Kerneloops

Similar reports
Problem #763308
Component
kernel
Last affected version
0:6.15.6-200.fc42
Executable
unknown
First occurrence
2025-06-23
Last occurrence
2025-07-18
Unique reports
51
Quality
-56

Graphs

Statistics

Operating system Unique / Total count
Fedora 41 9 / 9
Fedora 42 51 / 67
Operating system Count
Fedora 42 67
Fedora 41 9
Architecture Count
x86_64 76
Related packages Count
kernel-core 76
 0:6.15.3-200.fc42 35
 0:6.15.4-200.fc42 24
 0:6.15.5-200.fc42 5
 0:6.15.3-100.fc41 5
 0:6.15.6-200.fc42 3
 0:6.15.4-100.fc41 2
 0:6.15.6-100.fc41 1
 0:6.14.11-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
? security_file_permission
vmlinux 0x50
3
security_file_permission
vmlinux 0x50
4
security_file_permission
vmlinux 0x50
5
security_file_permission
vmlinux 0x50
6
security_file_permission
vmlinux 0x50
7
security_file_permission
vmlinux 0x50
8
security_file_permission
vmlinux 0x50
9
security_file_permission
vmlinux 0x50
10
security_file_permission
vmlinux 0x50
11
security_file_permission
vmlinux 0x50
12
security_file_permission
vmlinux 0x50
13
security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
? security_file_permission
vmlinux 0x50
21
? security_file_permission
vmlinux 0x50
22
? security_file_permission
vmlinux 0x50
23
security_file_permission
vmlinux 0x50
WARNING: CPU: 0 PID: 521 at drivers/gpu/drm/vmwgfx/vmwgfx_bo.c:78 vmw_bo_free+0x34/0x50 [vmwgfx]
Modules linked in: snd_seq_dummy snd_hrtimer rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables snd_seq_midi snd_seq_midi_event intel_rapl_msr intel_rapl_common intel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_class intel_vsec kvm_intel qrtr kvm irqbypass rapl snd_ens1371 vmw_balloon snd_ac97_codec pcspkr vmxnet3 gameport snd_rawmidi ac97_bus snd_seq snd_seq_device snd_pcm sunrpc snd_timer snd soundcore i2c_piix4 i2c_smbus pktcdvd joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock zram vmw_vmci lz4hc_compress lz4_compress polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 sha256_ssse3 nvme sha1_ssse3 nvme_core vmwgfx nvme_keyring nvme_auth drm_ttm_helper ata_generic pata_acpi ttm serio_raw i2c_dev fuse
CPU: 0 UID: 0 PID: 521 Comm: plymouthd Not tainted 6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:vmw_bo_free+0x34/0x50 [vmwgfx]
Code: 48 8b 87 50 02 00 00 48 89 fb 48 85 c0 75 1b 48 89 df e8 3f fe ff ff 48 83 bb 88 02 00 00 00 75 0d 48 89 df 5b e9 cc 8a ee cb <0f> 0b eb e1 0f 0b 48 89 df 5b e9 bd 8a ee cb 66 66 2e 0f 1f 84 00
RSP: 0018:ffffcf644071fc88 EFLAGS: 00010286
RAX: ffff8ee9cc3120c0 RBX: ffff8ee9c9853800 RCX: 00000000802a0027
RDX: 0000000000000000 RSI: fffffbfdc40c0380 RDI: ffff8ee9c9853800
RBP: ffff8ee9c16c2000 R08: ffff8ee9c300e300 R09: 00000000802a0027
R10: ffff8ee9c300e300 R11: fffffbfdc40c0380 R12: 0000000000000001
R13: ffff8ee9c16c2050 R14: ffff8ee9cdc024b8 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8eea68c71000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc985c3e050 CR3: 000000010f9d6002 CR4: 00000000003726f0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x6d/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f2/0x280
 drm_release+0x5c/0xe0
 __fput+0xe6/0x2a0
 task_work_run+0x5a/0x90
 do_exit+0x242/0x480
 do_group_exit+0x2d/0xc0
 __x64_sys_exit_group+0x18/0x20
 x64_sys_call+0xfdb/0x14f0
 do_syscall_64+0x7b/0x160
 ? __count_memcg_events+0xc0/0x1e0
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? handle_mm_fault+0x243/0x360
 ? do_user_addr_fault+0x21a/0x690
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f86f8886da8
Code: Unable to access opcode bytes at 0x7f86f8886d7e.
RSP: 002b:00007ffc6c366cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f86f89b1fe8 RCX: 00007f86f8886da8
RDX: 00007f86f85f3748 RSI: ffffffffffffff88 RDI: 0000000000000000
RBP: 00007ffc6c366d20 R08: 0000000000000000 R09: 0000000000000000
R10: 00007ffc6c3669f0 R11: 0000000000000206 R12: 0000000000000004
R13: 0000000000000000 R14: 00007f86f89b0680 R15: 00007f86f89b2000
 </TASK>