Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #641419
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-04-20
Last occurrence
2023-04-20
Unique reports
1
Quality
-18

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
do_futex
vmlinux 0xda
2
do_futex
vmlinux 0xda
3
do_futex
vmlinux 0xda
4
do_futex
vmlinux 0xda
5
do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
do_futex
vmlinux 0xda
watchdog: BUG: soft lockup - CPU#4 stuck for 27s! [kworker/4:2:49602]
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr snd_seq_midi snd_seq_midi_event bnep vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock btusb intel_rapl_msr btrtl intel_rapl_common snd_ens1371 sunrpc btbcm btintel snd_ac97_codec rapl btmtk snd_rawmidi gameport bluetooth vmw_balloon ac97_bus snd_seq snd_seq_device binfmt_misc joydev pcspkr snd_pcm rfkill snd_timer snd vmw_vmci soundcore i2c_piix4 loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 serio_raw mptspi vmwgfx scsi_transport_spi mptscsih e1000 drm_ttm_helper mptbase ttm ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 4 PID: 49602 Comm: kworker/4:2 Tainted: G        W    L     6.2.7-200.fc37.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
 bdev_read_page+0x66/0x90
 swap_readpage+0x11a/0x700
 do_swap_page+0x89e/0xcf0
 __handle_mm_fault+0x84a/0xec0
 handle_mm_fault+0xff/0x2f0
 do_user_addr_fault+0x1cd/0x710
 exc_page_fault+0x70/0x170
 asm_exc_page_fault+0x22/0x30
RIP: 0033:0x5642d56c3b28
Code: b9 00 00 00 00 ff ff ff ff 48 21 c1 8b 44 11 ff 8b 44 08 13 8b 84 08 3b 04 00 00 41 3b 86 30 01 00 00 74 66 48 89 f3 48 09 c1 <48> 8b 41 07 48 89 45 e8 8b 48 1f 83 e1 0e 83 f9 0c 0f 85 8a 00 00
RSP: 002b:00007ffee12200c0 EFLAGS: 00010216
RAX: 0000000002611fe5 RBX: 00005642503f48e0 RCX: 0000396402611fe5
RDX: 0000000000000100 RSI: 000000000000000c RDI: 00003b280027de00
RBP: 00007ffee12200e0 R08: 00005642503f48e0 R09: 0000000000000028
R10: 0000564257e800d5 R11: 0000000000202d51 R12: 00003b28002b8000
R13: 00003b280027de00 R14: 00003b28002b8000 R15: 00005642503f48e0
 </TASK>
Workqueue: events e1000_watchdog [e1000]
RIP: 0010:_raw_spin_unlock_irqrestore+0x19/0x40
Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 <bf> 01 00 00 00 e8 8d 9f 1d ff 65 8b 05 be fc 0b 55 85 c0 74 05 c3
RSP: 0018:ffff9c7d476b7e18 EFLAGS: 00000206
RAX: 0000000000000000 RBX: ffff8a9acad7e9c0 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000246 RDI: ffff8a9acad7ebdc
RBP: ffff8a9acad7ee48 R08: 0000000000000000 R09: ffff8a9ac33d8af4
R10: 0000000000000007 R11: 0000000000000030 R12: ffff8a9acad7ebdc
R13: 0000000000000246 R14: ffff8a9acad7ee48 R15: ffff8a9acad7f270
FS:  0000000000000000(0000) GS:ffff8a9bf7d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000129800bd0000 CR3: 000000012d056002 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace: