Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-07
Last occurrence
2023-03-15
Unique reports
2
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 37 2 / 2
Operating system Count
Fedora 37 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
schedule
vmlinux 0x67
2
? schedule
vmlinux 0x67
3
schedule
vmlinux 0x67
4
schedule
vmlinux 0x67
5
schedule
vmlinux 0x67
6
schedule
vmlinux 0x67
7
schedule
vmlinux 0x67
8
schedule
vmlinux 0x67
9
schedule
vmlinux 0x67
10
schedule
vmlinux 0x67
11
schedule
vmlinux 0x67
12
schedule
vmlinux 0x67
13
? schedule
vmlinux 0x67
14
? schedule
vmlinux 0x67
15
schedule
vmlinux 0x67
WARNING: CPU: 0 PID: 4333 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
Modules linked in: tun tls uinput snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink intel_rapl_msr intel_rapl_common kvm_intel kvm qrtr snd_seq_midi snd_seq_midi_event bnep vmw_balloon vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock irqbypass rapl snd_ens1371 snd_ac97_codec btusb gameport snd_rawmidi btrtl ac97_bus snd_seq btbcm btintel btmtk bluetooth joydev snd_seq_device snd_pcm sunrpc rfkill snd_timer snd i2c_piix4 binfmt_misc vmw_vmci soundcore xfs zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel nvme sha512_ssse3 nvme_core vmwgfx serio_raw nvme_common vmxnet3 drm_ttm_helper ttm ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 0 PID: 4333 Comm: firefox Not tainted 6.1.14-200.fc37.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xba/0x110
Code: 01 01 e8 0f 33 67 00 0f 0b c3 cc cc cc cc 80 3d 4f d4 bd 01 00 75 85 48 c7 c7 30 31 76 b6 c6 05 3f d4 bd 01 01 e8 ec 32 67 00 <0f> 0b c3 cc cc cc cc 80 3d 2a d4 bd 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffff98bfc25fbd28 EFLAGS: 00010282
RAX: 0000000000000026 RBX: ffff8d379a662200 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffffb6749b33 RDI: 00000000ffffffff
RBP: ffff8d387eb6ac00 R08: 0000000000000000 R09: ffff98bfc25fbbc8
R10: 0000000000000003 R11: ffff8d397fec35a8 R12: 0000000000000009
R13: 0000000000000001 R14: ffff8d387eb6ac40 R15: ffff8d39733ef060
FS:  0000000000000000(0000) GS:ffff8d3975e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3ab512f966 CR3: 00000001462ba004 CR4: 00000000003706f0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x50/0x60
 ? drm_gem_object_handle_put_unlocked+0xf0/0xf0
 idr_for_each+0x5d/0xc0
 drm_gem_release+0x1c/0x30
 drm_file_free.part.0+0x1e4/0x250
 drm_release+0x64/0xd0
 __fput+0x8e/0x250
 task_work_run+0x56/0x90
 do_exit+0x338/0xb00
 do_group_exit+0x2d/0x80
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x58/0x80
 ? do_syscall_64+0x67/0x80
 ? __irq_exit_rcu+0x3d/0x140
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f3b156f9d81
Code: Unable to access opcode bytes at 0x7f3b156f9d57.
RSP: 002b:00007ffcc907fee8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f3b156f9d81
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffffffffff40 R09: 0000000000000001
R10: 00007f3a98c00488 R11: 0000000000000206 R12: 0000000000000001
R13: 0000000000000000 R14: 00007ffcc907ff70 R15: 00007f3b0806a790
 </TASK>