Kerneloops

Similar reports
Problem #763308
Component
kernel Tainted
Last affected version
0:6.15.5-200.fc42
Executable
unknown
First occurrence
2025-06-26
Last occurrence
2025-07-12
Unique reports
3
Quality
-72

Statistics

Operating system Unique / Total count
Fedora 42 3 / 4
Operating system Count
Fedora 42 4
Architecture Count
x86_64 4
Related packages Count
kernel-core 4
 0:6.15.3-200.fc42 2
 0:6.15.5-200.fc42 1
 0:6.15.4-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? security_file_permission
vmlinux 0x50
6
? security_file_permission
vmlinux 0x50
7
? security_file_permission
vmlinux 0x50
8
? security_file_permission
vmlinux 0x50
9
? security_file_permission
vmlinux 0x50
10
? security_file_permission
vmlinux 0x50
11
? security_file_permission
vmlinux 0x50
12
? security_file_permission
vmlinux 0x50
13
? security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
? security_file_permission
vmlinux 0x50
21
? security_file_permission
vmlinux 0x50
22
? security_file_permission
vmlinux 0x50
23
? security_file_permission
vmlinux 0x50
24
? security_file_permission
vmlinux 0x50
WARNING: CPU: 4 PID: 4323 at arch/x86/kernel/cpu/bugs.c:3230 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables qrtr bnep sunrpc binfmt_misc btusb btrtl btintel btbcm btmtk bluetooth uvcvideo uvc videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common vfat fat snd_sof_pci_intel_tgl snd_sof_pci_intel_cnl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_sof_pci iwlmvm snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi crc8 soundwire_bus intel_rapl_msr mac80211 snd_soc_sdca intel_rapl_common snd_hda_codec_hdmi snd_soc_avs intel_uncore_frequency intel_uncore_frequency_common intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp
 snd_soc_hda_codec coretemp snd_hda_ext_core snd_soc_core kvm_intel snd_hda_codec_realtek snd_hda_codec_generic snd_compress ac97_bus snd_hda_scodec_component libarc4 snd_pcm_dmaengine snd_hda_intel kvm snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core iwlwifi snd_hwdep spi_nor snd_seq iTCO_wdt snd_seq_device irqbypass mtd rapl intel_pmc_bxt spd5118 intel_cstate iTCO_vendor_support snd_pcm cfg80211 ov13858 asus_wmi snd_timer v4l2_fwnode intel_uncore platform_profile snd wmi_bmof thunderbolt v4l2_async spi_intel_pci i2c_i801 pcspkr soundcore i2c_smbus idma64 spi_intel videodev rfkill igen6_edac intel_pmc_core mc intel_hid pmt_telemetry joydev acpi_tad pmt_class sparse_keymap acpi_pad loop dm_multipath nfnetlink zram lz4hc_compress lz4_compress dm_crypt xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 i2c_algo_bit drm_buddy ttm nvme drm_display_helper nvme_core polyval_clmulni polyval_generic ucsi_acpi ghash_clmulni_intel sha512_ssse3 typec_ucsi hid_multitouch
 sha256_ssse3 sha1_ssse3 nvme_keyring cec i2c_hid_acpi typec nvme_auth intel_vsec video i2c_hid wmi pinctrl_tigerlake serio_raw scsi_dh_rdac scsi_dh_emc scsi_dh_alua i2c_dev fuse
CPU: 4 UID: 0 PID: 4323 Comm: modprobe Tainted: P           OE       6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: SLIMBOOK Executive/Executive, BIOS N.1.10GRU07 06/12/2024
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d bc 6a 8c 02 00 74 05 c3 cc cc cc cc 48 c7 c7 40 9d e2 9f c6 05 a7 6a 8c 02 01 e8 66 d7 08 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffd5134613fa18 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff8e94eb41cb88 RSI: 0000000000000001 RDI: ffff8e94eb41cb80
RBP: ffffd5134613fa68 R08: 0000000000000000 R09: ffffd5134613f8c0
R10: ffffffffa093bba8 R11: 00000000ffffdfff R12: ffffffffc2d15bc5
R13: ffffffffc1dff010 R14: 0000562f399f55ee R15: 0000000000000000
FS:  00007f5721b5c740(0000) GS:ffff8e9549c71000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f572129ed3a CR3: 00000001c4587006 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 <TASK>
 warn_thunk_thunk+0x16/0x30
 getvar+0x20/0x70 [wl]
 ? __UNIQUE_ID_vermagic475+0x2aec7a9597aa/0x2aec7a9597aa [wl]
 wl_module_init+0x23/0xb0 [wl]
 ? do_one_initcall+0x58/0x300
 ? do_init_module+0x84/0x260
 ? init_module_from_file+0x8a/0xe0
 ? idempotent_init_module+0x114/0x310
 ? __x64_sys_finit_module+0x67/0xc0
 ? do_syscall_64+0x7b/0x160
 ? vfs_statx+0x7a/0x170
 ? strncpy_from_user+0x30/0x110
 ? vfs_fstatat+0x75/0xa0
 ? __do_sys_newfstatat+0x3c/0x80
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? ksys_read+0x73/0xe0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? do_user_addr_fault+0x21a/0x690
 ? exc_page_fault+0x7e/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>