Control: retitle -1 broadcom-sta-dkms: 'Unpatched return thunk in use' with kernel 6.12.12
Control: severity -1 minor
Control: reopen -1
Control: thanks


On Sat, 20 Sep 2025 18:42:16 -0700 Roger Shimizu <[email protected]> wrote:
> Version: 6.30.223.271-28~exp1
>

The warning is still in the log with version 6.30.223.271-28~exp1 (which is said to fix the issue).

Hardware works properly despite the warning.

Sep 21 08:16:07 debian kernel: wl: This driver includes a binary blob incompatible with IBT protection, available since Intel Core Tiger Lake (11th gen, 2020). If your CPU is older you can ignore the 'Unpatched return thunk in use' warnings caused by this driver. You can disable IBT by adding `ibt=off` to your kernel boot options.
Sep 21 08:16:07 debian kernel: ------------[ cut here ]------------
Sep 21 08:16:07 debian kernel: Unpatched return thunk in use. This should not happen! Sep 21 08:16:07 debian kernel: WARNING: CPU: 1 PID: 406 at arch/x86/kernel/cpu/bugs.c:3356 __warn_thunk+0x2a/0x40 Sep 21 08:16:07 debian kernel: Modules linked in: wl(POE+) nouveau(+) cmac algif_hash algif_skcipher af_alg rfcomm bnep uinput snd_hda_codec_realtek snd_hda_codec_generic kvm_intel btusb snd_hda_scodec_component snd_hda_intel btrtl mxm_wmi btintel snd_intel_dspcfg drm_gpuvm snd_intel_sdw_acpi binfmt_misc drm_exec uvcvideo btbcm btmtk gpu_sched drm_display_helper snd_hda_codec kvm videobuf2_vmalloc cec cfg80211 uvc bluetooth snd_hda_core videobuf2_memops rc_core videobuf2_v4l2 drm_ttm_helper snd_hwdep ttm applesmc videodev snd_pcm irqbypass drm_kms_helper sha512_ssse3 sha256_ssse3 videobuf2_common sha1_ssse3 snd_timer i2c_algo_bit pcspkr acpi_cpufreq rfkill nls_ascii nls_cp437 mc snd vfat fat soundcore apple_bl video wmi evdev button apple_mfi_fastcharge sg ufsd(POE) jnl(OE) coretemp msr dm_mod parport_pc ppdev lp drm parport configfs efi_pstore nfnetlink ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic hid_apple hid_appleir hid_generic usbhid hid sd_mod ata_generic ahci libahci ohci_pci libata ehci_pci ehci_hcd ohci_hcd Sep 21 08:16:07 debian kernel: scsi_mod firewire_ohci usbcore forcedeth firewire_core scsi_common crc_itu_t usb_common nv_tco i2c_nforce2 Sep 21 08:16:07 debian kernel: CPU: 1 UID: 0 PID: 406 Comm: (udev-worker) Tainted: P OE 6.12.43+deb13-amd64 #1 Debian 6.12.43-1 Sep 21 08:16:07 debian kernel: Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Sep 21 08:16:07 debian kernel: Hardware name: Apple Inc. iMac9,1/Mac-F2218FC8, BIOS IM91.88Z.008D.B08.0904271717 04/27/09
Sep 21 08:16:07 debian kernel: RIP: 0010:__warn_thunk+0x2a/0x40
Sep 21 08:16:07 debian kernel: Code: 66 0f 1f 00 0f 1f 44 00 00 80 3d 58 9c dc 01 00 74 05 c3 cc cc cc cc 48 c7 c7 80 13 d4 ac c6 05 43 9c dc 01 01 e8 a6 3e 06 00 <0f> 0b c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
Sep 21 08:16:07 debian kernel: RSP: 0000:ffffbc8a406d3be0 EFLAGS: 00010286
Sep 21 08:16:07 debian kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027 Sep 21 08:16:07 debian kernel: RDX: ffff9afb38121788 RSI: 0000000000000001 RDI: ffff9afb38121780 Sep 21 08:16:07 debian kernel: RBP: ffffbc8a406d3c30 R08: 0000000000000000 R09: ffffbc8a406d3a60 Sep 21 08:16:07 debian kernel: R10: ffffffffad4b43a8 R11: 0000000000000003 R12: ffffffffc1e7ebc1 Sep 21 08:16:07 debian kernel: R13: ffffbc8a406d3c78 R14: ffff9afa042756c0 R15: ffff9afa0bd1a118 Sep 21 08:16:07 debian kernel: FS: 00007ff847647980(0000) GS:ffff9afb38100000(0000) knlGS:0000000000000000 Sep 21 08:16:07 debian kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Sep 21 08:16:07 debian kernel: CR2: 00007f4cb80910a8 CR3: 0000000122d0c000 CR4: 00000000000426f0
Sep 21 08:16:07 debian kernel: Call Trace:
Sep 21 08:16:07 debian kernel:  <TASK>
Sep 21 08:16:07 debian kernel:  warn_thunk_thunk+0x1a/0x30
Sep 21 08:16:07 debian kernel:  getvar+0x20/0x70 [wl]
Sep 21 08:16:07 debian kernel:  ? orc_header+0x1628/0x1628 [wl]
Sep 21 08:16:07 debian kernel:  wl_module_init+0x23/0xb0 [wl]
Sep 21 08:16:07 debian kernel:  ? do_one_initcall+0x5b/0x310
Sep 21 08:16:07 debian kernel:  ? do_init_module+0x60/0x230
Sep 21 08:16:07 debian kernel:  ? init_module_from_file+0x89/0xe0
Sep 21 08:16:07 debian kernel:  ? idempotent_init_module+0x11e/0x310
Sep 21 08:16:07 debian kernel:  ? __x64_sys_finit_module+0x5e/0xb0
Sep 21 08:16:07 debian kernel:  ? do_syscall_64+0x82/0x190
Sep 21 08:16:07 debian kernel:  ? do_syscall_64+0x8e/0x190
Sep 21 08:16:07 debian kernel:  ? restore_fpregs_from_fpstate+0x3c/0xa0
Sep 21 08:16:07 debian kernel:  ? switch_fpu_return+0x4e/0xd0
Sep 21 08:16:07 debian kernel:  ? syscall_exit_to_user_mode+0x172/0x210
Sep 21 08:16:07 debian kernel:  ? do_syscall_64+0x8e/0x190
Sep 21 08:16:07 debian kernel:  ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
Sep 21 08:16:07 debian kernel:  </TASK>
Sep 21 08:16:07 debian kernel: ---[ end trace 0000000000000000 ]---


Le 21/09/2025 à 03:45, Debian Bug Tracking System a écrit :
This is an automatic notification regarding your Bug report
which was filed against the broadcom-sta-dkms package:

#1099014: broadcom-sta-dkms: module crash on trixie with kernel 6.12.12

It has been closed by Roger Shimizu <[email protected]>.

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Roger Shimizu 
<[email protected]> by
replying to this email.



Reply via email to