Unpatched return thunk in use. This should not happen!

Solution Verified - Updated -

Issue

  • The warning message is displayed as below:
[   28.286186] dsa_filter_hook: loading out-of-tree module taints kernel.
[   28.311219] dsa_filter: module license 'Proprietary' taints kernel.
[   28.311241] Disabling lock debugging due to kernel taint
[   28.311252] dsa_filter: module license taints kernel.
[   28.350807] block dm-0: the capability attribute has been deprecated.
[   28.358309] ------------[ cut here ]------------
[   28.358325] Unpatched return thunk in use. This should not happen!
[   28.358338] WARNING: CPU: 48 PID: 5620 at arch/x86/kernel/cpu/bugs.c:3108 __warn_thunk+0x26/0x30
[   28.358347] Modules linked in: dsa_filter(PO+) dsa_filter_hook(O) bonding tls rfkill vfat fat intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common intel_ifs nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel ipmi_ssif kvm mgag200 i2c_algo_bit pmt_telemetry cxl_acpi rapl isst_if_mmio isst_if_mbox_pci intel_sdsi pmt_class intel_cstate drm_shmem_helper mei_me cxl_port acpi_power_meter ipmi_si ses acpi_ipmi intel_uncore cxl_core ipmi_devintf pcspkr enclosure isst_if_common intel_vsec hpilo drm_kms_helper mei acpi_tad ipmi_msghandler joydev einj fuse drm xfs libcrc32c sd_mod sg qla2xxx nvme_fc nvme_fabrics qat_4xxx qede iaa_crypto(X) nvme_keyring intel_qat crct10dif_pclmul qed nvme_core crc32_pclmul smartpqi idxd crc32c_intel nvme_auth ghash_clmulni_intel scsi_transport_fc scsi_transport_sas idxd_bus wmi hpwdt crc8 dm_mirror dm_region_hash dm_log dm_mod
[   28.358370] CPU: 48 PID: 5620 Comm: insmod Tainted: P           O   X  -------  ---  5.14.0-570.18.1.el9_6.x86_64 #1
[   28.358372] Hardware name: HPE Synergy 480 Gen11/Synergy 480 Gen11 Compute Module, BIOS 2.50 04/22/2025
[   28.358373] RIP: 0010:__warn_thunk+0x26/0x30
[   28.358376] Code: 90 90 90 90 0f 1f 44 00 00 80 3d 3f d4 2f 02 00 74 05 c3 cc cc cc cc 48 c7 c7 58 69 c5 ac c6 05 2a d4 2f 02 01 e8 fa 1d 0c 00 <0f> 0b c3 cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90
[   28.358377] RSP: 0018:ff632aaca0e23c90 EFLAGS: 00010282
[   28.358379] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
[   28.358380] RDX: 0000000000000027 RSI: 00000000fffeffff RDI: ff44c5dfbe4208c8
[   28.358381] RBP: ff632aaca0e23ce0 R08: 0000000000000000 R09: ff632aaca0e23b38
[   28.358382] R10: ff632aaca0e23b30 R11: ff44c5e03fdb3fe8 R12: ff44c5a0d2b39fc0
[   28.358383] R13: 0000560e5e00a962 R14: ff44c5c056b2c978 R15: ffffffffae46dda8
[   28.358384] FS:  00007fca921f3b80(0000) GS:ff44c5dfbe400000(0000) knlGS:0000000000000000
[   28.358385] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   28.358386] CR2: 0000560e5dfffbd0 CR3: 00000020dbb06005 CR4: 0000000000773ef0
[   28.358387] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   28.358388] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[   28.358388] PKRU: 55555554
[   28.358389] Call Trace:
[   28.358390]  <TASK>
[   28.358391]  ? show_trace_log_lvl+0x1c4/0x2df
[   28.358397]  ? show_trace_log_lvl+0x1c4/0x2df
[   28.358399]  ? warn_thunk_thunk+0x16/0x30
[   28.358403]  ? __warn_thunk+0x26/0x30
[   28.358405]  ? __warn+0x7e/0xd0
[   28.358409]  ? __warn_thunk+0x26/0x30
[   28.358411]  ? report_bug+0x100/0x140
[   28.358415]  ? prb_read_valid+0x17/0x20
[   28.358420]  ? handle_bug+0x3c/0x70
[   28.358424]  ? exc_invalid_op+0x14/0x70
[   28.358425]  ? asm_exc_invalid_op+0x16/0x20
[   28.358431]  ? __warn_thunk+0x26/0x30
[   28.358432]  warn_thunk_thunk+0x16/0x30
[   28.358434]  ? do_init_module+0x23/0x230
[   28.358439]  ? __pfx_init_module+0x10/0x10 [dsa_filter]
[   28.358457]  dsa_init+0x15/0xff0 [dsa_filter]
[   28.358474]  ? __pfx_init_module+0x10/0x10 [dsa_filter]
[   28.358490]  do_one_initcall+0x41/0x210
[   28.358494]  do_init_module+0x64/0x230
[   28.358496]  init_module_from_file+0x8b/0xd0
[   28.358499]  idempotent_init_module+0x17e/0x230
[   28.358501]  __x64_sys_finit_module+0x5a/0xb0
[   28.358503]  do_syscall_64+0x5c/0xe0
[   28.358504]  ? exc_page_fault+0x62/0x150
[   28.358508]  entry_SYSCALL_64_after_hwframe+0x78/0x80
[   28.358510] RIP: 0033:0x7fca9170764d
[   28.358512] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9b 17 0f 00 f7 d8 64 89 01 48
[   28.358513] RSP: 002b:00007ffe150e9d78 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[   28.358513] RAX: ffffffffffffffda RBX: 0000560e5e441860 RCX: 00007fca9170764d
[   28.358514] RDX: 0000000000000000 RSI: 0000560e5e00a962 RDI: 0000000000000006
[   28.358515] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   28.358516] R10: 0000000000000006 R11: 0000000000000246 R12: 0000560e5e00a962
[   28.358516] R13: 0000560e5e441810 R14: 0000560e5e009550 R15: 0000560e5e441970
[   28.358518]  </TASK>
[   28.358518] ---[ end trace 0000000000000000 ]---
[   28.358519] dsa: loading filter 12.6.0.5813
[   28.373362] dsa: registered on device 10:119
[   28.373698] dsa: registered on ssl device 10:118
[   28.377469] dsa: filter loaded OK
  • In another system with tracedev 3rd party module.
Jan  5 14:14:12 kernel: ------------[ cut here ]------------
Jan  5 14:14:12 kernel: Unpatched return thunk in use. This should not happen!
Jan  5 14:14:12 kernel: WARNING: CPU: 3 PID: 509781 at arch/x86/kernel/cpu/bugs.c:3586 __warn_thunk+0x26/0x30
Jan  5 14:14:12 kernel: Modules linked in: tracedev(OE+) tls cls_bpf sch_ingress rfkill vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc vfat fat intel_rapl_msr intel_rapl_common intel_uncore_frequency_common isst_if_mbox_msr isst_if_common nfit libnvdimm rapl pcspkr i2c_piix4 joydev auth_rpcgss sunrpc xfs libcrc32c vmwgfx drm_ttm_helper ttm ahci ata_generic drm_kms_helper libahci ata_piix drm crct10dif_pclmul nvme crc32_pclmul libata vmw_balloon crc32c_intel nvme_core ghash_clmulni_intel vmxnet3 vmw_vmci nvme_auth serio_raw dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: tracedev(OE)]
Jan  5 14:14:12 kernel: CPU: 3 PID: 509781 Comm: insmod Kdump: loaded Tainted: G           OE     -------  ---  5.14.0-570.69.1.el9_6.x86_64 #1
Jan  5 14:14:12 kernel: Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.24504846.B64.2501180339 01/18/2025
Jan  5 14:14:12 kernel: RIP: 0010:__warn_thunk+0x26/0x30
Jan  5 14:14:12 kernel: Code: 90 90 90 90 0f 1f 44 00 00 80 3d 8f ba 2f 02 00 74 05 e9 0d 0a cf 00 48 c7 c7 00 af 05 9c c6 05 7a ba 2f 02 01 e8 5a 3e 0c 00 <0f> 0b c3 cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90
Jan  5 14:14:12 kernel: RSP: 0018:ffffd1e0534a3a60 EFLAGS: 00010282
Jan  5 14:14:12 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
Jan  5 14:14:12 kernel: RDX: ffff8d946baed980 RSI: ffff8d946bae08c0 RDI: ffff8d946bae08c0
Jan  5 14:14:12 kernel: RBP: ffffd1e0534a3ab0 R08: 0000000000000000 R09: ffffd1e0534a3908
Jan  5 14:14:12 kernel: R10: ffffd1e0534a3900 R11: ffffffff9cbe1848 R12: ffff8d922d237240
Jan  5 14:14:12 kernel: R13: 000055bef24e1962 R14: ffff8d9042355638 R15: ffffffff9d8729d0
Jan  5 14:14:12 kernel: FS:  00007f0fbdbda740(0000) GS:ffff8d946bac0000(0000) knlGS:0000000000000000
Jan  5 14:14:12 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan  5 14:14:12 kernel: CR2: 000055bef2541328 CR3: 0000000105bd0003 CR4: 00000000007706f0
Jan  5 14:14:12 kernel: PKRU: 55555554
Jan  5 14:14:12 kernel: Call Trace:
Jan  5 14:14:12 kernel: <TASK>
Jan  5 14:14:12 kernel: warn_thunk_thunk+0x16/0x30
Jan  5 14:14:12 kernel: myModuleInit+0xe/0xff0 [tracedev]
Jan  5 14:14:12 kernel: ? chan+0x51e8/0x51e8 [tracedev]
Jan  5 14:14:12 kernel: do_one_initcall+0x41/0x210
Jan  5 14:14:12 kernel: do_init_module+0x64/0x230
Jan  5 14:14:12 kernel: init_module_from_file+0x8b/0xd0
Jan  5 14:14:12 kernel: idempotent_init_module+0x17e/0x230
Jan  5 14:14:12 kernel: __x64_sys_finit_module+0x5a/0xb0
Jan  5 14:14:12 kernel: do_syscall_64+0x5f/0xe0

Environment

  • Red Hat Enterprise Linux
  • 3rd party security module [dsa_filter] - 12.6.0.5813

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content