Kerneloops

Similar reports
Problem #575416
Component
kernel Tainted
Last affected version
0:6.3.4-201.fc38
Executable
unknown
First occurrence
2023-06-03
Last occurrence
2023-06-03
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.3.4-201.fc38 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
asm_exc_control_protection
vmlinux 0x26
2
? asm_exc_control_protection
vmlinux 0x26
3
asm_exc_control_protection
vmlinux 0x26
4
asm_exc_control_protection
vmlinux 0x26
5
asm_exc_control_protection
vmlinux 0x26
6
asm_exc_control_protection
vmlinux 0x26
7
asm_exc_control_protection
vmlinux 0x26
8
asm_exc_control_protection
vmlinux 0x26
9
asm_exc_control_protection
vmlinux 0x26
10
? asm_exc_control_protection
vmlinux 0x26
11
asm_exc_control_protection
vmlinux 0x26
12
asm_exc_control_protection
vmlinux 0x26
13
? asm_exc_control_protection
vmlinux 0x26
14
asm_exc_control_protection
vmlinux 0x26
15
asm_exc_control_protection
vmlinux 0x26
16
asm_exc_control_protection
vmlinux 0x26
17
asm_exc_control_protection
vmlinux 0x26
18
? asm_exc_control_protection
vmlinux 0x26
19
asm_exc_control_protection
vmlinux 0x26
WARNING: CPU: 1 PID: 6741 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 snd_seq_midi snd_seq_midi_event rfkill ip_set nf_tables nfnetlink intel_rapl_msr vmw_balloon intel_rapl_common uvcvideo rapl uvc snd_ens1371 videobuf2_vmalloc videobuf2_memops snd_ac97_codec snd_usb_audio videobuf2_v4l2 qrtr snd_usbmidi_lib gameport snd_hwdep ac97_bus snd_rawmidi snd_seq videobuf2_common snd_seq_device vsock_loopback vmw_vsock_virtio_transport_common videodev snd_pcm pcspkr vmw_vsock_vmci_transport mc snd_timer vsock snd vmw_vmci soundcore i2c_piix4 sunrpc binfmt_misc joydev loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme ghash_clmulni_intel sha512_ssse3 vmwgfx nvme_core drm_ttm_helper vmxnet3 nvme_common ttm serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 1 PID: 6741 Comm: Shutdow~minator Tainted: G S                 6.3.4-201.fc38.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:refcount_warn_saturate+0xbe/0x110
Code: 01 01 e8 75 9f 91 ff 0f 0b c3 cc cc cc cc 80 3d b8 a0 ad 01 00 75 85 48 c7 c7 68 bc 92 b1 c6 05 a8 a0 ad 01 01 e8 52 9f 91 ff <0f> 0b c3 cc cc cc cc 80 3d 96 a0 ad 01 00 0f 85 5e ff ff ff 48 c7
RSP: 0018:ffffab1215013bf8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8cbfed44b800 RCX: 0000000000000027
RDX: ffff8cc26de61548 RSI: 0000000000000001 RDI: ffff8cc26de61540
RBP: ffff8cbf6a95e400 R08: 0000000000000000 R09: ffffab1215013a88
R10: 0000000000000003 R11: ffff8cc26ddfffe8 R12: 0000000000000006
R13: 0000000000000001 R14: ffff8cbf6a95e440 R15: ffff8cbf69600e00
FS:  0000000000000000(0000) GS:ffff8cc26de40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f804c4be990 CR3: 0000000104efc004 CR4: 00000000001706e0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x71/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f8/0x270
 drm_release+0x74/0xf0
 __fput+0x8e/0x250
 task_work_run+0x5a/0x90
 do_exit+0x342/0xb10
 ? timerqueue_add+0x66/0xb0
 do_group_exit+0x31/0x80
 get_signal+0x9a5/0x9e0
 ? do_nanosleep+0x71/0x150
 arch_do_signal_or_restart+0x3e/0x270
 exit_to_user_mode_prepare+0x195/0x1f0
 syscall_exit_to_user_mode+0x1b/0x40
 do_syscall_64+0x6c/0x90
 ? exc_page_fault+0x7c/0x180
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f8080af8413
Code: Unable to access opcode bytes at 0x7f8080af83e9.
RSP: 002b:00007f802cacbd90 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
RAX: fffffffffffffdfc RBX: 00007f80107136f0 RCX: 00007f8080af8413
RDX: 00007f802cacbdd0 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007f802cacbdb0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
R13: 00007f802cacc608 R14: 0000000000001a55 R15: 00007fffa498ee00
 </TASK>