Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #168433
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-09-26
Last occurrence
2021-10-19
Unique reports
2
Quality
-24

Statistics

Operating system Unique / Total count
Fedora 33 2 / 16,329
Operating system Count
Fedora 33 16,329
Architecture Count
x86_64 16,329

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ethtool_get_rxnfc
vmlinux 0xcb
2
ethtool_get_rxnfc
vmlinux 0xcb
3
? ethtool_get_rxnfc
vmlinux 0xcb
4
? ethtool_get_rxnfc
vmlinux 0xcb
5
ethtool_get_rxnfc
vmlinux 0xcb
6
ethtool_get_rxnfc
vmlinux 0xcb
7
ethtool_get_rxnfc
vmlinux 0xcb
8
ethtool_get_rxnfc
vmlinux 0xcb
9
ethtool_get_rxnfc
vmlinux 0xcb
10
ethtool_get_rxnfc
vmlinux 0xcb
WARNING: CPU: 23 PID: 1400 at include/linux/thread_info.h:199 ethtool_rxnfc_copy_to_user+0x2b/0xb0
Modules linked in: ip6table_filter ip6_tables iptable_filter tun bridge stp llc sunrpc squashfs loop snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi intel_powerclamp snd_hda_intel coretemp snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec kvm_intel snd_hda_core snd_hwdep kvm snd_seq iTCO_wdt irqbypass intel_pmc_bxt snd_seq_device gpio_ich iTCO_vendor_support raid0 snd_pcm intel_cstate hp_wmi snd_timer platform_profile sparse_keymap intel_uncore snd rfkill wmi_bmof pcspkr lpc_ich soundcore i7core_edac zram ip_tables xfs nouveau video drm_ttm_helper ttm i2c_algo_bit mxm_wmi crct10dif_pclmul drm_kms_helper mptsas crc32_pclmul crc32c_intel scsi_transport_sas mptscsih cec firewire_ohci ghash_clmulni_intel mptbase uas serio_raw ixgbe drm usb_storage firewire_core tg3 crc_itu_t arcmsr mdio wmi dca pkcs8_key_parser fuse
CPU: 23 PID: 1400 Comm: nmbd Tainted: G        W I       5.13.19-100.fc33.x86_64 #1
Hardware name: Hewlett-Packard HP Z800 Workstation/0AECh, BIOS 786G5 v03.60 02/24/2016
RIP: 0010:ethtool_rxnfc_copy_to_user+0x2b/0xb0
Code: 1f 44 00 00 41 55 65 48 8b 04 25 c0 7b 01 00 41 54 55 53 f6 40 10 02 75 23 be 08 00 00 00 48 c7 c7 98 68 5b 83 e8 43 39 15 00 <0f> 0b 41 bc f2 ff ff ff 5b 44 89 e0 5d 41 5c 41 5d c3 48 89 fb 49
RSP: 0018:ffffa0f5811cfc38 EFLAGS: 00010292
RAX: 0000000000000023 RBX: ffffffffc05d4500 RCX: ffff94a29bbd8a08
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff94a29bbd8a00
RBP: ffff94a090dc0000 R08: 0000000000000000 R09: ffffa0f5811cfa70
R10: ffffa0f5811cfa68 R11: ffffffff83d468c8 R12: 0000000000000000
R13: 00007ffc0fb4f140 R14: 0000000000000000 R15: ffffa0f5811cfc68
FS:  00007f38a0ab7fc0(0000) GS:ffff94a29bbc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005602869518d8 CR3: 0000000109ba8002 CR4: 00000000000206e0
Call Trace:
 ethtool_get_rxnfc+0xcb/0x1b0
 dev_ethtool+0xb18/0x28a0
 ? kmem_cache_alloc+0x12d/0x210
 ? netdev_name_node_lookup_rcu+0x68/0x80
 dev_ioctl+0x156/0x480
 sock_do_ioctl+0x9b/0x130
 sock_ioctl+0x23a/0x320
 __x64_sys_ioctl+0x83/0xb0
 do_syscall_64+0x40/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f38a46e0f7b
Code: 89 d8 49 8d 3c 1c 48 f7 d8 4c 39 e0 77 b5 e8 1c ff ff ff 85 c0 78 ba 4c 89 e0 5b 5d 41 5c c3 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d cd be 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007ffc0fb4f0d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000056028694ec20 RCX: 00007f38a46e0f7b
RDX: 00007ffc0fb4f110 RSI: 0000000000008946 RDI: 0000000000000015
RBP: 0000000000000015 R08: 0000000000000000 R09: 000056028694ede8
R10: 000056028695141c R11: 0000000000000246 R12: 000056028694edd0
R13: 00007ffc0fb4f110 R14: 00005602869513b8 R15: 000056028695145c