Kerneloops

Similar reports
Problem #575416
Component
kernel
Last affected version
0:6.3.4-201.fc38
Executable
unknown
First occurrence
2023-06-01
Last occurrence
2023-06-04
Unique reports
2
Quality
-45

Statistics

Operating system Unique / Total count
Fedora 38 2 / 2
Operating system Count
Fedora 38 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:6.3.4-201.fc38 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
asm_exc_control_protection
vmlinux 0x26
2
? asm_exc_control_protection
vmlinux 0x26
3
asm_exc_control_protection
vmlinux 0x26
4
asm_exc_control_protection
vmlinux 0x26
5
asm_exc_control_protection
vmlinux 0x26
6
asm_exc_control_protection
vmlinux 0x26
7
asm_exc_control_protection
vmlinux 0x26
8
asm_exc_control_protection
vmlinux 0x26
9
asm_exc_control_protection
vmlinux 0x26
10
asm_exc_control_protection
vmlinux 0x26
11
asm_exc_control_protection
vmlinux 0x26
12
asm_exc_control_protection
vmlinux 0x26
13
? asm_exc_control_protection
vmlinux 0x26
14
? asm_exc_control_protection
vmlinux 0x26
15
? asm_exc_control_protection
vmlinux 0x26
16
? asm_exc_control_protection
vmlinux 0x26
17
? asm_exc_control_protection
vmlinux 0x26
18
? asm_exc_control_protection
vmlinux 0x26
19
asm_exc_control_protection
vmlinux 0x26
WARNING: CPU: 0 PID: 2865 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_ens1371 bnep snd_ac97_codec snd_rawmidi gameport intel_rapl_msr ac97_bus snd_seq intel_rapl_common snd_seq_device rapl nf_conntrack_netbios_ns nf_conntrack_broadcast vmw_balloon nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 snd_pcm nft_fib nft_reject_inet nf_reject_ipv4 btusb nf_reject_ipv6 nft_reject btrtl btbcm nft_ct btintel btmtk snd_timer bluetooth nft_chain_nat nf_nat pcspkr nf_conntrack nf_defrag_ipv6 snd nf_defrag_ipv4 soundcore i2c_piix4 rfkill ip_set nf_tables nfnetlink qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vmw_vmci sunrpc binfmt_misc joydev loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme ghash_clmulni_intel vmwgfx sha512_ssse3 nvme_core drm_ttm_helper ttm nvme_common vmxnet3 serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 0 PID: 2865 Comm: firefox Not tainted 6.3.4-201.fc38.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xbe/0x110
Code: 01 01 e8 75 9f 91 ff 0f 0b c3 cc cc cc cc 80 3d b8 a0 ad 01 00 75 85 48 c7 c7 68 bc 92 ae c6 05 a8 a0 ad 01 01 e8 52 9f 91 ff <0f> 0b c3 cc cc cc cc 80 3d 96 a0 ad 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffb96690857cc8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff9b46c2b4b800 RCX: 0000000000000027
RDX: ffff9b47b5021548 RSI: 0000000000000001 RDI: ffff9b47b5021540
RBP: ffff9b4695e77800 R08: 0000000000000000 R09: ffffb96690857b58
R10: 0000000000000003 R11: ffff9b47bfec58a8 R12: 000000000000000e
R13: 0000000000000001 R14: ffff9b4695e77840 R15: ffff9b46c3c8f760
FS:  0000000000000000(0000) GS:ffff9b47b5000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f710400c190 CR3: 0000000008ffc001 CR4: 00000000001706f0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x71/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f8/0x270
 drm_release+0x74/0xf0
 __fput+0x8e/0x250
 task_work_run+0x5a/0x90
 do_exit+0x342/0xb10
 do_group_exit+0x31/0x80
 __x64_sys_exit_group+0x18/0x20
 do_syscall_64+0x5d/0x90
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? do_syscall_64+0x6c/0x90
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? do_syscall_64+0x6c/0x90
 ? exc_page_fault+0x7c/0x180
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fc56fed944d
Code: Unable to access opcode bytes at 0x7fc56fed9423.
RSP: 002b:00007ffe1cfe4c08 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007fc56fed944d
RDX: 00000000000000e7 RSI: ffffffffffffff48 RDI: 0000000000000000
RBP: 0000000000000000 R08: 00007fc50c5a7000 R09: 0000000000000001
R10: 00007fc50c5cc000 R11: 0000000000000206 R12: 0000000000000001
R13: 0000000000000000 R14: 00007ffe1cfe4c90 R15: 00007fc5648bf370
 </TASK>