Kerneloops

Similar reports
Problem #763408
Component
kernel Tainted
Last affected version
0:6.15.6-200.fc42
Executable
unknown
First occurrence
2025-06-29
Last occurrence
2025-07-18
Unique reports
6
Quality
-48

Graphs

Statistics

Operating system Unique / Total count
Fedora 41 5 / 5
Fedora 42 6 / 6
Operating system Count
Fedora 42 6
Fedora 41 5
Architecture Count
x86_64 11
Related packages Count
kernel-core 11
 0:6.15.3-200.fc42 2
 0:6.15.5-100.fc41 2
 0:6.15.5-200.fc42 2
 0:6.15.4-100.fc41 2
 0:6.15.6-200.fc42 1
 0:6.15.4-200.fc42 1
 0:6.15.6-100.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
? security_file_permission
vmlinux 0x50
3
security_file_permission
vmlinux 0x50
4
security_file_permission
vmlinux 0x50
5
security_file_permission
vmlinux 0x50
6
security_file_permission
vmlinux 0x50
7
security_file_permission
vmlinux 0x50
8
security_file_permission
vmlinux 0x50
9
security_file_permission
vmlinux 0x50
10
security_file_permission
vmlinux 0x50
11
security_file_permission
vmlinux 0x50
12
security_file_permission
vmlinux 0x50
13
security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
security_file_permission
vmlinux 0x50
WARNING: CPU: 2 PID: 596 at drivers/gpu/drm/vmwgfx/vmwgfx_bo.c:78 vmw_bo_free+0x34/0x50 [vmwgfx]
Modules linked in: snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables sunrpc snd_seq_midi qrtr snd_seq_midi_event bnep intel_rapl_msr intel_rapl_common intel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_class intel_vsec kvm_intel kvm irqbypass rapl vfat fat snd_ens1371 snd_ac97_codec gameport vmw_balloon snd_rawmidi ac97_bus snd_seq btusb btrtl snd_seq_device btintel pcspkr snd_pcm btbcm vmxnet3 snd_timer btmtk bluetooth snd rfkill soundcore i2c_piix4 i2c_smbus pktcdvd joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock zram vmw_vmci lz4hc_compress lz4_compress nvme nvme_core polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 sha256_ssse3 nvme_keyring vmwgfx sha1_ssse3 drm_ttm_helper nvme_auth ata_generic ttm pata_acpi serio_raw
 i2c_dev fuse
CPU: 2 UID: 0 PID: 596 Comm: plymouthd Tainted: G        W           6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [W]=WARN
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:vmw_bo_free+0x34/0x50 [vmwgfx]
Code: 48 8b 87 50 02 00 00 48 89 fb 48 85 c0 75 1b 48 89 df e8 3f fe ff ff 48 83 bb 88 02 00 00 00 75 0d 48 89 df 5b e9 cc 2a 0e db <0f> 0b eb e1 0f 0b 48 89 df 5b e9 bd 2a 0e db 66 66 2e 0f 1f 84 00
RSP: 0018:ffffca80008b7d28 EFLAGS: 00010286
RAX: ffff894e88c99ec0 RBX: ffff894e82d4a000 RCX: 00000000002a0024
RDX: 0000000000000000 RSI: fffff53a0405cd80 RDI: ffff894e82d4a000
RBP: ffff894e88cbf600 R08: ffff894e81736240 R09: 00000000002a0024
R10: ffff894e81736240 R11: fffff53a0405cd80 R12: 0000000000000001
R13: ffff894e88cbf650 R14: ffff894e8447fdc0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff895015b71000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f509f8523a0 CR3: 00000001c062e004 CR4: 0000000000f72ef0
PKRU: 55555554
Call Trace:
 <TASK>
 drm_gem_object_release_handle+0x54/0x60
 ? __pfx_drm_gem_object_release_handle+0x10/0x10
 idr_for_each+0x6d/0xf0
 drm_gem_release+0x20/0x30
 drm_file_free+0x1f2/0x280
 drm_release+0x5c/0xe0
 __fput+0xe6/0x2a0
 task_work_run+0x5a/0x90
 do_exit+0x242/0x480
 do_group_exit+0x2d/0xc0
 __x64_sys_exit_group+0x18/0x20
 x64_sys_call+0xfdb/0x14f0
 do_syscall_64+0x7b/0x160
 ? do_user_addr_fault+0x21a/0x690
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 ? clear_bhb_loop+0x50/0xa0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f50a03dbda8
Code: Unable to access opcode bytes at 0x7f50a03dbd7e.
RSP: 002b:00007ffec9a19ab8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f50a0506fe8 RCX: 00007f50a03dbda8
RDX: 00007f50a0148748 RSI: ffffffffffffff88 RDI: 0000000000000000
RBP: 00007ffec9a19b10 R08: 0000000000000000 R09: 0000000000000000
R10: 00007ffec9a197e0 R11: 0000000000000206 R12: 0000000000000004
R13: 0000000000000000 R14: 00007f50a0505680 R15: 00007f50a0507000
 </TASK>