Kerneloops

Similar reports
Problem #575416
Component
kernel
Last affected version
0:6.3.4-201.fc38
Executable
unknown
First occurrence
2023-06-02
Last occurrence
2023-06-02
Unique reports
1
Quality
-48

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.3.4-201.fc38 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
asm_exc_control_protection
vmlinux 0x26
2
? asm_exc_control_protection
vmlinux 0x26
3
asm_exc_control_protection
vmlinux 0x26
4
asm_exc_control_protection
vmlinux 0x26
5
asm_exc_control_protection
vmlinux 0x26
6
asm_exc_control_protection
vmlinux 0x26
7
asm_exc_control_protection
vmlinux 0x26
8
asm_exc_control_protection
vmlinux 0x26
9
asm_exc_control_protection
vmlinux 0x26
10
asm_exc_control_protection
vmlinux 0x26
11
asm_exc_control_protection
vmlinux 0x26
12
asm_exc_control_protection
vmlinux 0x26
13
? asm_exc_control_protection
vmlinux 0x26
14
? asm_exc_control_protection
vmlinux 0x26
15
? asm_exc_control_protection
vmlinux 0x26
16
? asm_exc_control_protection
vmlinux 0x26
17
? asm_exc_control_protection
vmlinux 0x26
18
? asm_exc_control_protection
vmlinux 0x26
19
? asm_exc_control_protection
vmlinux 0x26
20
asm_exc_control_protection
vmlinux 0x26
WARNING: CPU: 1 PID: 2805 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
Modules linked in: uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink snd_seq_midi snd_seq_midi_event qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc binfmt_misc snd_ens1371 snd_ac97_codec intel_rapl_msr snd_rawmidi intel_rapl_common gameport vmw_balloon ac97_bus snd_seq rapl snd_seq_device snd_pcm snd_timer pcspkr snd vmw_vmci soundcore i2c_piix4 joydev loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic vmwgfx ghash_clmulni_intel nvme nvme_core sha512_ssse3 nvme_common drm_ttm_helper vmxnet3 ttm serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 1 PID: 2805 Comm: firefox Not tainted 6.3.4-201.fc38.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xbe/0x110
Code: 01 01 e8 75 9f 91 ff 0f 0b c3 cc cc cc cc 80 3d b8 a0 ad 01 00 75 85 48 c7 c7 68 bc 92 a3 c6 05 a8 a0 ad 01 01 e8 52 9f 91 ff <0f> 0b c3 cc cc cc cc 80 3d 96 a0 ad 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffa4e111553c68 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8a8a682dd000 RCX: 0000000000000027
RDX: ffff8a8b75e61548 RSI: 0000000000000001 RDI: ffff8a8b75e61540
RBP: ffff8a8a8d807a00 R08: 0000000000000000 R09: ffffa4e111553af8
R10: 0000000000000003 R11: ffff8a8b7fec54a8 R12: 0000000000000024
R13: 0000000000000001 R14: ffff8a8a8d807a40 R15: ffff8a8aaebdbca0
FS:  0000000000000000(0000) GS:ffff8a8b75e40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3d173fe990 CR3: 000000012704a004 CR4: 0000000000370ee0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x71/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f8/0x270
 drm_release+0x74/0xf0
 __fput+0x8e/0x250
 task_work_run+0x5a/0x90
 do_exit+0x342/0xb10
 do_group_exit+0x31/0x80
 __x64_sys_exit_group+0x18/0x20
 do_syscall_64+0x5d/0x90
 ? __rseq_handle_notify_resume+0xa5/0x4e0
 ? mntput_no_expire+0x4a/0x250
 ? kmem_cache_free+0x19/0x3b0
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? do_syscall_64+0x6c/0x90
 ? syscall_exit_to_user_mode+0x1b/0x40
 ? do_syscall_64+0x6c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f3d316fd44d
Code: Unable to access opcode bytes at 0x7f3d316fd423.
RSP: 002b:00007fff07ea6ec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f3d316fd44d
RDX: 00000000000000e7 RSI: ffffffffffffff48 RDI: 0000000000000000
RBP: 0000000000000000 R08: 00007f3ced411000 R09: 0000000000000001
R10: 00007f3ced44f000 R11: 0000000000000202 R12: 0000000000000001
R13: 0000000000000000 R14: 00007fff07ea6f50 R15: 00007f3d262bf370
 </TASK>