Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #673760
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-25
Last occurrence
2021-02-25
Unique reports
1
Quality
-34

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
? ktime_get
vmlinux 0x38
5
? ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
9
ktime_get
vmlinux 0x38
10
ktime_get
vmlinux 0x38
11
? ktime_get
vmlinux 0x38
12
ktime_get
vmlinux 0x38
13
? ktime_get
vmlinux 0x38
14
ktime_get
vmlinux 0x38
NETDEV WATCHDOG: ens33 (e1000): transmit queue 0 timed out
WARNING: CPU: 1 PID: 16 at net/sched/sch_generic.c:442 dev_watchdog+0x25c/0x270
Modules linked in: uinput nls_utf8 isofs nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables rfkill iptable_filter vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass rapl snd_ens1371 vmw_balloon snd_ac97_codec gameport ac97_bus snd_rawmidi snd_seq snd_seq_device joydev pcspkr snd_pcm snd_timer snd i2c_piix4 vmw_vmci soundcore zram ip_tables vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel drm_kms_helper serio_raw cec ttm e1000 drm mptspi scsi_transport_spi mptscsih mptbase ata_generic
 pata_acpi fuse
CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.8.15-301.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
RIP: 0010:dev_watchdog+0x25c/0x270
Code: 85 c0 75 e5 eb 9a 4c 89 f7 c6 05 43 0f 21 01 01 e8 19 ee fa ff 44 89 e9 4c 89 f6 48 c7 c7 b0 a7 47 9e 48 89 c2 e8 ea 91 6c ff <0f> 0b e9 78 ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f
RSP: 0018:ffffb698804afd90 EFLAGS: 00010286
RAX: 000000000000003a RBX: ffff8f0baed5ca00 RCX: ffff8f0bb9e58d18
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff8f0bb9e58d10
RBP: ffff8f0bb880e3dc R08: 00000000000006b3 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000001 R12: ffff8f0bb880e480
R13: 0000000000000000 R14: ffff8f0bb880e000 R15: ffff8f0baed5ca80
FS:  0000000000000000(0000) GS:ffff8f0bb9e40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005612de435b68 CR3: 000000011f7c4006 CR4: 00000000003606e0
Call Trace:
 ? pfifo_fast_enqueue+0x150/0x150
 call_timer_fn+0x2d/0x130
 __run_timers.part.0+0x167/0x240
 ? update_load_avg+0x7a/0x610
 ? __switch_to+0x80/0x420
 ? __switch_to_asm+0x36/0x70
 run_timer_softirq+0x26/0x50
 __do_softirq+0xd9/0x2c4
 run_ksoftirqd+0x26/0x40
 smpboot_thread_fn+0xc5/0x160
 ? smpboot_register_percpu_thread+0xf0/0xf0
 kthread+0x11b/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x22/0x30