Kerneloops

Similar reports
Problem #763408
Component
kernel Tainted
Last affected version
0:6.15.5-200.fc42
Executable
unknown
First occurrence
2025-06-29
Last occurrence
2025-07-14
Unique reports
6
Quality
-78

Statistics

Operating system Unique / Total count
Fedora 42 6 / 6
Operating system Count
Fedora 42 6
Architecture Count
x86_64 6
Related packages Count
kernel-core 6
 0:6.15.4-200.fc42 3
 0:6.15.3-200.fc42 2
 0:6.15.5-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? security_file_permission
vmlinux 0x50
6
? security_file_permission
vmlinux 0x50
7
? security_file_permission
vmlinux 0x50
8
? security_file_permission
vmlinux 0x50
9
? security_file_permission
vmlinux 0x50
10
? security_file_permission
vmlinux 0x50
11
? security_file_permission
vmlinux 0x50
12
? security_file_permission
vmlinux 0x50
13
? security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
? security_file_permission
vmlinux 0x50
21
? security_file_permission
vmlinux 0x50
22
? security_file_permission
vmlinux 0x50
23
? security_file_permission
vmlinux 0x50
24
? security_file_permission
vmlinux 0x50
25
? security_file_permission
vmlinux 0x50
26
? security_file_permission
vmlinux 0x50
WARNING: CPU: 6 PID: 743 at arch/x86/kernel/cpu/bugs.c:3230 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) mac80211(+) nvidia_uvm(OE+) snd_soc_core(+) snd_hda_codec_generic kvm snd_hda_scodec_component libarc4 snd_hda_codec_hdmi snd_compress ac97_bus snd_pcm_dmaengine snd_usb_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi btusb snd_hda_codec btrtl snd_usbmidi_lib btintel mc snd_hda_core snd_ump btbcm ucsi_ccg(+) irqbypass snd_rawmidi spi_nor rapl iTCO_wdt typec_ucsi snd_hwdep btmtk intel_pmc_bxt iwlwifi ee1004 mtd typec iTCO_vendor_support snd_seq processor_thermal_device_pci intel_rapl_msr uas intel_cstate bluetooth cfg80211 usb_storage nvidia(OE) intel_uncore processor_thermal_device r8169 snd_seq_device mei_me processor_thermal_wt_hint pcspkr wmi_bmof snd_pcm processor_thermal_rfim realtek processor_thermal_rapl i2c_i801 mei spi_intel_pci snd_timer idma64 rfkill spi_intel intel_rapl_common i2c_smbus drm_ttm_helper processor_thermal_wt_req snd processor_thermal_power_floor ttm joydev i2c_nvidia_gpu processor_thermal_mbox soundcore intel_pmc_core int3403_thermal
 pmt_telemetry int340x_thermal_zone pmt_class int3400_thermal intel_vsec acpi_pad acpi_thermal_rel acpi_tad loop nfnetlink zram lz4hc_compress lz4_compress nvme nvme_core nvme_keyring nvme_auth polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 sha256_ssse3 serio_raw sha1_ssse3 vmd video wmi pinctrl_alderlake i2c_dev fuse
CPU: 6 UID: 0 PID: 743 Comm: (udev-worker) Tainted: P           OE       6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Acer Predator PO3-640/Predator PO3-640, BIOS R01-A4 02/21/2022
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d bc 6a 8c 02 00 74 05 c3 cc cc cc cc 48 c7 c7 40 9d c2 86 c6 05 a7 6a 8c 02 01 e8 66 d7 08 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffd06a009a3928 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff8c5c3fb1cb88 RSI: 0000000000000001 RDI: ffff8c5c3fb1cb80
RBP: ffffd06a009a3978 R08: 0000000000000000 R09: ffffd06a009a37d0
R10: ffffffff8773bba8 R11: 00000000ffffdfff R12: ffffffffc30a9bc5
R13: ffffffffc0ffc010 R14: 00007fd28f969965 R15: 0000000000000000
FS:  00007fd28f9f7040(0000) GS:ffff8c5cb7571000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb9da6c7820 CR3: 0000000108eaa004 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 <TASK>
 warn_thunk_thunk+0x16/0x30
 getvar+0x20/0x70 [wl]
 ? __UNIQUE_ID_vermagic475+0x2f95b6d8c7aa/0x2f95b6d8c7aa [wl]
 wl_module_init+0x23/0xb0 [wl]
 ? do_one_initcall+0x58/0x300
 ? do_init_module+0x84/0x260
 ? init_module_from_file+0x8a/0xe0
 ? idempotent_init_module+0x114/0x310
 ? __x64_sys_finit_module+0x67/0xc0
 ? do_syscall_64+0x7b/0x160
 ? syscall_exit_to_user_mode_prepare+0x17e/0x1f0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? touch_atime+0x1e/0x120
 ? filemap_read+0x429/0x490
 ? vfs_read+0x160/0x390
 ? rseq_get_rseq_cs+0x19/0x220
 ? rseq_ip_fixup+0x8c/0x1d0
 ? switch_fpu_return+0x4e/0xd0
 ? syscall_exit_to_user_mode+0x1d5/0x210
 ? do_syscall_64+0x87/0x160
 ? syscall_exit_to_user_mode_prepare+0x17e/0x1f0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? __irq_exit_rcu+0x4c/0xf0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>