Kerneloops

Similar reports
Problem #779237
Component
kernel Tainted
Last affected version
0:6.15.5-200.fc42
Executable
unknown
First occurrence
2025-07-19
Last occurrence
2025-07-19
Unique reports
1
Quality
-84

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.15.5-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
__pfx_drm_dropmaster_ioctl
vmlinux 0x10
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
6
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
7
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
8
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
9
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
10
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
11
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
12
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
13
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
14
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
15
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
16
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
17
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
18
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
19
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
20
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
21
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
22
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
23
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
24
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
25
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
26
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
27
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
28
? __pfx_drm_dropmaster_ioctl
vmlinux 0x10
WARNING: CPU: 5 PID: 864 at arch/x86/kernel/cpu/bugs.c:3230 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) vfat fat snd_sof_amd_acp70 snd_sof_amd_acp63 squashfs snd_sof_amd_vangogh snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_sof_xtensa_dsp snd_sof mt7921e mt7921_common snd_hda_codec_realtek(+) amd_atl snd_sof_utils intel_rapl_msr snd_pci_ps intel_rapl_common snd_soc_acpi_amd_match snd_hda_codec_generic mt792x_lib snd_amd_sdw_acpi soundwire_amd mt76_connac_lib snd_hda_scodec_component snd_hda_codec_hdmi soundwire_generic_allocation uvcvideo soundwire_bus btusb mt76 snd_hda_intel edac_mce_amd snd_soc_sdca ee1004 uvc btrtl snd_intel_dspcfg videobuf2_vmalloc snd_soc_core snd_intel_sdw_acpi videobuf2_memops btintel kvm_amd videobuf2_v4l2 snd_hda_codec btbcm mac80211 videobuf2_common snd_compress btmtk ac97_bus videodev snd_hda_core bluetooth snd_pcm_dmaengine libarc4 snd_hwdep snd_rpl_pci_acp6x kvm snd_ctl_led mc snd_acp_pci snd_seq snd_amd_acpi_mach snd_acp_legacy_common cfg80211 snd_seq_device snd_pci_acp6x snd_pci_acp5x asus_nb_wmi snd_pcm irqbypass
 asus_wmi rapl sparse_keymap snd_timer snd_rn_pci_acp3x platform_profile wmi_bmof snd_acp_config snd pcspkr i2c_piix4 snd_soc_acpi snd_pci_acp3x rfkill i2c_smbus k10temp soundcore amd_pmc loop nfnetlink zram lz4hc_compress lz4_compress amdgpu amdxcp i2c_algo_bit drm_ttm_helper ttm drm_exec gpu_sched drm_suballoc_helper nvme drm_panel_backlight_quirks drm_buddy drm_display_helper nvme_core polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 hid_multitouch video sha256_ssse3 sha1_ssse3 nvme_keyring cec sp5100_tco nvme_auth i2c_hid_acpi wmi i2c_hid serio_raw analog gameport joydev i2c_dev fuse
CPU: 5 UID: 0 PID: 864 Comm: (udev-worker) Tainted: P           OE       6.15.5-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: ASUSTeK COMPUTER INC. Vivobook_ASUSLaptop M3500QA_M3500QA/M3500QA, BIOS M3500QA.302 10/09/2021
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d 5c 6a 8c 02 00 74 05 e9 94 5e dc ff 48 c7 c7 b8 b0 02 93 c6 05 47 6a 8c 02 01 e8 06 d7 08 00 <0f> 0b e9 7a 5e dc ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffcf8041d2bb18 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff898fce49cb88 RSI: 0000000000000001 RDI: ffff898fce49cb80
RBP: ffffcf8041d2bb68 R08: 0000000000000000 R09: ffffcf8041d2b9c0
R10: ffffffff93b3bb88 R11: 00000000ffffdfff R12: ffffffffc2f15bc5
R13: ffffffffc04e4010 R14: 00007f1fe2ce3965 R15: 0000000000000000
FS:  00007f1fe3a8b040(0000) GS:ffff899039af0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fed568e33a0 CR3: 00000001043ac000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 warn_thunk_thunk+0x16/0x30
 getvar+0x20/0x70 [wl]
 ? __UNIQUE_ID_vermagic475+0x307f7003e7aa/0x307f7003e7aa [wl]
 wl_module_init+0x23/0xb0 [wl]
 ? do_one_initcall+0x5b/0x300
 ? do_init_module+0x84/0x260
 ? init_module_from_file+0x8a/0xe0
 ? idempotent_init_module+0x114/0x310
 ? __x64_sys_finit_module+0x67/0xc0
 ? do_syscall_64+0x7b/0x160
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_sys_openat2+0xa2/0xe0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? syscall_exit_to_user_mode_prepare+0x17e/0x1f0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? syscall_exit_to_user_mode+0x10/0x210
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_syscall_64+0x87/0x160
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? __seccomp_filter+0x41/0x4e0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? syscall_exit_to_user_mode_prepare+0x17e/0x1f0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? syscall_exit_to_user_mode+0x10/0x210
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_syscall_64+0x87/0x160
 ? exc_page_fault+0x7e/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>