800
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000d40 R14: 0000000000000090 R15: ffffffff896067e6
FS:  0000000000000000(0000) GS:ffff90411bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f17d3172220 CR3: 00000001057e0000 CR4: 00000000000006e0
Call Trace:
 <TASK>
 alloc_extent_map+0x16/0x50
 btrfs_get_extent+0xc8/0x7c0
 ? _raw_spin_unlock+0x15/0x30
 btrfs_do_readpage+0x197/0x700
 extent_readahead+0x21d/0x4c0
 ? __pfx_end_bio_extent_readpage+0x10/0x10
 read_pages+0x88/0x300
 page_cache_ra_unbounded+0x12a/0x190
 filemap_fault+0x5cf/0x950
 __do_fault+0x33/0x150
 do_fault+0x331/0x430
 __handle_mm_fault+0x652/0xec0
 handle_mm_fault+0xff/0x2f0
 do_user_addr_fault+0x1cd/0x710
 exc_page_fault+0x78/0x180
 asm_exc_page_fault+0x22/0x30
RIP: 0033:0x7f17d31a950a
Code: 0f 61 c0 66 0f 70 c0 00 48 83 fa 10 0f 82 7e 00 00 00 48 83 fa 20 77 12 0f 11 44 17 f0 0f 11 07 c3 0f 11 47 e0 0f 11 47 f0 c3 <0f> 11 07 0f 11 47 10 48 01 d7 48 83 fa 40 76 e7 0f 11 40 20 0f 11
RSP: 002b:00007ffe9f08ec28 EFLAGS: 00010202
RAX: 00007f17d3172220 RBX: 0000000000000004 RCX: 00007f17d3172510
RDX: 00000000000002f0 RSI: 0000000000000000 RDI: 00007f17d3172220
RBP: 00007ffe9f08f020 R08: 00007f17d3172220 R09: 0000000000107000
R10: 0000000000000003 R11: 0000000000000246 R12: 00007ffe9f08ecd8
R13: 00007f17d3173000 R14: 00007f17d3172510 R15: 00007ffe9f08f0c0
 </TASK>
Modules linked in: snd_hda_codec_idt snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_seq binfmt_misc snd_seq_device intel_rapl_msr snd_pcm intel_rapl_common joydev snd_timer rapl vfat snd fat vboxguest soundcore pcspkr i2c_piix4 loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_generic ghash_clmulni_intel vmwgfx sha512_ssse3 video wmi drm_ttm_helper ttm e1000 serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse