Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #722962
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-12-28
Last occurrence
2023-12-28
Unique reports
1
Quality
-60

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? virt_efi_query_variable_info
vmlinux 0x170
2
? virt_efi_query_variable_info
vmlinux 0x170
3
? virt_efi_query_variable_info
vmlinux 0x170
4
? virt_efi_query_variable_info
vmlinux 0x170
5
? virt_efi_query_variable_info
vmlinux 0x170
6
virt_efi_query_variable_info
vmlinux 0x170
7
virt_efi_query_variable_info
vmlinux 0x170
8
virt_efi_query_variable_info
vmlinux 0x170
9
virt_efi_query_variable_info
vmlinux 0x170
10
virt_efi_query_variable_info
vmlinux 0x170
11
virt_efi_query_variable_info
vmlinux 0x170
12
? virt_efi_query_variable_info
vmlinux 0x170
13
? virt_efi_query_variable_info
vmlinux 0x170
14
? virt_efi_query_variable_info
vmlinux 0x170
15
? virt_efi_query_variable_info
vmlinux 0x170
16
? virt_efi_query_variable_info
vmlinux 0x170
17
? virt_efi_query_variable_info
vmlinux 0x170
18
? virt_efi_query_variable_info
vmlinux 0x170
19
? virt_efi_query_variable_info
vmlinux 0x170
20
? virt_efi_query_variable_info
vmlinux 0x170
21
? virt_efi_query_variable_info
vmlinux 0x170
22
virt_efi_query_variable_info
vmlinux 0x170
general protection fault, probably for non-canonical address 0x6e566bcb3e0f0379: 0000 [#2] PREEMPT SMP NOPTI
CPU: 4 PID: 4935 Comm: (spawn) Tainted: G      D            6.5.12-100.fc37.x86_64 #1
Hardware name: HP HP EliteDesk 705 G4 MT/8460, BIOS Q09 Ver. 02.04.01 09/14/2018
RIP: 0010:__kmem_cache_alloc_node+0x1e2/0x340
Code: 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d e9 34 55 bd 00 41 8b 44 24 28 4d 8b 0c 24 49 8d 88 00 20 00 00 48 01 f8 48 89 c2 <48> 8b 00 49 33 84 24 b8 00 00 00 48 0f ca 48 31 d0 4c 89 c2 48 89
RSP: 0018:ffffb1254e8ffc30 EFLAGS: 00010202
RAX: 6e566bcb3e0f0379 RBX: 0000000000000cc0 RCX: 0000000005600004
RDX: 6e566bcb3e0f0379 RSI: 0000000000000cc0 RDI: 6e566bcb3e0f0359
RBP: ffffb1254e8ffc78 R08: 00000000055fe004 R09: 00000000000390a0
R10: ffffb1254e8ffa68 R11: 0000000000000002 R12: ffff923bc0042500
R13: 0000000000000cc0 R14: 0000000000000000 R15: 00000000ffffffff
FS:  00007f18a3d5e0c0(0000) GS:ffff923d16d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005610d06dc568 CR3: 00000001508aa000 CR4: 00000000003506e0
Call Trace:
 <TASK>
 ? die_addr+0x36/0x90
 ? exc_general_protection+0x1c5/0x430
 ? asm_exc_general_protection+0x26/0x30
 ? __kmem_cache_alloc_node+0x1e2/0x340
 ? load_elf_binary+0x24d/0x1790
 kmalloc_trace+0x2a/0xa0
 load_elf_binary+0x24d/0x1790
 bprm_execve+0x287/0x670
 do_execveat_common.isra.0+0x1ad/0x250
 __x64_sys_execve+0x36/0x40
 do_syscall_64+0x5f/0x90
 ? srso_return_thunk+0x5/0x10
 ? __count_memcg_events+0x4d/0x90
 ? srso_return_thunk+0x5/0x10
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? srso_return_thunk+0x5/0x10
 ? handle_mm_fault+0x9e/0x350
 ? srso_return_thunk+0x5/0x10
 ? do_user_addr_fault+0x225/0x640
 ? srso_return_thunk+0x5/0x10
 ? exc_page_fault+0x77/0x170
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8
RIP: 0033:0x7f18a38fa4db
Code: ff ff 48 83 c4 18 48 8d 3d c2 35 10 00 5b 5d 41 5c 41 5d 41 5e 41 5f e9 23 0b fb ff 0f 1f 00 f3 0f 1e fa b8 3b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 25 b9 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffd72b1b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 0000561f014ded20 RCX: 00007f18a38fa4db
RDX: 0000561f013e4a40 RSI: 0000561f0138b090 RDI: 0000561f014cc290
RBP: 00007ffd72b1b510 R08: 00007f18a3d5e0c0 R09: 0000000000000045
R10: 00007ffd72b1b3c0 R11: 0000000000000202 R12: 0000561f014f0fd0
R13: 00007f18a3d5df60 R14: 00007ffd72b1b430 R15: 0000000000000016
 </TASK>
Modules linked in: xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter overlay tls rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter iptable_filter qrtr bnep sunrpc binfmt_misc vfat fat iwlmvm mac80211 snd_hda_codec_conexant intel_rapl_msr snd_hda_codec_generic intel_rapl_common snd_hda_codec_hdmi ledtrig_audio edac_mce_amd snd_hda_intel snd_intel_dspcfg kvm_amd snd_intel_sdw_acpi libarc4 squashfs snd_hda_codec kvm iwlwifi snd_hda_core snd_hwdep btusb btrtl btbcm snd_seq btintel btmtk hp_wmi
 irqbypass snd_seq_device sparse_keymap cfg80211 rapl bluetooth snd_pcm joydev platform_profile wmi_bmof acpi_cpufreq pcspkr snd_timer k10temp ipmi_devintf snd rfkill soundcore i2c_piix4 ipmi_msghandler gpio_amdpt gpio_generic loop zram amdgpu amdxcp iommu_v2 drm_buddy gpu_sched radeon drm_ttm_helper ttm crct10dif_pclmul crc32_pclmul crc32c_intel i2c_algo_bit polyval_clmulni drm_suballoc_helper polyval_generic drm_display_helper ghash_clmulni_intel nvme sha512_ssse3 ccp serio_raw cec sp5100_tco r8169 nvme_core ucsi_acpi typec_ucsi typec nvme_common video wmi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse videodev mc