Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #823435
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-05-12
Last occurrence
2023-05-12
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
do_one_initcall
vmlinux 0x56
2
do_one_initcall
vmlinux 0x56
3
do_one_initcall
vmlinux 0x56
4
do_one_initcall
vmlinux 0x56
5
? do_one_initcall
vmlinux 0x56
6
do_one_initcall
vmlinux 0x56
7
do_one_initcall
vmlinux 0x56
8
do_one_initcall
vmlinux 0x56
9
? do_one_initcall
vmlinux 0x56
10
? do_one_initcall
vmlinux 0x56
11
? do_one_initcall
vmlinux 0x56
12
? do_one_initcall
vmlinux 0x56
13
? do_one_initcall
vmlinux 0x56
14
? do_one_initcall
vmlinux 0x56
15
? do_one_initcall
vmlinux 0x56
16
do_one_initcall
vmlinux 0x56
WARNING: CPU: 4 PID: 36261 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
Modules linked in: uinput xt_MASQUERADE xt_mark nft_compat snd_seq_dummy snd_hrtimer ip6table_nat tun nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nvidia_drm(POE) rfkill nvidia_modeset(POE) nf_tables nfnetlink nvidia_uvm(POE) nvidia(POE) qrtr sunrpc binfmt_misc vfat fat snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils soundwire_bus snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic ledtrig_audio intel_rapl_msr snd_hda_codec_hdmi intel_rapl_common snd_compress ac97_bus intel_tcc_cooling snd_pcm_dmaengine snd_usb_audio snd_hda_intel
 x86_pkg_temp_thermal snd_intel_dspcfg intel_powerclamp snd_intel_sdw_acpi snd_hda_codec coretemp kvm_intel snd_usbmidi_lib snd_rawmidi mc snd_hda_core snd_hwdep snd_seq ucsi_ccg mei_pxp kvm mei_hdcp typec_ucsi snd_seq_device iTCO_wdt intel_pmc_bxt typec iTCO_vendor_support ee1004 irqbypass rapl intel_cstate snd_pcm snd_timer intel_uncore gigabyte_wmi pcspkr snd mei_me i2c_i801 mei intel_wmi_thunderbolt wmi_bmof i2c_smbus i2c_nvidia_gpu soundcore intel_pch_thermal acpi_tad acpi_pad loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic e1000e ghash_clmulni_intel sha512_ssse3 video wmi pinctrl_cannonlake ip6_tables ip_tables fuse
CPU: 4 PID: 36261 Comm: gnome-shell Tainted: P           OE      6.2.14-300.fc38.x86_64 #1
Hardware name: ZET Gaming WARD H090/B460M DS3H V2, BIOS F22 RB 06/21/2021
RIP: 0010:refcount_warn_saturate+0xba/0x110
Code: 01 01 e8 09 ec 92 ff 0f 0b c3 cc cc cc cc 80 3d b3 b3 ae 01 00 75 85 48 c7 c7 68 9e 8d ab c6 05 a3 b3 ae 01 01 e8 e6 eb 92 ff <0f> 0b c3 cc cc cc cc 80 3d 91 b3 ae 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffac2a0b5f7cb8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffffa0f0b0a008e8 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000027 RDI: 00000000ffffffff
RBP: ffffa0ee38640000 R08: 0000000000000000 R09: ffffac2a0b5f7b48
R10: 0000000000000003 R11: ffffffffac1447c8 R12: 000000000000009c
R13: 0000000000025ccc R14: ffffa0ee38640070 R15: ffffa0ee38640070
FS:  0000000000000000(0000) GS:ffffa0f16db00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0d34449fc0 CR3: 000000044e010003 CR4: 00000000003706e0
Call Trace:
 <TASK>
 remove_vma+0x25/0x50
 exit_mmap+0x156/0x2e0
 __mmput+0x49/0x130
 do_exit+0x2e3/0xb20
 ? vfs_write+0x36d/0x400
 do_group_exit+0x2d/0x80
 __x64_sys_exit_group+0x14/0x20
 do_syscall_64+0x59/0x90
 ? ksys_write+0xb7/0xf0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x68/0x90
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x68/0x90
 ? do_syscall_64+0x68/0x90
 ? exc_page_fault+0x78/0x180
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f0d344fd44d
Code: Unable to access opcode bytes at 0x7f0d344fd423.
RSP: 002b:00007ffe0694b088 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f0d344fd44d
RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000001
RBP: 00007ffe0694b0c0 R08: 0000000000000000 R09: 0000000000000000
R10: 00007f0d30f3d588 R11: 0000000000000202 R12: 00007ffe0694b299
R13: 0000000000000003 R14: 00007ffe0694b2a3 R15: 00007ffe0694dbc4
 </TASK>