Kerneloops

Similar reports
Problem #763407
Component
kernel Tainted
Last affected version
0:6.15.6-200.fc42
Executable
unknown
First occurrence
2025-07-05
Last occurrence
2025-07-21
Unique reports
2
Quality
-50

Statistics

Operating system Unique / Total count
Fedora 42 2 / 4
Operating system Count
Fedora 42 4
Architecture Count
x86_64 4
Related packages Count
kernel-core 4
 0:6.15.3-200.fc42 3
 0:6.15.6-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
security_file_permission
vmlinux 0x50
2
security_file_permission
vmlinux 0x50
3
security_file_permission
vmlinux 0x50
4
security_file_permission
vmlinux 0x50
5
security_file_permission
vmlinux 0x50
6
security_file_permission
vmlinux 0x50
7
security_file_permission
vmlinux 0x50
8
security_file_permission
vmlinux 0x50
9
security_file_permission
vmlinux 0x50
10
security_file_permission
vmlinux 0x50
11
security_file_permission
vmlinux 0x50
12
? security_file_permission
vmlinux 0x50
13
? security_file_permission
vmlinux 0x50
14
? security_file_permission
vmlinux 0x50
15
? security_file_permission
vmlinux 0x50
16
? security_file_permission
vmlinux 0x50
17
? security_file_permission
vmlinux 0x50
18
? security_file_permission
vmlinux 0x50
19
? security_file_permission
vmlinux 0x50
20
security_file_permission
vmlinux 0x50
WARNING: CPU: 0 PID: 116731 at drivers/iommu/amd/init.c:917 enable_iommus_vapic+0x399/0x640
Modules linked in: uinput xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set xt_addrtype snd_seq_dummy snd_hrtimer nvidia_drm(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) overlay rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security nf_tables nvidia_modeset(OE) ip6table_filter ip6_tables iptable_filter ip_tables nvidia_uvm(OE) snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg nvidia(OE) qrtr snd_intel_sdw_acpi snd_hda_codec r8169 spd5118 drm_ttm_helper snd_hda_core i2c_piix4 snd_seq snd_usb_audio snd_usbmidi_lib snd_hwdep mc snd_ump snd_rawmidi snd_seq_device snd_pcm ttm joydev snd_timer sunrpc amd_atl intel_rapl_msr intel_rapl_common realtek
 i2c_smbus edac_mce_amd kvm_amd snd pcspkr gpio_amdpt wmi_bmof kvm irqbypass rapl binfmt_misc gpio_generic vfat fat k10temp soundcore squashfs loop nfnetlink zram lz4hc_compress lz4_compress polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 sp5100_tco video wmi i2c_dev fuse
CPU: 0 UID: 0 PID: 116731 Comm: systemd-sleep Tainted: G           OE       6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: BIOSTAR Group B650MT/B650MT, BIOS 5.35 08/06/2024
RIP: 0010:enable_iommus_vapic+0x399/0x640
Code: b8 00 00 00 48 85 c0 0f 85 8e 01 00 00 e9 bc 00 00 00 48 8b 45 38 48 8b 40 18 48 8b 4d 38 4c 09 f8 48 89 41 18 e9 bb fe ff ff <0f> 0b e9 09 fd ff ff 48 89 df f7 c3 ff 0f 00 00 0f 85 11 ff ff ff
RSP: 0018:ffffd401819f3c58 EFLAGS: 00010046
RAX: 0000001c0b6512e2 RBX: 00000000001e8480 RCX: 0000000000000000
RDX: 000000000000ae12 RSI: 000000000000a3c5 RDI: 0000001c0b6464d0
RBP: ffff8bf18038f800 R08: 0000000000000027 R09: ffff8bf4de2d5280
R10: 0000000000000004 R11: ffffffff8e1c88c0 R12: 0000000080000000
R13: 000ffffffffffff8 R14: 0800000000000000 R15: 2000000000000000
FS:  00007f9c992b9040(0000) GS:ffff8bf53fc71000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f87b5a429b6 CR3: 000000010de7f000 CR4: 0000000000f50ef0
PKRU: 00000000
Call Trace:
 <TASK>
 amd_iommu_enable_interrupts+0xd3/0x230
 syscore_resume+0x4a/0x180
 suspend_enter+0x24b/0x360
 suspend_devices_and_enter+0x19f/0x2b0
 enter_state+0x201/0x530
 pm_suspend+0x43/0x80
 state_store+0x2e/0x60
 kernfs_fop_write_iter+0x135/0x1f0
 vfs_write+0x28b/0x470
 ksys_write+0x73/0xe0
 do_syscall_64+0x7b/0x160
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? handle_mm_fault+0x243/0x360
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_user_addr_fault+0x21a/0x690
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? exc_page_fault+0x7e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f9c9947ba06
Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
RSP: 002b:00007ffe9eefc990 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f9c9947ba06
RDX: 0000000000000004 RSI: 00005644d82cb0b0 RDI: 0000000000000007
RBP: 00007ffe9eefc9b0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000004
R13: 00005644d82cb0b0 R14: 00005644d82bf2c0 R15: 00007ffe9eefcb40
 </TASK>