Kerneloops

Similar reports
Problem #533277
Component
kernel Tainted
Last affected version
0:6.2.15-100.fc36
Executable
unknown
First occurrence
2024-04-22
Last occurrence
2024-04-22
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.2.15-100.fc36 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_unlock_irqrestore
vmlinux 0x23
2
_raw_spin_unlock_irqrestore
vmlinux 0x23
3
_raw_spin_unlock_irqrestore
vmlinux 0x23
4
_raw_spin_unlock_irqrestore
vmlinux 0x23
5
? _raw_spin_unlock_irqrestore
vmlinux 0x23
6
? _raw_spin_unlock_irqrestore
vmlinux 0x23
7
_raw_spin_unlock_irqrestore
vmlinux 0x23
8
_raw_spin_unlock_irqrestore
vmlinux 0x23
9
? _raw_spin_unlock_irqrestore
vmlinux 0x23
10
_raw_spin_unlock_irqrestore
vmlinux 0x23
11
_raw_spin_unlock_irqrestore
vmlinux 0x23
12
_raw_spin_unlock_irqrestore
vmlinux 0x23
13
? _raw_spin_unlock_irqrestore
vmlinux 0x23
14
_raw_spin_unlock_irqrestore
vmlinux 0x23
watchdog: BUG: soft lockup - CPU#2 stuck for 40s! [packagekitd:1325]
Modules linked in: tls uinput snd_seq_dummy snd_hrtimer qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock bnep snd_seq_midi snd_seq_midi_event btusb btrtl btbcm btintel btmtk bluetooth sunrpc intel_rapl_msr intel_rapl_common snd_ens1371 vmw_balloon rapl snd_ac97_codec binfmt_misc snd_rawmidi gameport ac97_bus snd_seq joydev pcspkr snd_seq_device snd_pcm rfkill snd_timer snd vmw_vmci i2c_piix4 soundcore squashfs loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic vmwgfx nvme nvme_core ghash_clmulni_intel sha512_ssse3 serio_raw nvme_common drm_ttm_helper ttm vmxnet3 ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 2 PID: 1325 Comm: packagekitd Tainted: G             L     6.2.15-100.fc36.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
 ip_finish_output2+0x28f/0x580
 ip_send_skb+0x86/0x90
RIP: 0010:__do_softirq+0x92/0x31a
Code: df e8 72 f7 1f ff c7 44 24 10 0a 00 00 00 48 c7 c7 db 33 96 8e e8 ae 97 fe ff 65 66 c7 05 bc ca 0b 72 00 00 fb 0f 1f 44 00 00 <bb> ff ff ff ff 41 0f bc dc 83 c3 01 0f 84 91 00 00 00 49 c7 c2 c0
RSP: 0000:ffff9a9f8051cf90 EFLAGS: 00000292
RAX: 0000000000000002 RBX: ffff89fc71aed100 RCX: 0000000000000020
RDX: 00007325e8ce9c0d RSI: ffffffff8e9633db RDI: ffffffff8e8dcdf6
RBP: 0000000000000000 R08: ffff89fd360a33c0 R09: 7fffffffffffffff
R10: 00006e23c6125180 R11: 0000000000333aef R12: 0000000000000002
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007fd3b55e5d00(0000) GS:ffff89fd36080000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000557077e3dbb0 CR3: 00000001bac84003 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 udp_send_skb+0x154/0x350
 udp_sendmsg+0xaf9/0xe90
 ? __pfx_ip_generic_getfrag+0x10/0x10
 ? sock_sendmsg+0x58/0x70
 sock_sendmsg+0x58/0x70
 ____sys_sendmsg+0x277/0x2f0
 ? copy_msghdr_from_user+0x7d/0xc0
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x76/0xc0
 do_syscall_64+0x58/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f3fc5004f04
Code: 15 31 4f 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d fd d6 0c 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
RSP: 002b:00007fff25a9c298 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000055b0fc0efc60 RCX: 00007f3fc5004f04
RDX: 0000000000000000 RSI: 00007fff25a9c320 RDI: 000000000000000c
RBP: 000000000000000c R08: 0000000000000001 R09: 0000000000000004
R10: 0000000000000019 R11: 0000000000000202 R12: 00007fff25a9c320
R13: 0000000000000002 R14: 000055b0fc0d067c R15: 0000000000000000
 </TASK>
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace: