Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-03-10
Last occurrence
2021-03-10
Unique reports
1
Quality
-20

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
? ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
? ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [systemd-resolve:603]
Modules linked in: uinput rfcomm nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock bnep snd_seq_midi snd_seq_midi_event sunrpc snd_ens1371 snd_ac97_codec gameport ac97_bus snd_rawmidi snd_seq snd_seq_device snd_pcm btusb btrtl btbcm snd_timer snd btintel bluetooth intel_rapl_msr intel_rapl_common ecdh_generic rfkill rapl ecc soundcore vmw_balloon pcspkr joydev i2c_piix4 vmw_vmci zram ip_tables vmwgfx drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel cec ghash_clmulni_intel ttm drm serio_raw mptspi e1000 scsi_transport_spi mptscsih
 mptbase ata_generic pata_acpi fuse
CPU: 2 PID: 603 Comm: systemd-resolve Tainted: G             L    5.8.15-301.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019
RIP: 0010:e1000_set_rx_mode+0x155/0x310 [e1000]
Code: 0d 00 00 03 42 8d 14 fd 00 00 00 00 48 19 c9 48 63 d2 48 81 e1 40 ac ff ff 48 8d 94 11 00 54 00 00 48 03 93 80 0d 00 00 89 3a <48> 8b 93 80 0d 00 00 8b 52 08 83 bb 98 0d 00 00 03 48 63 ce 48 19
RSP: 0018:ffffa602809c7c40 EFLAGS: 00000286
RAX: 000000000000cb81 RBX: ffff955997148000 RCX: 0000000000000000
RDX: ffffa602808c5448 RSI: 000000000000004c RDI: 0000000000000000
RBP: ffff955997148298 R08: 0000000001003333 R09: 0000000000000000
R10: ffff9558e460da00 R11: 0000000000000000 R12: ffff9558e460da00
R13: ffff955997148d80 R14: ffff955997148298 R15: 0000000000000009
FS:  00007f0820f271c0(0000) GS:ffff955999680000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5a4bccae90 CR3: 00000001133bc006 CR4: 00000000003606e0
 schedule+0x4a/0xb0
 schedule_timeout+0x7e/0x140
 ? __next_timer_interrupt+0xd0/0xd0
 rcu_gp_kthread+0x50f/0xb90
 ? rcu_nocb_cb_kthread+0x230/0x230
 kthread+0x11b/0x140
 ? __kthread_bind_mask+0x60/0x60
 ret_from_fork+0x22/0x30
Call Trace: