Kerneloops

Similar reports
Problem #747621
Component
kernel Tainted
Last affected version
0:6.13.9-200.fc41
Executable
unknown
First occurrence
2025-04-17
Last occurrence
2025-04-17
Unique reports
1
Quality
-46

Statistics

Operating system Unique / Total count
Fedora 41 1 / 1
Operating system Count
Fedora 41 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.13.9-200.fc41 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
? srso_alias_return_thunk
vmlinux 0x5
2
? srso_alias_return_thunk
vmlinux 0x5
3
? srso_alias_return_thunk
vmlinux 0x5
4
? srso_alias_return_thunk
vmlinux 0x5
5
? srso_alias_return_thunk
vmlinux 0x5
6
? srso_alias_return_thunk
vmlinux 0x5
7
? srso_alias_return_thunk
vmlinux 0x5
8
? srso_alias_return_thunk
vmlinux 0x5
9
? srso_alias_return_thunk
vmlinux 0x5
10
? srso_alias_return_thunk
vmlinux 0x5
11
? srso_alias_return_thunk
vmlinux 0x5
12
? srso_alias_return_thunk
vmlinux 0x5
13
? srso_alias_return_thunk
vmlinux 0x5
14
srso_alias_return_thunk
vmlinux 0x5
15
srso_alias_return_thunk
vmlinux 0x5
WARNING: CPU: 0 PID: 117 at kernel/exit.c:885 do_exit+0x468/0x4a0
Modules linked in: exfat uinput rfcomm snd_seq_dummy snd_hrtimer wireguard curve25519_x86_64 libcurve25519_generic ip6_udp_tunnel udp_tunnel xt_nat veth xt_conntrack xt_MASQUERADE bridge stp llc nf_conntrack_netlink xt_addrtype nft_compat overlay nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib ip_set vboxnetadp(OE) vboxnetflt(OE) qrtr vboxdrv(OE) uhid bnep sunrpc binfmt_misc vfat fat rtw89_8852ce rtw89_8852c rtw89_pci snd_hda_codec_realtek snd_hda_codec_generic rtw89_core snd_hda_codec_hdmi snd_hda_scodec_component snd_hda_intel btusb snd_intel_dspcfg btrtl mac80211 snd_intel_sdw_acpi snd_usb_audio uvcvideo snd_hda_codec amd_atl btintel intel_rapl_msr uvc snd_usbmidi_lib intel_rapl_common videobuf2_vmalloc btbcm snd_hda_core snd_ump btmtk videobuf2_memops libarc4 videobuf2_v4l2 snd_hwdep joydev bluetooth videobuf2_common snd_rawmidi edac_mce_amd snd_seq cfg80211 snd_seq_device snd_pcm kvm_amd snd_timer rfkill i2c_piix4 kvm snd r8169 gigabyte_wmi wmi_bmof rapl
 k10temp soundcore i2c_smbus realtek pcspkr nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_masq nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables v4l2loopback(OE) videodev mc loop nfnetlink zram lz4hc_compress lz4_compress ums_realtek uas hid_logitech_hidpp usb_storage amdgpu amdxcp i2c_algo_bit drm_ttm_helper ttm drm_exec crct10dif_pclmul gpu_sched crc32_pclmul crc32c_intel drm_suballoc_helper polyval_clmulni nvme drm_panel_backlight_quirks drm_buddy polyval_generic ghash_clmulni_intel drm_display_helper sha512_ssse3 sha256_ssse3 sha1_ssse3 nvme_core sp5100_tco cec nvme_auth video wmi hid_logitech_dj fuse i2c_dev
CPU: 0 UID: 0 PID: 117 Comm: kswapd0 Tainted: G      D    OE      6.13.9-200.fc41.x86_64 #1
Tainted: [D]=DIE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Gigabyte Technology Co., Ltd. B650 EAGLE AX/B650 EAGLE AX, BIOS F4 04/10/2024
RIP: 0010:do_exit+0x468/0x4a0
Code: fc ff ff 48 89 87 60 02 00 00 e9 90 fd ff ff e8 be a4 2b 00 e9 a6 fe ff ff e8 94 e6 34 00 e9 4d fe ff ff 0f 0b e9 d3 fb ff ff <0f> 0b e9 08 fc ff ff 4c 89 e6 bf 05 06 00 00 e8 94 1b 01 00 e9 88
RSP: 0018:ffffb1c28069fef8 EFLAGS: 00010286
RAX: 0000000400000000 RBX: ffff951e026db040 RCX: 0000000000000027
RDX: 0000000000000001 RSI: 0000000000002710 RDI: ffff951e01304a40
RBP: ffff951e0130d100 R08: 0000000000000000 R09: 6874697720646574
R10: 5b3064706177736b R11: 736b203a65746f6e R12: 000000000000000b
R13: ffff951e01304a40 R14: 09be8e1e00104dc4 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff95251e200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1df9dc7000 CR3: 000000071d82c000 CR4: 0000000000f50ef0
PKRU: 55555554
Call Trace:
 <TASK>
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? show_trace_log_lvl+0x255/0x2f0
 ? show_trace_log_lvl+0x255/0x2f0
 ? make_task_dead+0x88/0x90
 ? do_exit+0x468/0x4a0
 ? __warn.cold+0x93/0xfa
 ? do_exit+0x468/0x4a0
 ? report_bug+0xff/0x140
 ? handle_bug+0x58/0x90
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? do_exit+0x468/0x4a0
 ? do_exit+0x69/0x4a0
 make_task_dead+0x88/0x90
 rewind_stack_and_make_dead+0x16/0x20
RIP: 0000:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>