Kerneloops

Similar reports
Problem #763408
Component
kernel Tainted
Last affected version
0:6.15.5-200.fc42
Executable
unknown
First occurrence
2025-06-29
Last occurrence
2025-07-14
Unique reports
3
Quality
-54

Graphs

Statistics

Operating system Unique / Total count
Fedora 41 7 / 7
Fedora 42 3 / 3
Operating system Count
Fedora 41 7
Fedora 42 3
Architecture Count
x86_64 10
Related packages Count
kernel-core 10
 0:6.15.4-100.fc41 5
 0:6.15.5-100.fc41 2
 0:6.15.3-200.fc42 1
 0:6.15.4-200.fc42 1
 0:6.15.5-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
? security_file_permission
vmlinux 0x50
3
security_file_permission
vmlinux 0x50
4
security_file_permission
vmlinux 0x50
5
security_file_permission
vmlinux 0x50
6
security_file_permission
vmlinux 0x50
7
security_file_permission
vmlinux 0x50
8
security_file_permission
vmlinux 0x50
9
security_file_permission
vmlinux 0x50
10
security_file_permission
vmlinux 0x50
11
security_file_permission
vmlinux 0x50
12
security_file_permission
vmlinux 0x50
13
security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
? security_file_permission
vmlinux 0x50
21
? security_file_permission
vmlinux 0x50
22
security_file_permission
vmlinux 0x50
WARNING: CPU: 0 PID: 625 at drivers/gpu/drm/vmwgfx/vmwgfx_bo.c:78 vmw_bo_free+0x34/0x50 [vmwgfx]
Modules linked in: snd_seq_dummy snd_hrtimer rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack sunrpc nf_defrag_ipv6 nf_defrag_ipv4 nf_tables qrtr snd_seq_midi snd_seq_midi_event vfat fat intel_rapl_msr intel_rapl_common intel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_class intel_vsec rapl snd_ens1371 snd_ac97_codec gameport snd_rawmidi vmw_balloon ac97_bus snd_seq snd_seq_device snd_pcm pcspkr snd_timer snd vmxnet3 soundcore i2c_piix4 i2c_smbus joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock zram vmw_vmci lz4hc_compress lz4_compress nvme polyval_clmulni polyval_generic nvme_core ghash_clmulni_intel sha512_ssse3 vmwgfx sha256_ssse3 nvme_keyring sha1_ssse3 nvme_auth drm_ttm_helper ttm ata_generic pata_acpi serio_raw i2c_dev fuse
CPU: 0 UID: 0 PID: 625 Comm: plymouthd Tainted: G        W           6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [W]=WARN
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.24006586.B64.2406042154 06/04/2024
RIP: 0010:vmw_bo_free+0x34/0x50 [vmwgfx]
Code: 48 8b 87 50 02 00 00 48 89 fb 48 85 c0 75 1b 48 89 df e8 3f fe ff ff 48 83 bb 88 02 00 00 00 75 0d 48 89 df 5b e9 cc ba 2d c3 <0f> 0b eb e1 0f 0b 48 89 df 5b e9 bd ba 2d c3 66 66 2e 0f 1f 84 00
RSP: 0018:ffffcda300a07ca8 EFLAGS: 00010286
RAX: ffff89b4c1bf64c0 RBX: ffff89b4c24d3c00 RCX: 00000000802a0026
RDX: 0000000000000000 RSI: fffffaa20405d680 RDI: ffff89b4c24d3c00
RBP: ffff89b4cdbef800 R08: ffff89b4c175a3c0 R09: 00000000802a0026
R10: ffff89b4c175a3c0 R11: fffffaa20405d680 R12: 0000000000000001
R13: ffff89b4cdbef850 R14: ffff89b4c3040270 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff89b865871000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe808af13a0 CR3: 00000001ad82e004 CR4: 0000000000370ef0
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x6d/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f2/0x280
 drm_release+0x5c/0xe0
 __fput+0xe6/0x2a0
 task_work_run+0x5a/0x90
 do_exit+0x242/0x480
 do_group_exit+0x2d/0xc0
 __x64_sys_exit_group+0x18/0x20
 x64_sys_call+0xfdb/0x14f0
 do_syscall_64+0x7b/0x160
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? handle_mm_fault+0x243/0x360
 ? do_user_addr_fault+0x21a/0x690
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fe80967ada8
Code: Unable to access opcode bytes at 0x7fe80967ad7e.
RSP: 002b:00007ffccc7cd678 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fe8097a5fe8 RCX: 00007fe80967ada8
RDX: 00007fe8093e7748 RSI: ffffffffffffff88 RDI: 0000000000000000
RBP: 00007ffccc7cd6d0 R08: 0000000000000000 R09: 0000000000000000
R10: 00007ffccc7cd3a0 R11: 0000000000000206 R12: 0000000000000004
R13: 0000000000000000 R14: 00007fe8097a4680 R15: 00007fe8097a6000
 </TASK>