| Operating system | Unique / Total count |
|---|---|
| Fedora 42 | 1 / 1 |
| Operating system | Count |
|---|---|
| Fedora 42 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel-core | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 days.
No reports in the last 20 weeks.
WARNING: CPU: 0 PID: 1768 at drivers/dma-buf/dma-fence.c:538 dma_fence_release+0xe5/0x160 Modules linked in: snd_seq_dummy snd_hrtimer rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nf_log_syslog nft_log nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables qrtr sunrpc snd_seq_midi snd_seq_midi_event binfmt_misc snd_ens1371 snd_ac97_codec gameport snd_rawmidi ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd intel_rapl_msr intel_rapl_common vmw_balloon pktcdvd soundcore vmxnet3 i2c_piix4 pcspkr i2c_smbus joydev loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vmw_vmci zram lz4hc_compress lz4_compress dm_crypt polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 nvme vmwgfx sha256_ssse3 nvme_core sha1_ssse3 drm_ttm_helper nvme_keyring ttm nvme_auth serio_raw ata_generic pata_acpi fuse i2c_dev CPU: 0 UID: 964 PID: 1768 Comm: kwin_wayland Tainted: G W 6.15.4-200.fc42.x86_64 #1 PREEMPT(lazy) Tainted: [W]=WARN Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 RIP: 0010:dma_fence_release+0xe5/0x160 Code: 89 c6 48 8b 43 d0 48 8b 40 08 e8 76 7a 56 00 4c 8b 44 24 08 48 8b 0c 24 4c 89 f2 48 89 c6 48 c7 c7 a0 24 ad 98 e8 8b 86 41 ff <0f> 0b 48 8b 7b c8 e8 a0 5f 56 00 c7 43 04 dd ff ff ff 49 89 c6 e8 RSP: 0018:ffffcc0603327cb8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff8a4996cc7df0 RCX: 0000000000000027 RDX: ffff8a49f3e1cb88 RSI: 0000000000000001 RDI: ffff8a49f3e1cb80 RBP: ffff8a4996cc7db8 R08: 0000000000000000 R09: ffffcc0603327b60 R10: ffff8a49f3d3ffa8 R11: 00000000ffff7fff R12: ffff8a48c2a1fc00 R13: ffff8a48c14cbe20 R14: ffffffffc05c2a8f R15: 0000000000000000 FS: 00007fc188f57300(0000) GS:ffff8a4a59a71000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc162bde240 CR3: 000000016c269000 CR4: 0000000000350ef0 Call Trace: <TASK> sync_file_release+0x6c/0xa0 __fput+0xe6/0x2a0 __x64_sys_close+0x3d/0x80 do_syscall_64+0x7b/0x160 ? srso_return_thunk+0x5/0x5f ? srso_return_thunk+0x5/0x5f ? drm_ioctl+0x2e4/0x540 ? __pfx_vmw_fence_obj_unref_ioctl+0x10/0x10 [vmwgfx] ? __pfx_drm_ioctl+0x10/0x10 ? srso_return_thunk+0x5/0x5f ? vmw_generic_ioctl+0xab/0x160 [vmwgfx] ? srso_return_thunk+0x5/0x5f ? __x64_sys_ioctl+0x56/0xc0 ? srso_return_thunk+0x5/0x5f ? syscall_exit_to_user_mode+0x10/0x210 ? srso_return_thunk+0x5/0x5f ? do_syscall_64+0x87/0x160 ? srso_return_thunk+0x5/0x5f ? exc_page_fault+0x7e/0x1a0 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fc18ec876c2 Code: 08 0f 85 81 42 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 <c3> 66 2e 0f 1f 84 00 00 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 66 RSP: 002b:00007fffb805f2e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 000055a3286f69b0 RCX: 00007fc18ec876c2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000049 RBP: 00007fffb805f320 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000055a32893c278 R13: 000055a32893c270 R14: 0000000000000001 R15: 00007fffb805f640 </TASK>