Kerneloops

Similar reports
Problem #763408
Component
kernel Tainted
Last affected version
0:6.15.6-200.fc42
Executable
unknown
First occurrence
2025-06-26
Last occurrence
2025-07-17
Unique reports
3
Quality
-81

Statistics

Operating system Unique / Total count
Fedora 42 3 / 3
Operating system Count
Fedora 42 3
Architecture Count
x86_64 3
Related packages Count
kernel-core 3
 0:6.15.3-200.fc42 1
 0:6.15.6-200.fc42 1
 0:6.15.4-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? security_file_permission
vmlinux 0x50
6
? security_file_permission
vmlinux 0x50
7
? security_file_permission
vmlinux 0x50
8
? security_file_permission
vmlinux 0x50
9
? security_file_permission
vmlinux 0x50
10
? security_file_permission
vmlinux 0x50
11
? security_file_permission
vmlinux 0x50
12
? security_file_permission
vmlinux 0x50
13
? security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
? security_file_permission
vmlinux 0x50
21
? security_file_permission
vmlinux 0x50
22
? security_file_permission
vmlinux 0x50
23
? security_file_permission
vmlinux 0x50
24
? security_file_permission
vmlinux 0x50
25
? security_file_permission
vmlinux 0x50
26
? security_file_permission
vmlinux 0x50
27
? security_file_permission
vmlinux 0x50
WARNING: CPU: 1 PID: 16556 at arch/x86/kernel/cpu/bugs.c:3230 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) cfg80211 qrtr bnep sunrpc uvcvideo binfmt_misc snd_ctl_led btusb uvc snd_hda_codec_idt videobuf2_vmalloc btrtl snd_hda_codec_generic btintel snd_hda_codec_hdmi videobuf2_memops btbcm snd_hda_intel videobuf2_v4l2 videobuf2_common snd_intel_dspcfg btmtk videodev snd_intel_sdw_acpi bluetooth snd_hda_codec mc snd_hda_core snd_hwdep ppdev snd_seq hp_wmi snd_seq_device sparse_keymap edac_mce_amd kvm_amd snd_pcm platform_profile snd_timer snd rfkill hp_accel kvm r8169 soundcore irqbypass pcspkr acpi_cpufreq lis3lv02d realtek k10temp i2c_scmi wmi_bmof pktcdvd joydev tpm_infineon i2c_piix4 i2c_smbus parport_pc wireless_hotkey parport squashfs loop nfnetlink zram lz4hc_compress lz4_compress amdgpu amdxcp gpu_sched drm_panel_backlight_quirks drm_buddy radeon rtsx_pci_sdmmc mmc_core polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 drm_ttm_helper sha256_ssse3 sha1_ssse3 ttm drm_exec i2c_algo_bit sp5100_tco rtsx_pci drm_suballoc_helper drm_display_helper video cec wmi
 serio_raw i2c_dev fuse
CPU: 1 UID: 0 PID: 16556 Comm: modprobe Tainted: P           OE       6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Hewlett-Packard HP ProBook 645 G1/1992, BIOS L72 Ver. 01.31 03/10/2015
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d bc 6a 8c 02 00 74 05 e9 29 d2 1d 01 48 c7 c7 40 9d 42 b0 c6 05 a7 6a 8c 02 01 e8 66 d7 08 00 <0f> 0b e9 0f d2 1d 01 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffd13b89ec7a58 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff8c83f789cb88 RSI: 0000000000000001 RDI: ffff8c83f789cb80
RBP: ffffd13b89ec7aa8 R08: 0000000000000000 R09: ffffd13b89ec7900
R10: ffffffffb0f3bba8 R11: 00000000ffffdfff R12: ffffffffc3115bc5
R13: ffffffffc2378010 R14: 000055d90ff6d5ee R15: 0000000000000000
FS:  00007fefd1e92740(0000) GS:ffff8c8445af1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f800af8d108 CR3: 00000001875c7000 CR4: 00000000000406f0
Call Trace:
 <TASK>
 warn_thunk_thunk+0x16/0x30
 getvar+0x20/0x70 [wl]
 ? __UNIQUE_ID_vermagic475+0x2ec43d2b27aa/0x2ec43d2b27aa [wl]
 wl_module_init+0x23/0xb0 [wl]
 ? do_one_initcall+0x5b/0x300
 ? do_init_module+0x84/0x260
 ? init_module_from_file+0x8a/0xe0
 ? idempotent_init_module+0x114/0x310
 ? __x64_sys_finit_module+0x67/0xc0
 ? do_syscall_64+0x7b/0x160
 ? ksys_read+0x73/0xe0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? __pfx_btrfs_file_llseek+0x10/0x10
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? __x64_sys_openat+0x61/0xa0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? switch_fpu_return+0x4e/0xd0
 ? syscall_exit_to_user_mode+0x1d5/0x210
 ? do_syscall_64+0x87/0x160
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? do_user_addr_fault+0x21a/0x690
 ? exc_page_fault+0x7e/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>