Kerneloops

Similar reports
Problem #816911
Component
kernel Tainted
Last affected version
0:6.13.11-200.fc41
Executable
unknown
First occurrence
2025-04-17
Last occurrence
2025-04-17
Unique reports
1
Quality
-84

Statistics

Operating system Unique / Total count
Fedora 41 1 / 1
Operating system Count
Fedora 41 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.13.11-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
apply_microcode_amd
vmlinux 0x67
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? apply_microcode_amd
vmlinux 0x67
6
? apply_microcode_amd
vmlinux 0x67
7
? apply_microcode_amd
vmlinux 0x67
8
? apply_microcode_amd
vmlinux 0x67
9
? apply_microcode_amd
vmlinux 0x67
10
? apply_microcode_amd
vmlinux 0x67
11
? apply_microcode_amd
vmlinux 0x67
12
? apply_microcode_amd
vmlinux 0x67
13
? apply_microcode_amd
vmlinux 0x67
14
? apply_microcode_amd
vmlinux 0x67
15
? apply_microcode_amd
vmlinux 0x67
16
? apply_microcode_amd
vmlinux 0x67
17
? apply_microcode_amd
vmlinux 0x67
18
? apply_microcode_amd
vmlinux 0x67
19
? apply_microcode_amd
vmlinux 0x67
20
? apply_microcode_amd
vmlinux 0x67
21
? apply_microcode_amd
vmlinux 0x67
22
? apply_microcode_amd
vmlinux 0x67
23
? apply_microcode_amd
vmlinux 0x67
24
? apply_microcode_amd
vmlinux 0x67
25
? apply_microcode_amd
vmlinux 0x67
26
? apply_microcode_amd
vmlinux 0x67
27
? apply_microcode_amd
vmlinux 0x67
28
? apply_microcode_amd
vmlinux 0x67
WARNING: CPU: 13 PID: 903 at arch/x86/kernel/cpu/bugs.c:3070 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) snd_sof_amd_acp70 snd_sof_amd_acp63 snd_sof_amd_vangogh snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_sof_xtensa_dsp snd_hda_codec_realtek(+) snd_sof mt7921e snd_hda_codec_generic mt7921_common snd_hda_scodec_component snd_sof_utils snd_pci_ps snd_soc_acpi_amd_match mt792x_lib snd_amd_sdw_acpi soundwire_amd snd_hda_codec_hdmi soundwire_generic_allocation mt76_connac_lib soundwire_bus mt76 snd_hda_intel snd_soc_sdca snd_hda_scodec_cs35l41_spi regmap_spi snd_soc_core snd_intel_dspcfg snd_intel_sdw_acpi snd_compress ac97_bus mac80211 snd_ctl_led snd_hda_codec snd_pcm_dmaengine snd_rpl_pci_acp6x snd_acp_pci snd_hda_core intel_rapl_msr snd_acp_legacy_common spd5118 amd_atl snd_hwdep snd_pci_acp6x snd_seq intel_rapl_common snd_hda_scodec_cs35l41_i2c asus_nb_wmi snd_pci_acp5x snd_seq_device snd_hda_scodec_cs35l41 edac_mce_amd snd_rn_pci_acp3x libarc4 asus_wmi snd_acp_config snd_hda_cs_dsp_ctls snd_pcm sparse_keymap rapl snd_soc_cs_amp_lib wmi_bmof
 snd_soc_acpi snd_soc_cs35l41_lib cfg80211 snd_timer cs_dsp pcspkr snd_pci_acp3x snd thunderbolt i2c_piix4 k10temp i2c_smbus soundcore amd_pmf amdtee serial_multi_instantiate tee platform_profile amd_pmc joydev loop nfnetlink zram lz4hc_compress lz4_compress amdgpu amdxcp i2c_algo_bit drm_ttm_helper ttm drm_exec gpu_sched drm_suballoc_helper nvme crct10dif_pclmul drm_panel_backlight_quirks crc32_pclmul drm_buddy crc32c_intel polyval_clmulni nvme_core polyval_generic drm_display_helper ghash_clmulni_intel sha512_ssse3 video hid_multitouch sha256_ssse3 ucsi_acpi typec_ucsi sha1_ssse3 cec amd_sfh sp5100_tco nvme_auth typec wmi i2c_hid_acpi i2c_hid serio_raw btusb btrtl btintel btbcm btmtk bluetooth rfkill fuse i2c_dev
CPU: 13 UID: 0 PID: 903 Comm: (udev-worker) Tainted: P           OE      6.13.11-200.fc41.x86_64 #1
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: ASUSTeK COMPUTER INC. ASUS Zenbook 14 UM3406HA_UM3406HA/UM3406HA, BIOS UM3406HA.306 10/08/2024
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d a8 99 ac 02 00 74 05 e9 24 71 3d 01 48 c7 c7 c0 e6 e0 bc c6 05 93 99 ac 02 01 e8 d6 df 08 00 <0f> 0b e9 0a 71 3d 01 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffb4b6815d3b30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff9271ae6a1988 RSI: 0000000000000001 RDI: ffff9271ae6a1980
RBP: ffffb4b6815d3b80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000001fff R11: 0000000000000000 R12: ffffffffc2d0cbe5
R13: ffffb4b6815d3bc8 R14: 00007fa5db96f3bd R15: ffffb4b6815d3c58
FS:  00007fa5dc0b4040(0000) GS:ffff9271ae680000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000562ef07e2000 CR3: 000000010b194000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 warn_thunk_thunk+0x1a/0x30
 getvar+0x20/0x70 [wl]
 ? __UNIQUE_ID_vermagic470+0x4b493b62ce7e/0x4b493b62ce7e [wl]
 wl_module_init+0x17/0xa0 [wl]
 ? do_one_initcall+0x58/0x310
 ? do_init_module+0x90/0x260
 ? __do_sys_init_module+0x17a/0x1b0
 ? do_syscall_64+0x82/0x160
 ? __lruvec_stat_mod_folio+0x83/0xd0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? set_ptes.isra.0+0x41/0x90
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_anonymous_page+0x103/0x4a0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? __handle_mm_fault+0x39a/0x6f0
 ? do_syscall_64+0x8e/0x160
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? __count_memcg_events+0xc0/0x180
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? handle_mm_fault+0x20d/0x330
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? do_user_addr_fault+0x55a/0x7b0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? exc_page_fault+0x7e/0x180
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>