Kerneloops

Similar reports
Problem #744143
Component
kernel Tainted
Last affected version
0:6.13.7-200.fc41
Executable
unknown
First occurrence
2025-03-20
Last occurrence
2025-03-20
Unique reports
1
Quality
-67

Statistics

Operating system Unique / Total count
Fedora 41 1 / 1
Operating system Count
Fedora 41 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.13.7-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
? show_trace_log_lvl
vmlinux 0x1b0
2
? show_trace_log_lvl
vmlinux 0x1b0
3
? show_trace_log_lvl
vmlinux 0x1b0
4
? show_trace_log_lvl
vmlinux 0x1b0
5
? show_trace_log_lvl
vmlinux 0x1b0
6
? show_trace_log_lvl
vmlinux 0x1b0
7
? show_trace_log_lvl
vmlinux 0x1b0
8
? show_trace_log_lvl
vmlinux 0x1b0
9
? show_trace_log_lvl
vmlinux 0x1b0
10
? show_trace_log_lvl
vmlinux 0x1b0
11
? show_trace_log_lvl
vmlinux 0x1b0
12
? show_trace_log_lvl
vmlinux 0x1b0
13
? show_trace_log_lvl
vmlinux 0x1b0
14
? show_trace_log_lvl
vmlinux 0x1b0
15
? show_trace_log_lvl
vmlinux 0x1b0
16
? show_trace_log_lvl
vmlinux 0x1b0
17
? show_trace_log_lvl
vmlinux 0x1b0
18
? show_trace_log_lvl
vmlinux 0x1b0
19
show_trace_log_lvl
vmlinux 0x1b0
20
show_trace_log_lvl
vmlinux 0x1b0
21
show_trace_log_lvl
vmlinux 0x1b0
22
show_trace_log_lvl
vmlinux 0x1b0
23
show_trace_log_lvl
vmlinux 0x1b0
24
show_trace_log_lvl
vmlinux 0x1b0
WARNING: CPU: 0 PID: 0 at arch/x86/kernel/alternative.c:838 apply_returns+0x1bd/0x1d0
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G        W          6.13.7-200.fc41.x86_64 #1
Tainted: [W]=WARN
Hardware name: JGINYUE B550i-GAMING/B550i-GAMING, BIOS 5.17 11/29/2024
RIP: 0010:apply_returns+0x1bd/0x1d0
Code: 80 3d a2 d6 ad 02 00 75 a7 49 89 d8 b9 05 00 00 00 4c 89 fa 48 89 de 48 c7 c7 38 96 e0 92 c6 05 84 d6 ad 02 01 e8 d3 1b 0a 00 <0f> 0b eb 82 e8 ba 43 13 01 e9 5f d5 ee ff 0f 1f 44 00 00 90 90 90
RSP: 0000:ffffffff93803e08 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffffffff912ee702 RCX: ffffffff93967508
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001
RBP: ffffffff9462988c R08: 0000000000000000 R09: 0000000000000005
R10: 000000000019abf0 R11: 0000000000000000 R12: ffffffff93803e20
R13: ffffffff93803e90 R14: ffffffff9466cd20 R15: ffffffff9226d820
FS:  0000000000000000(0000) GS:ffff91831ea00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff9181b2e01000 CR3: 00000006b182c000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ? show_trace_log_lvl+0x1b0/0x2f0
 ? show_trace_log_lvl+0x1b0/0x2f0
 ? alternative_instructions+0x42/0x120
 ? apply_returns+0x1bd/0x1d0
 ? __warn.cold+0x93/0xfa
 ? apply_returns+0x1bd/0x1d0
 ? report_bug+0xff/0x140
 ? console_unlock+0x9d/0x140
 ? handle_bug+0x58/0x90
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __static_call_text_end+0x8410/0x19abf0
 ? kexec_locate_mem_hole+0x12/0x90
 ? apply_returns+0x1bd/0x1d0
 ? apply_returns+0x1bd/0x1d0
 ? kexec_locate_mem_hole+0x12/0x90
 ? kexec_locate_mem_hole+0x21/0x90
 ? kexec_locate_mem_hole+0x17/0x90
 alternative_instructions+0x42/0x120
 arch_cpu_finalize_init+0x61/0xb0
 start_kernel+0x3f5/0x490
 x86_64_start_reservations+0x24/0x30
 x86_64_start_kernel+0xed/0xf0
 common_startup_64+0x13e/0x141
 </TASK>