View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0009570 | Kali Linux | Kali Package Bug | public | 2026-02-23 15:20 | 2026-02-23 15:21 |
| Reporter | Nikolaus13 | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | new | Resolution | open | ||
| Summary | 0009570: Kernel panic after correctly entering password (GRUB, LUKS, 6.18.9+kali-amd64) | ||||
| Description | Hello maintainers, It's not the first time in the last months that it didn't boot, but first time when the new kernel panic screen showed up. Fortunately, the second boot was successful. The system was installed ~1 year ago. DELL Vostro 3520 with Intel® Core™ i7-1255U (no dGPU). 6.18.9+kali-amd64 0000001 SMP PREEMPT_DYNAMIC Kali 6.18.9-1kali1 (2026-02-10) x86_64 GNU/Linux | ||||
| Attached Files | Kernel_panic.txt (7,340 bytes)
[ 19.357953] ? switch_fpu_return+0x5b/0xe0 [ 19.357956] ? do_syscall_64+0x230/0x7f0 [ 19.357959] ? do_syscall_64+0x230/0x7f0 [ 19.357961] ? do_user_addr_fault+0x21a/0x690 [ 19.357965] ? exc_page_fault+0x7e/0x1a0 [ 19.357968] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 19.357971] RIP: 0033:0x7fcd8310f219 [ 19.357975] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c7 5b 10 00 f7 d8 64 89 01 48 [ 19.357977] RSP: 002b:00007fcd7b7fcbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 19.357980] RAX: ffffffffffffffda RBX: 00007fcd68001490 RCX: 00007fcd8310f219 [ 19.357982] RDX: 0000000000000004 RSI: 00007fcd83aaa44d RDI: 0000000000000007 [ 19.357983] RBP: 0000000000000004 R08: 0000000000000000 R09: 00007fcd68004090 [ 19.357984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd83aaa44d [ 19.357986] R13: 0000000000020000 R14: 00007fcd680015b0 R15: 0000000000000000 [ 19.357989] </TASK> [ 19.357990] ---[ end trace 0000000000000000 ]--- [ 19.357993] kobject: kobject_add_internal failed for printer (error: -2 parent: parport_pc.956) [ 19.357998] lp0: using parport0 (interrupt-driven). [ 19.358804] systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. [ 19.359555] systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... [ 19.359765] systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. [ 19.359857] systemd[1]: systemd-sysusers.service - Create System Users was skipped because no trigger condition checks were met. [ 19.360805] systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... [ 19.361702] systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... [ 19.370927] systemd[1]: Starting systemd-userdbd.service - User Database Manager... [ 19.371392] systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. [ 19.373339] systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. [ 19.373432] systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. [ 19.374416] systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... [ 19.377116] systemd[1]: Started systemd-journald.service - Journal Service. [ 19.383576] systemd-journald[618]: Received client request to flush runtime journal. [ 19.414619] slab kernfs_node_cache start ffff8f275fe8dd48 pointer offset 120 size 136 [ 19.414630] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 19.414633] #PF: supervisor instruction fetch in kernel mode [ 19.414635] #PF: error_code(0x0010) - not-present page [ 19.414637] PGD 0 P4D 0 [ 19.414640] Oops: Oops: 0010 [#1] SMP NOPTI [ 19.414645] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G W 6.18.9+kali-amd64 #1 PREEMPT(lazy) Kali 6.18.9-1kali1 [ 19.414649] Tainted: [W]=WARN [ 19.414650] Hardware name: Dell Inc. Vostro 3520/0PJ00M, BIOS 1.16.0 06/20/2023 [ 19.414652] RIP: 0010:0x0 [ 19.414660] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 19.414661] RSP: 0018:ffffd4f18029ced0 EFLAGS: 00010286 [ 19.414663] RAX: 0000000000000001 RBX: 0000000000000008 RCX: 0000000000000001 [ 19.414665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8f275fe8ddc0 [ 19.414666] RBP: ffff8f2740f99b00 R08: 0000000000000000 R09: ffffd4f18029cc18 [ 19.414668] R10: ffffffffa46db948 R11: 00000000ffffefff R12: ffff8f30a75b2700 [ 19.414669] R13: ffffd4f18029cf00 R14: 0000000000000007 R15: 0000000000000000 [ 19.414671] FS: 0000000000000000(0000) GS:ffff8f310234c000(0000) knlGS:0000000000000000 [ 19.414673] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 19.414675] CR2: ffffffffffffffd6 CR3: 000000080ac2c002 CR4: 0000000000f70ef0 [ 19.414677] PKRU: 55555554 [ 19.414678] Call Trace: [ 19.414680] <IRQ> [ 19.414681] rcu_do_batch+0x1bc/0x560 [ 19.414690] rcu_core+0x17d/0x380 [ 19.414692] handle_softirqs+0xd7/0x310 [ 19.414697] __irq_exit_rcu+0xbc/0xe0 [ 19.414700] sysvec_apic_timer_interrupt+0x71/0x90 [ 19.414705] </IRQ> [ 19.414706] <TASK> [ 19.414707] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 19.414710] RIP: 0010:cpuidle_enter_state+0xcc/0x660 [ 19.414714] Code: 00 00 e8 77 f0 2d ff e8 62 f2 ff ff 49 89 c4 0f 1f 44 00 00 31 ff e8 73 40 2c ff 45 84 ff 0f 85 02 02 00 00 fb 0f 1f 44 00 00 <85> ed 0f 88 d3 01 00 00 4c 63 f5 49 83 fe 0a 0f 83 9f 04 00 00 49 [ 19.414716] RSP: 0018:ffffd4f18019fe50 EFLAGS: 00000246 [ 19.414718] RAX: ffff8f310234c000 RBX: ffff8f30a75bd5d0 RCX: 0000000000000000 [ 19.414719] RDX: 00000004853342dc RSI: 0000000031050505 RDI: 0000000000000000 [ 19.414721] RBP: 0000000000000001 R08: fffffffdf6b8e100 R09: 0000000000029810 [ 19.414722] R10: 000000068fa5d989 R11: 0000000000000000 R12: 00000004853342dc [ 19.414723] R13: ffffffffa4845b60 R14: 0000000000000001 R15: 0000000000000000 [ 19.414727] cpuidle_enter+0x31/0x50 [ 19.414732] do_idle+0x1e2/0x240 [ 19.414737] cpu_startup_entry+0x29/0x30 [ 19.414739] start_secondary+0x126/0x170 [ 19.414743] common_startup_64+0x13e/0x141 [ 19.414748] </TASK> [ 19.414749] Modules linked in: nf_tables parport_pc lp ppdev parport msr i2c_dev cuse loop efi_pstore nfnetlink autofs4 ext4 crc16 mbcache jbd2 crc32c_cryptoapi dm_crypt dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 md_mod xe intel_vsec drm_gpuvm configfs drm_gpusvm_helper gpu_sched drm_ttm_helper drm_exec drm_suballoc_helper usbhid i915 drm_buddy ttm i2c_algo_bit drm_display_helper hid_multitouch cec hid_generic rc_core i2c_hid_acpi iTCO_wdt i2c_hid drm_client_lib ahci intel_pmc_bxt hid drm_kms_helper nvme libahci iTCO_vendor_support xhci_pci watchdog libata nvme_core xhci_hcd drm psmouse nvme_keyring r8169 video nvme_auth intel_lpss_pci ghash_clmulni_intel aesni_intel usbcore serio_raw scsi_mod realtek intel_lpss hkdf i2c_i801 battery button wmi idma64 usb_common i2c_smbus scsi_common efivarfs [ 19.414809] CR2: 0000000000000000 [ 19.414811] ---[ end trace 0000000000000000 ]--- [ 19.885603] RIP: 0010:0x0 [ 19.885635] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 19.885637] RSP: 0018:ffffd4f18029ced0 EFLAGS: 00010286 [ 19.885640] RAX: 0000000000000001 RBX: 0000000000000008 RCX: 0000000000000001 [ 19.885642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8f275fe8ddc0 [ 19.885643] RBP: ffff8f2740f99b00 R08: 0000000000000000 R09: ffffd4f18029cc18 [ 19.885644] R10: ffffffffa46db948 R11: 00000000ffffefff R12: ffff8f30a75b2700 [ 19.885646] R13: ffffd4f18029cf00 R14: 0000000000000007 R15: 0000000000000000 [ 19.885647] FS: 0000000000000000(0000) GS:ffff8f310234c000(0000) knlGS:0000000000000000 [ 19.885649] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 19.885650] CR2: ffffffffffffffd6 CR3: 000000080ac2c002 CR4: 0000000000f70ef0 [ 19.885653] PKRU: 55555554 [ 19.885657] Kernel panic - not syncing: Fatal exception in interrupt [ 19.885731] Kernel Offset: 0x21600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2026-02-23 15:20 | Nikolaus13 | New Issue | |
| 2026-02-23 15:20 | Nikolaus13 | File Added: Kernel_panic.txt |