Kerneloops

Similar reports
Problem #761210
Component
kernel Tainted
Last affected version
0:6.13.12-200.fc41
Executable
unknown
First occurrence
2025-04-21
Last occurrence
2025-04-25
Unique reports
2
Quality
-39

Statistics

Operating system Unique / Total count
Fedora 41 2 / 2
Operating system Count
Fedora 41 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:6.13.12-200.fc41 1
 0:6.13.11-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
apply_microcode_amd
vmlinux 0x67
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? apply_microcode_amd
vmlinux 0x67
6
? apply_microcode_amd
vmlinux 0x67
7
? apply_microcode_amd
vmlinux 0x67
8
? apply_microcode_amd
vmlinux 0x67
9
? apply_microcode_amd
vmlinux 0x67
10
? apply_microcode_amd
vmlinux 0x67
11
? apply_microcode_amd
vmlinux 0x67
12
? apply_microcode_amd
vmlinux 0x67
13
? apply_microcode_amd
vmlinux 0x67
WARNING: CPU: 8 PID: 765 at arch/x86/kernel/cpu/bugs.c:3070 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) snd_sof_intel_hda_common(+) mac80211(+) snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus libarc4 snd_soc_sdca snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec_realtek(+) snd_soc_core snd_hda_codec_generic snd_compress snd_hda_scodec_component snd_hda_codec_hdmi ac97_bus snd_usb_audio snd_pcm_dmaengine snd_hda_intel btusb snd_intel_dspcfg btrtl btintel snd_intel_sdw_acpi kvm_intel(+) snd_hda_codec iwlwifi spi_nor snd_usbmidi_lib snd_ump snd_hda_core iTCO_wdt btbcm intel_pmc_bxt snd_rawmidi btmtk snd_hwdep mei_hdcp mei_pxp iTCO_vendor_support ee1004 mtd kvm snd_seq uvcvideo cfg80211 bluetooth snd_seq_device snd_pcm rapl rtsx_usb_ms uvc asus_wmi r8169 videobuf2_vmalloc snd_timer videobuf2_memops sparse_keymap memstick intel_cstate intel_uncore platform_profile wmi_bmof videobuf2_v4l2 pcspkr
 i2c_i801 snd spi_intel_pci drm_ttm_helper mei_me videobuf2_common realtek spi_intel i2c_smbus mei ttm idma64 soundcore rfkill razermouse(OE+) intel_pch_thermal acpi_tad acpi_pad joydev v4l2loopback(OE) videodev mc loop nfnetlink zram lz4hc_compress lz4_compress rtsx_usb_sdmmc mmc_core rtsx_usb crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel nvme hid_multitouch sha512_ssse3 ucsi_acpi sha256_ssse3 typec_ucsi nvme_core sha1_ssse3 i2c_hid_acpi typec nvme_auth i2c_hid video wmi pinctrl_cannonlake serio_raw fuse i2c_dev
CPU: 8 UID: 0 PID: 765 Comm: (udev-worker) Tainted: P           OE      6.13.11-200.fc41.x86_64 #1
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: MONSTER TULPAR T7 V20.3/TULPAR T7 V20.3, BIOS N.1.09MON07 03/26/2021
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d a8 99 ac 02 00 74 05 c3 cc cc cc cc 48 c7 c7 c0 e6 e0 b5 c6 05 93 99 ac 02 01 e8 d6 df 08 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffa644c08f7ca0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff96044fc21988 RSI: 0000000000000001 RDI: ffff96044fc21980
RBP: ffffa644c08f7cf0 R08: 0000000000000000 R09: 6e72757465722064
R10: 7574657220646568 R11: 6b6e756874206e72 R12: ffffffffc2051be5
R13: ffffa644c08f7d38 R14: 00007f94a4aaf3bd R15: ffffa644c08f7dc8
FS:  00007f94a50c8bc0(0000) GS:ffff96044fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000557dc1ab4000 CR3: 00000001094bc001 CR4: 00000000007706f0
PKRU: 55555554
Call Trace:
 <TASK>
 warn_thunk_thunk+0x1a/0x30
 getvar+0x20/0x70 [wl]
 ? orc_header+0x15e4/0x15e4 [wl]
 wl_module_init+0x17/0xa0 [wl]
 ? do_one_initcall+0x58/0x310
 ? do_init_module+0x90/0x260
 ? __do_sys_init_module+0x17a/0x1b0
 ? do_syscall_64+0x82/0x160
 ? do_user_addr_fault+0x55a/0x7b0
 ? clear_bhb_loop+0x25/0x80
 ? clear_bhb_loop+0x25/0x80
 ? clear_bhb_loop+0x25/0x80
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>