Kerneloops

Similar reports
Problem #816243
Component
kernel Tainted
Last affected version
0:6.17.8-200.fc42
Executable
unknown
First occurrence
2025-11-25
Last occurrence
2025-11-25
Unique reports
1
Quality
-31

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.17.8-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
drm_gem_object_release_handle
vmlinux 0x59
2
drm_gem_object_release_handle
vmlinux 0x59
3
? drm_gem_object_release_handle
vmlinux 0x59
4
drm_gem_object_release_handle
vmlinux 0x59
5
drm_gem_object_release_handle
vmlinux 0x59
6
? drm_gem_object_release_handle
vmlinux 0x59
7
drm_gem_object_release_handle
vmlinux 0x59
8
? drm_gem_object_release_handle
vmlinux 0x59
9
? drm_gem_object_release_handle
vmlinux 0x59
10
drm_gem_object_release_handle
vmlinux 0x59
11
? drm_gem_object_release_handle
vmlinux 0x59
12
drm_gem_object_release_handle
vmlinux 0x59
BUG: workqueue leaked atomic, lock or RCU: kworker/28:2[23588]
     preempt=0x7fffffff lock=0->0 RCU=0->0 workfn=cfids_invalidation_worker [cifs]
 __schedule_bug.cold+0x42/0x4e
 __schedule+0x632/0x7b0
 ? pwq_dec_nr_in_flight+0x297/0x340
 schedule+0x27/0x80
 worker_thread+0x1aa/0x3a0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xf9/0x240
 ? __pfx_kthread+0x10/0x10
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0xf1/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 </TASK>
CPU: 19 UID: 0 PID: 311 Comm: kworker/19:1 Tainted: G           OE       6.17.8-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Micro-Star International Co., Ltd. MS-7E49/MPG X870E CARBON WIFI (MS-7E49), BIOS 1.A63 08/12/2025
Workqueue:  0x0 (cfid_put_wq)
Call Trace: