Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #168433
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-10-25
Last occurrence
2021-12-16
Unique reports
4
Quality
-25

Statistics

Operating system Unique / Total count
Fedora 34 4 / 8
Operating system Count
Fedora 34 8
Architecture Count
x86_64 8

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ethtool_get_rxnfc
vmlinux 0xc8
2
ethtool_get_rxnfc
vmlinux 0xc8
3
? ethtool_get_rxnfc
vmlinux 0xc8
4
? ethtool_get_rxnfc
vmlinux 0xc8
5
ethtool_get_rxnfc
vmlinux 0xc8
6
ethtool_get_rxnfc
vmlinux 0xc8
7
ethtool_get_rxnfc
vmlinux 0xc8
8
? ethtool_get_rxnfc
vmlinux 0xc8
9
ethtool_get_rxnfc
vmlinux 0xc8
10
ethtool_get_rxnfc
vmlinux 0xc8
11
ethtool_get_rxnfc
vmlinux 0xc8
WARNING: CPU: 1 PID: 4233 at include/linux/thread_info.h:199 ethtool_rxnfc_copy_to_user+0x2b/0xb0
Modules linked in: uinput snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set rfkill nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc vfat fat vmw_balloon joydev pcspkr vmw_vmci i2c_piix4 zram ip_tables vmwgfx drm_kms_helper cec ttm drm serio_raw vmxnet3 vmw_pvscsi ata_generic pata_acpi fuse
CPU: 1 PID: 4233 Comm: pool-gnome-cont Not tainted 5.13.19-200.fc34.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
RIP: 0010:ethtool_rxnfc_copy_to_user+0x2b/0xb0
Code: 1f 44 00 00 41 55 65 48 8b 04 25 c0 7b 01 00 41 54 55 53 f6 40 10 02 75 23 be 08 00 00 00 48 c7 c7 b8 66 5b bc e8 20 35 15 00 <0f> 0b 41 bc f2 ff ff ff 5b 44 89 e0 5d 41 5c 41 5d c3 48 89 fb 49
RSP: 0018:ffffa7024276fc10 EFLAGS: 00010282
RAX: 0000000000000023 RBX: ffffffffc03d64e0 RCX: 0000000000000027
RDX: ffff8fddfcb18a08 RSI: 0000000000000001 RDI: ffff8fddfcb18a00
RBP: ffff8fdd75280000 R08: 0000000000000000 R09: ffffa7024276fa48
R10: ffffa7024276fa40 R11: ffffffffbcd468c8 R12: 0000000000000000
R13: 00007f379b7fd5a0 R14: 0000000000000000 R15: ffffa7024276fc40
FS:  00007f379b7fe640(0000) GS:ffff8fddfcb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f37f1a12030 CR3: 000000000864c000 CR4: 00000000000006e0
Call Trace:
 ethtool_get_rxnfc+0xc8/0x1b0
 dev_ethtool+0xb20/0x2970
 ? reweight_entity+0x128/0x140
 ? netdev_name_node_lookup_rcu+0x67/0x80
 dev_ioctl+0x18d/0x490
 sock_do_ioctl+0xa6/0x140
 sock_ioctl+0x246/0x330
 ? security_file_ioctl+0x32/0x50
 __x64_sys_ioctl+0x82/0xb0
 do_syscall_64+0x40/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f37f881f0ab
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9d bd 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f379b7fd538 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000002540be400 RCX: 00007f37f881f0ab
RDX: 00007f379b7fd570 RSI: 0000000000008946 RDI: 0000000000000018
RBP: 0000000000000018 R08: 0000000000000000 R09: 00007f37f8868860
R10: 00007f37a00644d4 R11: 0000000000000246 R12: 0000000000000001
R13: 00007f37a001bf90 R14: 00007f37a0064470 R15: 00007f37a0064514