Kerneloops

Similar reports
Problem #819596
Component
kernel Tainted
Last affected version
0:6.18.9-100.fc42
Executable
unknown
First occurrence
2026-02-21
Last occurrence
2026-02-21
Unique reports
1
Quality
-52

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.18.9-100.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
ptrace_stop
vmlinux 0x1be
2
ptrace_stop
vmlinux 0x1be
3
ptrace_stop
vmlinux 0x1be
4
ptrace_stop
vmlinux 0x1be
5
ptrace_stop
vmlinux 0x1be
6
? ptrace_stop
vmlinux 0x1be
7
? ptrace_stop
vmlinux 0x1be
8
? ptrace_stop
vmlinux 0x1be
9
? ptrace_stop
vmlinux 0x1be
10
? ptrace_stop
vmlinux 0x1be
11
? ptrace_stop
vmlinux 0x1be
12
? ptrace_stop
vmlinux 0x1be
13
? ptrace_stop
vmlinux 0x1be
14
? ptrace_stop
vmlinux 0x1be
15
? ptrace_stop
vmlinux 0x1be
16
? ptrace_stop
vmlinux 0x1be
17
? ptrace_stop
vmlinux 0x1be
18
? ptrace_stop
vmlinux 0x1be
19
ptrace_stop
vmlinux 0x1be
WARNING: CPU: 4 PID: 14856 at kernel/signal.c:373 task_participate_group_stop+0x62/0xd0
Modules linked in: uinput rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables qrtr binfmt_misc bnep sunrpc snd_hda_codec_intelhdmi snd_hda_codec_alc269 snd_hda_scodec_component snd_hda_codec_realtek_lib snd_hda_codec_generic snd_hda_intel snd_sof_pci_intel_tgl snd_sof_pci_intel_cnl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi crc8 soundwire_bus snd_soc_sdca snd_soc_avs snd_soc_hda_codec vfat intel_uncore_frequency snd_hda_ext_core intel_uncore_frequency_common fat iwlmvm snd_hda_codec intel_tcc_cooling
 x86_pkg_temp_thermal snd_hda_core intel_powerclamp snd_intel_dspcfg squashfs snd_intel_sdw_acpi coretemp mac80211 snd_hwdep snd_soc_core kvm_intel snd_compress spi_nor iTCO_wdt libarc4 ac97_bus intel_pmc_bxt kvm mei_hdcp mei_pxp mtd uvcvideo processor_thermal_device_pci snd_pcm_dmaengine iTCO_vendor_support intel_rapl_msr btusb snd_ctl_led uvc processor_thermal_device snd_seq irqbypass btmtk videobuf2_vmalloc processor_thermal_wt_hint rapl snd_seq_device btrtl videobuf2_memops platform_temperature_control iwlwifi asus_nb_wmi videobuf2_v4l2 snd_pcm intel_cstate processor_thermal_soc_slider btbcm asus_wmi processor_thermal_rfim videobuf2_common snd_timer btintel sparse_keymap processor_thermal_rapl intel_uncore pcspkr snd videodev spi_intel_pci cfg80211 mei_me bluetooth intel_rapl_common platform_profile i2c_i801 wmi_bmof soundcore spi_intel mei mc idma64 processor_thermal_wt_req i2c_smbus rfkill intel_pmc_core processor_thermal_power_floor processor_thermal_mbox pmt_telemetry pmt_discovery int3403_thermal
 pmt_class int340x_thermal_zone int3400_thermal acpi_pad intel_pmc_ssram_telemetry acpi_thermal_rel acpi_tad joydev loop nfnetlink zram lz4hc_compress lz4_compress dm_crypt xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm_helper i915 nvme nvme_core nvme_keyring nvme_auth hkdf i2c_algo_bit drm_buddy ttm drm_display_helper video polyval_clmulni hid_multitouch ghash_clmulni_intel intel_vsec vmd cec i2c_hid_acpi i2c_hid wmi pinctrl_tigerlake serio_raw tls i2c_dev fuse
CPU: 4 UID: 1000 PID: 14856 Comm: flatpak-spawn Tainted: G     U              6.18.9-100.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [U]=USER
Hardware name: ASUSTeK COMPUTER INC. Vivobook_ASUSLaptop X1404VA_X1404VA/X1404VA, BIOS X1404VA.309 10/30/2024
RIP: 0010:task_participate_group_stop+0x62/0xd0
Code: f8 ff 48 89 8f 78 0a 00 00 a9 00 00 04 00 74 0f 8b 42 70 85 c0 74 13 83 e8 01 89 42 70 74 0d 31 c0 48 83 c4 10 c3 cc cc cc cc <0f> 0b 8b 42 74 a8 01 75 ec a8 04 75 5a 83 e0 cc 83 c8 01 89 42 74
RSP: 0018:ffffd4d04f027b48 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff8d1d48e42a80 RCX: 0000000008080013
RDX: ffff8d1b4db08d80 RSI: 0000000000000046 RDI: ffff8d1d48e42a80
RBP: 0000000000000005 R08: ffff8d1a4a492000 R09: 0000000080080005
R10: ffff8d1a4a492000 R11: fffff51ec4292400 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ffff8d1d48e42a80
FS:  0000000000000000(0000) GS:ffff8d1e0ba26000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005622d0baf000 CR3: 00000003fd163006 CR4: 0000000000f72ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ptrace_stop+0x1be/0x2d0
 get_signal+0x603/0x7e0
 arch_do_signal_or_restart+0x3a/0x1e0
 exit_to_user_mode_loop+0x8a/0x170
 do_syscall_64+0x1a2/0x7f0
 ? do_read_fault+0x107/0x260
 ? handle_pte_fault+0x118/0x230
 ? do_fault+0x16b/0x260
 ? __handle_mm_fault+0x551/0x6a0
 ? set_close_on_exec+0x33/0x70
 ? do_fcntl+0x446/0x6c0
 ? __seccomp_filter+0x52/0x380
 ? flush_tlb_func+0x265/0x300
 ? __pfx_flush_tlb_func+0x10/0x10
 ? sched_clock+0x10/0x30
 ? sched_clock_cpu+0xb/0x30
 ? irqtime_account_irq+0x3c/0xc0
 ? irqentry_exit_to_user_mode+0x2c/0x1c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f2ab58a2ac0
Code: Unable to access opcode bytes at 0x7f2ab58a2a96.
RSP: 002b:00007ffe7cae2b50 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>