Kerneloops

Similar reports
Problem #20
Component
kernel Tainted
Last affected version
0:6.2.15-100.fc36
Executable
unknown
First occurrence
2024-12-09
Last occurrence
2024-12-09
Unique reports
1
Quality
-3

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.2.15-100.fc36 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_unlock_irqrestore
vmlinux 0x23
watchdog: BUG: soft lockup - CPU#2 stuck for 8038s! [updatedb:1144493]
 asm_sysvec_apic_timer_interrupt+0x16/0x20
RIP: 0033:0x7fb86258effb
Code: 00 00 00 eb 19 66 2e 0f 1f 84 00 00 00 00 00 83 c7 01 81 ff 00 01 00 00 0f 84 d4 00 00 00 89 f8 89 f9 c1 e8 05 8b 04 86 d3 e8 <83> e0 01 44 31 f0 39 c5 74 db 41 89 f9 eb 21 66 0f 1f 44 00 00 41
Modules linked in: tls uinput tun snd_seq_dummy snd_hrtimer xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype iptable_filter ip_tables br_netfilter bridge stp llc vboxvideo drm_vram_helper qrtr rfkill overlay vboxsf sunrpc binfmt_misc iTCO_wdt intel_pmc_bxt intel_rapl_msr iTCO_vendor_support intel_rapl_common squashfs loop snd_intel8x0 snd_ac97_codec rapl ac97_bus snd_seq snd_seq_device snd_pcm joydev lpc_ich snd_timer vboxguest pcspkr e1000 snd i2c_piix4 soundcore zram vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni virtio_net polyval_generic ata_generic drm_ttm_helper ghash_clmulni_intel pata_acpi serio_raw sha512_ssse3 ttm net_failover video failover wmi fuse
CPU: 2 PID: 1144493 Comm: updatedb Tainted: G             L     6.2.15-100.fc36.x86_64 #1
RSP: 002b:00007ffcf3f8e810 EFLAGS: 00000a07
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RAX: 000000000000003f RBX: 0000564e6db7b740 RCX: 000000000000001a
RDX: 0000000000000001 RSI: 0000564e6db7b6d0 RDI: 000000000000001a
RBP: 0000000000000001 R08: 0000000000000008 R09: 000000000000000d
R10: 0000000000000000 R11: 72706707d968db00 R12: 0000000000000000
RIP: 0033:0x7ffa3b158119
R13: 0000564e6db7b6a0 R14: 0000000000000000 R15: 0000000000000000
Code: 90 83 fa 10 73 2d 83 fa 08 73 46 83 fa 04 73 16 83 fa 01 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc <8b> 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 c5 fa 7f
 </TASK>
RSP: 002b:00007ffc42f618d8 EFLAGS: 00000206
RAX: 00005615b3a3c14b RBX: 0000000000000007 RCX: 000000006f6d2e68
RDX: 0000000000000007 RSI: 00005615b37a961c RDI: 00005615b3a3c14b
RBP: 00005615b3a3ab90 R08: 000000000000004c R09: 00005615b3a3c133
R10: 00007ffc42f61938 R11: 0000000000000009 R12: 00005615b37a1ec0
R13: ffffffffffffffba R14: 00000000fffffff9 R15: 00005615b3a3c152
FS:  00007ffa3b6c7740 GS:  0000000000000000
Sending NMI from CPU 1 to CPUs 2:
NMI backtrace for cpu 2
CPU: 2 PID: 1144493 Comm: updatedb Tainted: G             L     6.2.15-100.fc36.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:__pv_queued_spin_lock_slowpath+0x286/0x380
Code: 00 2b 03 00 8d 42 ff 48 98 48 03 2c c5 c0 fa 98 ad 4c 89 75 00 b8 00 80 00 00 eb 13 84 c0 75 08 0f b6 55 14 84 d2 75 4b f3 90 <83> e8 01 74 44 41 8b 56 08 85 d2 74 e5 41 8b 46 08 85 c0 75 0a f3
RSP: 0000:ffffb6c3df383e40 EFLAGS: 00000082
RAX: 0000000000006091 RBX: 00000000000c0000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffad87c8e1
RBP: ffff92b214bb2b00 R08: 0000000000000005 R09: 0000000000000100
R10: ffffffffae006100 R11: 0000000000000001 R12: ffffffffae146c80
R13: ffffffffae146c80 R14: ffff92b214b32b00 R15: ffffffffae006108
FS:  00007ffa3b6c7740(0000) GS:ffff92b214b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffa32c47000 CR3: 000000029891a001 CR4: 00000000000706e0
Call Trace: