Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-08
Last occurrence
2023-03-18
Unique reports
2
Quality
-36

Statistics

Operating system Unique / Total count
Fedora 37 2 / 2
Operating system Count
Fedora 37 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
schedule
vmlinux 0x67
2
? schedule
vmlinux 0x67
3
schedule
vmlinux 0x67
4
schedule
vmlinux 0x67
5
schedule
vmlinux 0x67
6
schedule
vmlinux 0x67
7
schedule
vmlinux 0x67
8
schedule
vmlinux 0x67
9
schedule
vmlinux 0x67
10
schedule
vmlinux 0x67
11
schedule
vmlinux 0x67
12
schedule
vmlinux 0x67
13
? schedule
vmlinux 0x67
14
? schedule
vmlinux 0x67
15
? schedule
vmlinux 0x67
16
schedule
vmlinux 0x67
WARNING: CPU: 0 PID: 4578 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
Modules linked in: cfg80211 tls uinput snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event bnep btusb btrtl btbcm btintel btmtk snd_ens1371 snd_ac97_codec snd_rawmidi bluetooth gameport ac97_bus snd_seq qrtr intel_rapl_msr snd_seq_device snd_pcm vmw_balloon intel_rapl_common snd_timer joydev pcspkr rfkill snd soundcore i2c_piix4 vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vmw_vmci pktcdvd sunrpc binfmt_misc loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme vmwgfx ghash_clmulni_intel nvme_core sha512_ssse3 serio_raw drm_ttm_helper vmxnet3 nvme_common ttm ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 0 PID: 4578 Comm: firefox Not tainted 6.1.14-200.fc37.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xba/0x110
Code: 01 01 e8 0f 33 67 00 0f 0b e9 e2 a9 90 00 80 3d 4f d4 bd 01 00 75 85 48 c7 c7 30 31 76 88 c6 05 3f d4 bd 01 01 e8 ec 32 67 00 <0f> 0b e9 bf a9 90 00 80 3d 2a d4 bd 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffff9d791374bd30 EFLAGS: 00010292
RAX: 0000000000000026 RBX: ffff8a25e3fc8800 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff88749b33 RDI: 00000000ffffffff
RBP: ffff8a25dce91600 R08: 0000000000000000 R09: ffff9d791374bbd0
R10: 0000000000000003 R11: ffff8a263ffc3da8 R12: 0000000000000022
R13: 0000000000000001 R14: ffff8a25dce91640 R15: ffff8a25e8fcfa18
FS:  00007f4884e99780(0000) GS:ffff8a263be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4c6c008650 CR3: 000000003f35e000 CR4: 00000000003506f0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x50/0x60
 ? drm_gem_object_handle_put_unlocked+0xf0/0xf0
 idr_for_each+0x60/0xc0
 drm_gem_release+0x1c/0x30
 drm_file_free.part.0+0x1e4/0x250
 drm_release+0x64/0xd0
 __fput+0x91/0x250
 task_work_run+0x59/0x90
 do_exit+0x338/0xb00
 do_group_exit+0x2d/0x80
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f4884af9d81
Code: Unable to access opcode bytes at 0x7f4884af9d57.
RSP: 002b:00007fff11b25f08 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f4884af9d81
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffffffffff40 R09: 0000000000000001
R10: 1999999999999999 R11: 0000000000000206 R12: 0000000000000001
R13: 0000000000000000 R14: 00007fff11b25f90 R15: 00007f487746a790
 </TASK>