Kerneloops

Similar reports
Problem #745738
Component
kernel Tainted
Last affected version
0:6.13.12-200.fc41
Executable
unknown
First occurrence
2025-04-18
Last occurrence
2025-04-25
Unique reports
2
Quality
-72

Statistics

Operating system Unique / Total count
Fedora 41 2 / 2
Operating system Count
Fedora 41 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:6.13.12-200.fc41 1
 0:6.13.11-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
apply_microcode_amd
vmlinux 0x67
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? apply_microcode_amd
vmlinux 0x67
6
? apply_microcode_amd
vmlinux 0x67
7
? apply_microcode_amd
vmlinux 0x67
8
? apply_microcode_amd
vmlinux 0x67
9
? apply_microcode_amd
vmlinux 0x67
10
? apply_microcode_amd
vmlinux 0x67
11
? apply_microcode_amd
vmlinux 0x67
12
? apply_microcode_amd
vmlinux 0x67
13
? apply_microcode_amd
vmlinux 0x67
14
? apply_microcode_amd
vmlinux 0x67
15
? apply_microcode_amd
vmlinux 0x67
16
? apply_microcode_amd
vmlinux 0x67
17
? apply_microcode_amd
vmlinux 0x67
18
? apply_microcode_amd
vmlinux 0x67
19
? apply_microcode_amd
vmlinux 0x67
20
? apply_microcode_amd
vmlinux 0x67
21
? apply_microcode_amd
vmlinux 0x67
22
? apply_microcode_amd
vmlinux 0x67
23
? apply_microcode_amd
vmlinux 0x67
24
? apply_microcode_amd
vmlinux 0x67
WARNING: CPU: 1 PID: 4195 at arch/x86/kernel/cpu/bugs.c:3070 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) cfg80211 rfcomm bnep uinput snd_seq_dummy snd_hrtimer nft_masq nft_reject_ipv4 act_csum cls_u32 sch_htb nf_nat_tftp nf_conntrack_tftp bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security nf_tables ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables qrtr sunrpc binfmt_misc snd_hda_codec_idt snd_hda_codec_hdmi snd_hda_codec_generic snd_hda_intel snd_intel_dspcfg intel_rapl_msr intel_rapl_common snd_intel_sdw_acpi x86_pkg_temp_thermal intel_powerclamp snd_hda_codec coretemp btusb btrtl kvm_intel btintel btbcm snd_hda_core btmtk dell_pc platform_profile dell_rbtn dell_laptop dell_smm_hwmon mei_pxp at24 bluetooth snd_hwdep mei_hdcp
 mei_wdt iTCO_wdt ppdev intel_pmc_bxt iTCO_vendor_support kvm snd_seq pktcdvd snd_seq_device rfkill rapl intel_cstate snd_pcm intel_uncore snd_timer mei_me snd dell_wmi sparse_keymap dell_smbios dcdbas e1000e i2c_i801 parport_pc dell_wmi_descriptor dell_smo8800 soundcore i2c_smbus parport pcspkr wmi_bmof mei joydev lpc_ich dm_multipath loop nfnetlink i915 nouveau drm_ttm_helper gpu_sched sdhci_pci drm_gpuvm crct10dif_pclmul drm_exec sdhci_uhs2 crc32_pclmul crc32c_intel mxm_wmi i2c_algo_bit polyval_clmulni sdhci drm_buddy polyval_generic ttm ghash_clmulni_intel sha512_ssse3 sha256_ssse3 drm_display_helper cqhci mmc_core video sha1_ssse3 cec wmi serio_raw scsi_dh_rdac scsi_dh_emc scsi_dh_alua fuse
CPU: 1 UID: 0 PID: 4195 Comm: modprobe Tainted: P           OE      6.13.11-200.fc41.x86_64 #1
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Dell Inc. Latitude E6420/032T9K, BIOS A25 03/06/2018
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d a8 99 ac 02 00 74 05 c3 cc cc cc cc 48 c7 c7 c0 e6 e0 a4 c6 05 93 99 ac 02 01 e8 d6 df 08 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffa6028812f980 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff9a1d79aa1988 RSI: 0000000000000001 RDI: ffff9a1d79aa1980
RBP: ffffa6028812f9d0 R08: 0000000000000000 R09: 6e72757465722064
R10: 7574657220646568 R11: 6b6e756874206e72 R12: ffffffffc22b5be5
R13: ffffa6028812fa18 R14: 000055e3d4547715 R15: ffffa6028812faa8
FS:  00007f7e9a063740(0000) GS:ffff9a1d79a80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1e1d97b010 CR3: 000000010e488004 CR4: 00000000000626f0
Call Trace:
 <TASK>
 warn_thunk_thunk+0x1a/0x30
 getvar+0x20/0x70 [wl]
 ? orc_header+0x15e4/0x15e4 [wl]
 wl_module_init+0x17/0xa0 [wl]
 ? do_one_initcall+0x5b/0x310
 ? do_init_module+0x90/0x260
 ? __do_sys_init_module+0x17a/0x1b0
 ? do_syscall_64+0x82/0x160
 ? post_alloc_hook+0xe1/0x130
 ? get_page_from_freelist+0x1c6/0x660
 ? filemap_read+0x39a/0x410
 ? __alloc_pages_noprof+0x184/0x330
 ? __count_memcg_events+0xc0/0x180
 ? __mod_memcg_lruvec_state+0xdf/0x220
 ? __lruvec_stat_mod_folio+0x83/0xd0
 ? set_ptes.isra.0+0x41/0x90
 ? do_anonymous_page+0x103/0x4a0
 ? __handle_mm_fault+0x39a/0x6f0
 ? __count_memcg_events+0xc0/0x180
 ? count_memcg_events.constprop.0+0x1a/0x30
 ? handle_mm_fault+0x20d/0x330
 ? do_user_addr_fault+0x55a/0x7b0
 ? exc_page_fault+0x7e/0x180
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>