Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #168433
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-09-28
Last occurrence
2021-10-27
Unique reports
4
Quality
-26

Statistics

Operating system Unique / Total count
Fedora 34 4 / 126
Operating system Count
Fedora 34 126
Architecture Count
x86_64 126

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ethtool_get_rxnfc
vmlinux 0xc8
2
ethtool_get_rxnfc
vmlinux 0xc8
3
? ethtool_get_rxnfc
vmlinux 0xc8
4
? ethtool_get_rxnfc
vmlinux 0xc8
5
ethtool_get_rxnfc
vmlinux 0xc8
6
ethtool_get_rxnfc
vmlinux 0xc8
7
ethtool_get_rxnfc
vmlinux 0xc8
8
? ethtool_get_rxnfc
vmlinux 0xc8
9
ethtool_get_rxnfc
vmlinux 0xc8
10
ethtool_get_rxnfc
vmlinux 0xc8
11
ethtool_get_rxnfc
vmlinux 0xc8
WARNING: CPU: 0 PID: 2344 at include/linux/thread_info.h:199 ethtool_rxnfc_copy_to_user+0x2b/0xb0
Modules linked in: snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter sunrpc intel_rapl_msr intel_rapl_common rapl hv_utils hv_balloon i2c_piix4 pcspkr joydev drm zram ip_tables hv_storvsc hv_netvsc scsi_transport_fc hyperv_keyboard hid_hyperv crct10dif_pclmul crc32_pclmul crc32c_intel hyperv_fb ghash_clmulni_intel hv_vmbus ata_generic pata_acpi serio_raw fuse
CPU: 0 PID: 2344 Comm: pool Tainted: G S                5.13.19-200.fc34.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006  04/28/2016
RIP: 0010:ethtool_rxnfc_copy_to_user+0x2b/0xb0
Code: 1f 44 00 00 41 55 65 48 8b 04 25 c0 7b 01 00 41 54 55 53 f6 40 10 02 75 23 be 08 00 00 00 48 c7 c7 b8 66 5b 8c e8 20 35 15 00 <0f> 0b 41 bc f2 ff ff ff 5b 44 89 e0 5d 41 5c 41 5d c3 48 89 fb 49
RSP: 0018:ffffaa1e44c6bc10 EFLAGS: 00010282
RAX: 0000000000000023 RBX: ffffffffc0334360 RCX: 0000000000000027
RDX: ffff9d9782e18a08 RSI: 0000000000000001 RDI: ffff9d9782e18a00
RBP: ffff9d968621c000 R08: 0000000000000000 R09: ffffaa1e44c6ba48
R10: ffffaa1e44c6ba40 R11: ffff9d9787f46068 R12: 0000000000000000
R13: 00007f6ed77fd7e0 R14: 0000000000000000 R15: ffffaa1e44c6bc40
FS:  00007f6ed77fe640(0000) GS:ffff9d9782e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6ef7810e10 CR3: 00000001303a2003 CR4: 00000000001706f0
Call Trace:
 ethtool_get_rxnfc+0xc8/0x1b0
 dev_ethtool+0xb20/0x2970
 ? __mod_memcg_lruvec_state+0x22/0xe0
 ? netdev_name_node_lookup_rcu+0x67/0x80
 dev_ioctl+0x18d/0x490
 sock_do_ioctl+0xa6/0x140
 sock_ioctl+0x246/0x330
 ? security_file_ioctl+0x32/0x50
 __x64_sys_ioctl+0x82/0xb0
 do_syscall_64+0x40/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f6ef77ea0ab
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9d bd 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f6ed77fd778 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000000003b9aca00 RCX: 00007f6ef77ea0ab
RDX: 00007f6ed77fd7b0 RSI: 0000000000008946 RDI: 0000000000000009
RBP: 0000000000000009 R08: 0000000000000000 R09: 00007f6ed77fd7b0
R10: 000000000000001d R11: 0000000000000246 R12: 0000000000000001
R13: 00007f6ec80154f0 R14: 00007f6ec80167a0 R15: 00007f6ec8016844