Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #823435
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-05-06
Last occurrence
2023-10-07
Unique reports
4
Quality
-55

Statistics

Operating system Unique / Total count
Fedora 38 4 / 4
Operating system Count
Fedora 38 4
Architecture Count
x86_64 4

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
do_one_initcall
vmlinux 0x56
2
? do_one_initcall
vmlinux 0x56
3
do_one_initcall
vmlinux 0x56
4
do_one_initcall
vmlinux 0x56
5
do_one_initcall
vmlinux 0x56
6
do_one_initcall
vmlinux 0x56
7
do_one_initcall
vmlinux 0x56
8
do_one_initcall
vmlinux 0x56
9
do_one_initcall
vmlinux 0x56
10
? do_one_initcall
vmlinux 0x56
11
? do_one_initcall
vmlinux 0x56
12
do_one_initcall
vmlinux 0x56
13
do_one_initcall
vmlinux 0x56
14
? do_one_initcall
vmlinux 0x56
15
do_one_initcall
vmlinux 0x56
16
do_one_initcall
vmlinux 0x56
17
do_one_initcall
vmlinux 0x56
18
do_one_initcall
vmlinux 0x56
19
? do_one_initcall
vmlinux 0x56
20
? do_one_initcall
vmlinux 0x56
21
? do_one_initcall
vmlinux 0x56
22
? do_one_initcall
vmlinux 0x56
23
do_one_initcall
vmlinux 0x56
WARNING: CPU: 2 PID: 3981 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock snd_seq_midi snd_seq_midi_event snd_ens1371 intel_rapl_msr intel_rapl_common snd_ac97_codec snd_rawmidi gameport ac97_bus snd_seq snd_seq_device snd_pcm rapl vmw_balloon snd_timer sunrpc pcspkr snd soundcore vmw_vmci i2c_piix4 binfmt_misc joydev loop zram dm_crypt crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni nvme polyval_generic ghash_clmulni_intel sha512_ssse3 vmwgfx nvme_core vmxnet3 nvme_common drm_ttm_helper ttm serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 2 PID: 3981 Comm: Shutdow~minator Tainted: G S                 6.2.14-300.fc38.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xba/0x110
Code: 01 01 e8 09 ec 92 ff 0f 0b c3 cc cc cc cc 80 3d b3 b3 ae 01 00 75 85 48 c7 c7 68 9e 8d 86 c6 05 a3 b3 ae 01 01 e8 e6 eb 92 ff <0f> 0b c3 cc cc cc cc 80 3d 91 b3 ae 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffb36390dcfbd0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9e125e921200 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000027 RDI: 00000000ffffffff
RBP: ffff9e11c6d1c600 R08: 0000000000000000 R09: ffffb36390dcfa60
R10: 0000000000000003 R11: ffff9e127fec08a8 R12: 0000000000000032
R13: 0000000000000001 R14: ffff9e11c6d1c640 R15: ffff9e11c7d64ad0
FS:  00007fb312a296c0(0000) GS:ffff9e1279e80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb30f6fe990 CR3: 0000000045010004 CR4: 00000000000606e0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x50/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x6d/0xf0
 drm_gem_release+0x1c/0x30
 drm_file_free.part.0+0x1e4/0x250
 drm_release+0x64/0xd0
 __fput+0x8e/0x250
 task_work_run+0x56/0x90
 do_exit+0x33e/0xb20
 ? get_nohz_timer_target+0x18/0x190
 ? timerqueue_add+0x62/0xb0
 do_group_exit+0x2d/0x80
 get_signal+0x9b0/0x9f0
 ? do_nanosleep+0x83/0x130
 arch_do_signal_or_restart+0x3a/0x280
 exit_to_user_mode_prepare+0x18d/0x1f0
 syscall_exit_to_user_mode+0x17/0x40
 do_syscall_64+0x68/0x90
 ? exit_to_user_mode_prepare+0x13a/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x68/0x90
 ? exc_page_fault+0x78/0x180
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fb3442f8413
Code: Unable to access opcode bytes at 0x7fb3442f83e9.
RSP: 002b:00007fb312a28d90 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
RAX: fffffffffffffdfc RBX: 00007fb305432060 RCX: 00007fb3442f8413
RDX: 00007fb312a28dd0 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007fb312a28db0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
R13: 00007fb312a29608 R14: 0000000000000f8d R15: 00007ffe618a1480
 </TASK>