Kerneloops

Similar reports
Problem #756248
Component
kernel Tainted
Last affected version
0:6.14.9-200.fc41
Executable
unknown
First occurrence
2025-05-06
Last occurrence
2025-06-06
Unique reports
2
Quality
-48

Statistics

Operating system Unique / Total count
Fedora 41 2 / 2
Operating system Count
Fedora 41 2
Architecture Count
x86_64 2
Related packages Count
kernel-core 2
 0:6.14.9-200.fc41 1
 0:6.14.5-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
kernfs_fop_write_iter
vmlinux 0x13b
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? kernfs_fop_write_iter
vmlinux 0x13b
6
? kernfs_fop_write_iter
vmlinux 0x13b
7
? kernfs_fop_write_iter
vmlinux 0x13b
8
? kernfs_fop_write_iter
vmlinux 0x13b
9
? kernfs_fop_write_iter
vmlinux 0x13b
10
? kernfs_fop_write_iter
vmlinux 0x13b
11
? kernfs_fop_write_iter
vmlinux 0x13b
12
? kernfs_fop_write_iter
vmlinux 0x13b
13
? kernfs_fop_write_iter
vmlinux 0x13b
14
? kernfs_fop_write_iter
vmlinux 0x13b
15
? kernfs_fop_write_iter
vmlinux 0x13b
16
? kernfs_fop_write_iter
vmlinux 0x13b
WARNING: CPU: 0 PID: 3363 at arch/x86/kernel/cpu/bugs.c:3074 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) cfg80211 xt_conntrack xt_MASQUERADE bridge stp llc xt_set xt_addrtype nft_compat overlay nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables qrtr sunrpc binfmt_misc vfat fat squashfs snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_soc_core intel_rapl_msr intel_rapl_common snd_hda_codec_realtek snd_compress intel_uncore_frequency intel_uncore_frequency_common ac97_bus snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec intel_tcc_cooling snd_usb_audio snd_hda_core x86_pkg_temp_thermal intel_powerclamp snd_seq coretemp rapl ee1004 snd_usbmidi_lib mei_pxp snd_hwdep iTCO_wdt mei_hdcp intel_pmc_bxt mc snd_ump joydev iTCO_vendor_support snd_rawmidi snd_seq_device intel_cstate snd_pcm i2c_i801
 mei_me e1000e intel_uncore intel_wmi_thunderbolt snd_timer i2c_smbus snd soundcore mei intel_pmc_core pmt_telemetry pmt_class intel_vsec acpi_pad loop nfnetlink zram lz4hc_compress lz4_compress amdgpu amdxcp i2c_algo_bit drm_ttm_helper ttm nvme drm_exec gpu_sched drm_suballoc_helper drm_panel_backlight_quirks drm_buddy polyval_clmulni polyval_generic nvme_core ghash_clmulni_intel sha512_ssse3 drm_display_helper sha256_ssse3 sha1_ssse3 nvme_auth cec video wmi fuse
CPU: 0 UID: 0 PID: 3363 Comm: modprobe Tainted: P           OE      6.14.5-200.fc41.x86_64 #1
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z370 Pro4, BIOS P4.30 10/31/2019
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d fa e3 8c 02 00 74 05 c3 cc cc cc cc 48 c7 c7 08 fe e1 a0 c6 05 e5 e3 8c 02 01 e8 c6 dc 08 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffc239c513fba0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff9db79ea21948 RSI: 0000000000000001 RDI: ffff9db79ea21940
RBP: ffffc239c513fbf0 R08: 0000000000000000 R09: 6820746f6e20646c
R10: 746f6e20646c756f R11: 216e657070616820 R12: ffffffffc2c39c05
R13: ffffc239c513fc38 R14: ffff9db449638900 R15: ffff9db4dd45e248
FS:  00007f2ad23c1740(0000) GS:ffff9db79ea00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2ad23bb9e5 CR3: 0000000165284005 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 warn_thunk_thunk+0x1a/0x30
 getvar+0x20/0x70 [wl]
 ? orc_header+0x15c4/0x15c4 [wl]
 wl_module_init+0x17/0xa0 [wl]
 ? do_one_initcall+0x58/0x310
 ? do_init_module+0x90/0x260
 ? init_module_from_file+0x89/0xe0
 ? idempotent_init_module+0x115/0x310
 ? __x64_sys_finit_module+0x65/0xc0
 ? do_syscall_64+0x82/0x160
 ? alloc_fd+0xba/0x110
 ? do_sys_openat2+0x9c/0xe0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x8e/0x160
 ? exc_page_fault+0x7e/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>