Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #558497
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-30
Last occurrence
2023-03-30
Unique reports
1
Quality
-52

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
do_futex
vmlinux 0xda
2
? do_futex
vmlinux 0xda
3
do_futex
vmlinux 0xda
4
do_futex
vmlinux 0xda
5
do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
do_futex
vmlinux 0xda
9
do_futex
vmlinux 0xda
10
do_futex
vmlinux 0xda
11
do_futex
vmlinux 0xda
12
do_futex
vmlinux 0xda
13
? do_futex
vmlinux 0xda
14
? do_futex
vmlinux 0xda
15
? do_futex
vmlinux 0xda
16
? do_futex
vmlinux 0xda
17
? do_futex
vmlinux 0xda
18
? do_futex
vmlinux 0xda
19
? do_futex
vmlinux 0xda
20
? do_futex
vmlinux 0xda
21
do_futex
vmlinux 0xda
WARNING: CPU: 1 PID: 18410 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
Modules linked in: tls uinput xt_conntrack xt_MASQUERADE nf_conntrack_netlink snd_seq_dummy snd_hrtimer xt_addrtype nft_compat br_netfilter bridge stp llc overlay nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 snd_seq_midi snd_seq_midi_event ip_set nf_tables nfnetlink bnep btusb btrtl btbcm btintel btmtk bluetooth qrtr snd_ens1371 vsock_loopback snd_ac97_codec vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock intel_rapl_msr snd_rawmidi vmw_balloon gameport intel_rapl_common ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd joydev sunrpc pcspkr rfkill soundcore binfmt_misc i2c_piix4 vmw_vmci vfat fat loop zram crct10dif_pclmul crc32_pclmul nvme crc32c_intel polyval_clmulni polyval_generic mptspi scsi_transport_spi vmxnet3 ghash_clmulni_intel nvme_core mptscsih mptbase vmwgfx
 sha512_ssse3 drm_ttm_helper ttm serio_raw nvme_common ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 1 PID: 18410 Comm: firefox Tainted: G        W          6.2.7-200.fc37.x86_64 #1
Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.18452719.B64.2108091906 08/09/2021
RIP: 0010:refcount_warn_saturate+0xba/0x110
Code: 01 01 e8 49 51 93 ff 0f 0b c3 cc cc cc cc 80 3d 75 28 af 01 00 75 85 48 c7 c7 00 ad 8d 8f c6 05 65 28 af 01 01 e8 26 51 93 ff <0f> 0b c3 cc cc cc cc 80 3d 50 28 af 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffb80e06123c80 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8bf9d0c71600 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffff8f8c1316 RDI: 00000000ffffffff
RBP: ffff8bf8deb6b800 R08: 0000000000000000 R09: ffffb80e06123b10
R10: 0000000000000003 R11: ffffffff901447c8 R12: 0000000000000028
R13: 0000000000000001 R14: ffff8bf8deb6b840 R15: ffff8bf9f96f43a8
FS:  0000000000000000(0000) GS:ffff8bf9fbd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9d3413d038 CR3: 00000001093ca000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x50/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x70/0xf0
 drm_gem_release+0x1c/0x30
 drm_file_free.part.0+0x1e4/0x250
 drm_release+0x64/0xd0
 __fput+0x91/0x250
 task_work_run+0x59/0x90
 do_exit+0x33e/0xb20
 do_group_exit+0x2d/0x80
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x5b/0x80
 ? exit_to_user_mode_prepare+0x165/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f9d6baf9d81
Code: Unable to access opcode bytes at 0x7f9d6baf9d57.
RSP: 002b:00007ffd53d5fa98 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f9d6baf9d81
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffffffffff40 R09: 0000000000000001
R10: 00007f9d2e9002d8 R11: 0000000000000202 R12: 0000000000000001
R13: 0000000000000000 R14: 00007ffd53d5fb20 R15: 00007f9d5e0ce820
 </TASK>