Kerneloops

Similar reports
Problem #751499
Component
kernel Tainted
Last affected version
0:6.14.9-300.fc42
Executable
unknown
First occurrence
2025-06-06
Last occurrence
2025-06-09
Unique reports
3
Quality
-72

Statistics

Operating system Unique / Total count
Fedora 42 3 / 3
Operating system Count
Fedora 42 3
Architecture Count
x86_64 3
Related packages Count
kernel-core 3
 0:6.14.9-300.fc42 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
warn_thunk_thunk
vmlinux 0x1a
2
getvar
wl 0x20
3
? getvar
wl 0x20
4
getvar
wl 0x20
5
? warn_thunk_thunk
vmlinux 0x1a
6
? warn_thunk_thunk
vmlinux 0x1a
7
? warn_thunk_thunk
vmlinux 0x1a
8
? warn_thunk_thunk
vmlinux 0x1a
9
? warn_thunk_thunk
vmlinux 0x1a
10
? warn_thunk_thunk
vmlinux 0x1a
11
? warn_thunk_thunk
vmlinux 0x1a
12
? warn_thunk_thunk
vmlinux 0x1a
13
? warn_thunk_thunk
vmlinux 0x1a
14
? warn_thunk_thunk
vmlinux 0x1a
15
? warn_thunk_thunk
vmlinux 0x1a
16
? warn_thunk_thunk
vmlinux 0x1a
17
? warn_thunk_thunk
vmlinux 0x1a
18
? warn_thunk_thunk
vmlinux 0x1a
19
? warn_thunk_thunk
vmlinux 0x1a
20
? warn_thunk_thunk
vmlinux 0x1a
21
? warn_thunk_thunk
vmlinux 0x1a
22
? warn_thunk_thunk
vmlinux 0x1a
23
? warn_thunk_thunk
vmlinux 0x1a
24
? warn_thunk_thunk
vmlinux 0x1a
WARNING: CPU: 3 PID: 655 at arch/x86/kernel/cpu/bugs.c:3240 __warn_thunk+0x2a/0x40
Modules linked in: wl(POE+) snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic kvm snd_hda_scodec_component snd_usb_audio uvcvideo snd_hda_intel uvc videobuf2_vmalloc videobuf2_memops snd_intel_dspcfg videobuf2_v4l2 snd_intel_sdw_acpi snd_usbmidi_lib videobuf2_common snd_hda_codec irqbypass rapl snd_ump videodev intel_cstate snd_hda_core btusb at24 btrtl iTCO_wdt intel_pmc_bxt mei_pxp iTCO_vendor_support mei_hdcp btintel snd_rawmidi snd_hwdep btbcm mc intel_uncore snd_seq pcspkr btmtk i2c_i801 cfg80211 i2c_smbus snd_seq_device r8169 bluetooth snd_pcm lpc_ich realtek vfat mei_me fat snd_timer rfkill snd mei soundcore pktcdvd joydev loop nfnetlink zram lz4hc_compress lz4_compress i915 polyval_clmulni polyval_generic ghash_clmulni_intel hid_cmedia i2c_algo_bit drm_buddy ttm sha512_ssse3 sha256_ssse3 sha1_ssse3 drm_display_helper cec video wmi serio_raw fuse
CPU: 3 UID: 0 PID: 655 Comm: (udev-worker) Tainted: P           OE      6.14.9-300.fc42.x86_64 #1
Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: SAMSUNG ELECTRONICS CO., LTD. RV420/RV520/RV720/E3530/S3530/E3420/E3520/RV420/RV520/RV720/E3530/S3530/E3420/E3520, BIOS 07PQ 11
RIP: 0010:__warn_thunk+0x2a/0x40
Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d eb 32 8c 02 00 74 05 c3 cc cc cc cc 48 c7 c7 f8 d4 e1 bc c6 05 d6 32 8c 02 01 e8 a6 08 09 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
RSP: 0018:ffffd2f8c05e3a28 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
RDX: ffff8bd81bba1948 RSI: 0000000000000001 RDI: ffff8bd81bba1940
RBP: ffffd2f8c05e3a78 R08: 0000000000000000 R09: ffffd2f8c05e38d0
R10: ffffffffbd9368e8 R11: 00000000ffffdfff R12: ffffffffc1a0db85
R13: ffffffffc1a11010 R14: 00007fdecd950965 R15: 0000000000000000
FS:  00007fdece0b0bc0(0000) GS:ffff8bd81bb80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b8eef5f270 CR3: 0000000109460002 CR4: 00000000000606f0
Call Trace:
 <TASK>
 warn_thunk_thunk+0x1a/0x30
 getvar+0x20/0x70 [wl]
 ? orc_header+0x15dc/0x15dc [wl]
 wl_module_init+0x17/0xa0 [wl]
 ? do_one_initcall+0x5c/0x310
 ? do_init_module+0x84/0x260
 ? init_module_from_file+0x8b/0xe0
 ? idempotent_init_module+0x115/0x310
 ? __x64_sys_finit_module+0x67/0xc0
 ? do_syscall_64+0x7b/0x160
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? vfs_statx+0x7a/0x120
 ? strncpy_from_user+0x24/0x100
 ? vfs_fstatat+0x75/0xa0
 ? __do_sys_newfstatat+0x3d/0x80
 ? syscall_exit_to_user_mode_prepare+0x17e/0x1f0
 ? syscall_exit_to_user_mode+0x10/0x210
 ? do_syscall_64+0x87/0x160
 ? syscall_exit_to_user_mode+0x1d5/0x210
 ? do_syscall_64+0x87/0x160
 ? do_user_addr_fault+0x36c/0x640
 ? exc_page_fault+0x7e/0x1a0
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 </TASK>