Kerneloops

Similar reports
Problem #763405
Component
kernel Tainted
Last affected version
0:6.15.3-200.fc42
Executable
unknown
First occurrence
2025-06-26
Last occurrence
2025-07-16
Unique reports
2
Quality
-20

Statistics

Operating system Unique / Total count
Fedora 42 2 / 17
Operating system Count
Fedora 42 17
Architecture Count
x86_64 17
Related packages Count
kernel-core 17
 0:6.15.3-200.fc42 17

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
security_file_permission
vmlinux 0x50
3
security_file_permission
vmlinux 0x50
4
security_file_permission
vmlinux 0x50
5
? security_file_permission
vmlinux 0x50
6
? security_file_permission
vmlinux 0x50
7
? security_file_permission
vmlinux 0x50
8
security_file_permission
vmlinux 0x50
WARNING: CPU: 9 PID: 47864 at drivers/dma-buf/dma-fence.c:538 dma_fence_release+0xe5/0x160
Modules linked in: uinput snd_seq_dummy snd_hrtimer rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sunrpc nf_tables snd_seq_midi snd_seq_midi_event qrtr snd_ens1371 snd_ac97_codec gameport intel_rapl_msr snd_rawmidi vmw_balloon ac97_bus snd_seq intel_rapl_common snd_seq_device snd_pcm pcspkr snd_timer snd vmxnet3 i2c_piix4 soundcore i2c_smbus pktcdvd joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock zram vmw_vmci lz4hc_compress lz4_compress polyval_clmulni nvme polyval_generic ghash_clmulni_intel sha512_ssse3 nvme_core vmwgfx sha256_ssse3 sha1_ssse3 nvme_keyring drm_ttm_helper nvme_auth ttm ata_generic pata_acpi serio_raw i2c_dev fuse
CPU: 9 UID: 1000 PID: 47864 Comm: gnome-shell Tainted: G        W           6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [W]=WARN
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:dma_fence_release+0xe5/0x160
Code: 89 c6 48 8b 43 d0 48 8b 40 08 e8 b6 7e 56 00 4c 8b 44 24 08 48 8b 0c 24 4c 89 f2 48 89 c6 48 c7 c7 70 18 6d 9c e8 cb 8a 41 ff <0f> 0b 48 8b 7b c8 e8 e0 63 56 00 c7 43 04 dd ff ff ff 49 89 c6 e8
RSP: 0018:ffffd1115290be58 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88853805d870 RCX: 0000000000000027
RDX: ffff88882c29cb88 RSI: 0000000000000001 RDI: ffff88882c29cb80
RBP: ffff88853805d838 R08: 0000000000000000 R09: ffffd1115290bd00
R10: ffff88882bd3ffa8 R11: 00000000ffff7fff R12: ffff8885005de800
R13: ffff88850319de20 R14: ffffffffc0612a8f R15: 0000000000000000
FS:  00007f4c1b7a1640(0000) GS:ffff88888e2f1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4bc17e100c CR3: 000000029391a000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 sync_file_release+0x6c/0xa0
 __fput+0xe6/0x2a0
 __x64_sys_close+0x3d/0x80
 do_syscall_64+0x7b/0x160
 ? do_user_addr_fault+0x181/0x690
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? exc_page_fault+0x7e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f4c1f2876c2
Code: 08 0f 85 81 42 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 <c3> 66 2e 0f 1f 84 00 00 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 66
RSP: 002b:00007ffdc9ccd548 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
RAX: ffffffffffffffda RBX: 000055f73244b240 RCX: 00007f4c1f2876c2
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000051
RBP: 00007ffdc9ccd580 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000055f73244fab8
R13: 000055f73244fab0 R14: 0000000000000001 R15: 000055f73269bf10
 </TASK>