general protection fault: 0000 [#1] PREEMPT SMP

Type:
kernel page fault
Class:
oops
Kernel version:
4.10.11
Tainted info:
  • P - Proprietary module has been loaded
  • O - Out-of-tree module has been loaded
Architecture:
x86_64
Distribution:
Unknown
Hardware:
Gigabyte Technology Co., Ltd. G41M-ES2L/G41M-ES2L, BIOS F6 11/04/2009
Guilty info:
  • Function: 0010:_raw_spin_trylock
Registers:
  • PID: 34
  • RIP: 0010
  • RSP: 0018
  • EFLAGS: 00010282
  • RAX: 0000000000000000
  • RBX: 003a000000000000
  • RCX: 0000000000000001
  • RDX: 0000000000000000
  • RSI: ffff880136f12108
  • RDI: 003a000000000058
  • RBP: ffff880036875080
  • R08: ffffc90000857cc0
  • R09: ffffc90000857d80
  • R11: ffff88013fc99ae8
  • R12: ffffc90000857cc0
  • R14: ffff880036875000
  • R15: 0000000000000000
  • GS: ffff88013fc80000(0000)
  • knlGS: 0000000000000000
  • DS: 0000
  • ES: 0000
  • CR0: 0000000080050033
  • CR2: 000055f1075f18b8
  • CR3: 0000000135c1e000
  • CR4: 00000000000006e0
Dissassembled code:
  • Code: 46 af ff 31 c0 c3 ba 01 00 00 00 f0 0f b1 17 85 c0 75 e2 b8 01 00 00 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 ff 05 99 e3 a9 7e 07 85 c0 74 0c 65 ff 0d 8c e3 a9 7e 74 19 31 c0 c3 b9 01 00
  • All code
  • ========
  • 0: 46 af rex.RX scas %es:(%rdi),%eax
  • 2: ff 31 pushq (%rcx)
  • 4: c0 c3 ba rol $0xba,%bl
  • 7: 01 00 add %eax,(%rax)
  • 9: 00 00 add %al,(%rax)
  • b: f0 0f b1 17 lock cmpxchg %edx,(%rdi)
  • f: 85 c0 test %eax,%eax
  • 11: 75 e2 jne 0xfffffffffffffff5
  • 13: b8 01 00 00 00 mov $0x1,%eax
  • 18: c3 retq
  • 19: 90 nop
  • 1a: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1)
  • 21: 00 00 00
  • 24: 65 ff 05 99 e3 a9 7e incl %gs:0x7ea9e399(%rip) # 0x7ea9e3c4
  • 2b:* 8b 07 mov (%rdi),%eax <-- trapping instruction
  • 2d: 85 c0 test %eax,%eax
  • 2f: 74 0c je 0x3d
  • 31: 65 ff 0d 8c e3 a9 7e decl %gs:0x7ea9e38c(%rip) # 0x7ea9e3c4
  • 38: 74 19 je 0x53
  • 3a: 31 c0 xor %eax,%eax
  • 3c: c3 retq
  • 3d: b9 .byte 0xb9
  • 3e: 01 00 add %eax,(%rax)
  • Code starting with the faulting instruction
  • ===========================================
  • 0: 8b 07 mov (%rdi),%eax
  • 2: 85 c0 test %eax,%eax
  • 4: 74 0c je 0x12
  • 6: 65 ff 0d 8c e3 a9 7e decl %gs:0x7ea9e38c(%rip) # 0x7ea9e399
  • d: 74 19 je 0x28
  • f: 31 c0 xor %eax,%eax
  • 11: c3 retq
  • 12: b9 .byte 0xb9
  • 13: 01 00 add %eax,(%rax)
Linked modules:

dm_mod, cpufreq_conservative, fuse, cpufreq_powersave, vmw_vsock_vmci_transport, vmw_vmci, md4, nls_utf8, cifs, fscache, af_packet, binfmt_misc, snd_hda_codec_hdmi, iTCO_wdt, iTCO_vendor_support, snd_usb_audio, pcspkr, snd_usbmidi_lib, snd_seq_midi, snd_seq_midi_event, kvm_intel, snd_rawmidi, snd_hda_codec_realtek, snd_hda_codec_generic, evdev, input_leds, serio_raw, snd_hda_intel, snd_hda_core, snd_hwdep, lpc_ich, snd_pcm, snd_seq_device, snd_timer, sg, rng_core, button, soundcore, intel_agp, intel_gtt, acpi_cpufreq, nvidia_drm(PO), drm_kms_helper, syscopyarea, sysfillrect, sysimgblt, fb_sys_fops, nvidia_modeset(PO), nvidia(PO), nfsd, auth_rpcgss, nfs_acl, lm90, it87, lockd, hwmon_vid, coretemp, grace, sunrpc, parport_pc, ppdev, ip_tables, x_tables, autofs4, ext4, crc16, jbd2, fscrypto

Last seen similar oops:
2017-05-02
Total count:
1 (from 1 unique sources)
Bug found in this kernels too:
4.10.1, 4.10.11

Leave a Reply

Your email address will not be published. Required fields are marked *

*