Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #168433
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-01-12
Last occurrence
2022-01-12
Unique reports
1
Quality
-26

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Operating system Count
Fedora 34 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ethtool_get_rxnfc
vmlinux 0xc8
2
ethtool_get_rxnfc
vmlinux 0xc8
3
? ethtool_get_rxnfc
vmlinux 0xc8
4
? ethtool_get_rxnfc
vmlinux 0xc8
5
ethtool_get_rxnfc
vmlinux 0xc8
6
ethtool_get_rxnfc
vmlinux 0xc8
7
ethtool_get_rxnfc
vmlinux 0xc8
8
? ethtool_get_rxnfc
vmlinux 0xc8
9
ethtool_get_rxnfc
vmlinux 0xc8
10
ethtool_get_rxnfc
vmlinux 0xc8
11
ethtool_get_rxnfc
vmlinux 0xc8
WARNING: CPU: 0 PID: 235247 at include/linux/thread_info.h:199 ethtool_rxnfc_copy_to_user+0x2b/0xb0
Modules linked in: snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter ip6_tables iptable_filter vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc vfat fat vmw_balloon pcspkr joydev vmw_vmci i2c_piix4 zram ip_tables vmwgfx drm_kms_helper cec ttm drm serio_raw vmxnet3 vmw_pvscsi ata_generic pata_acpi fuse
CPU: 0 PID: 235247 Comm: pool Tainted: G             L    5.13.19-200.fc34.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
RIP: 0010:ethtool_rxnfc_copy_to_user+0x2b/0xb0
Code: 1f 44 00 00 41 55 65 48 8b 04 25 c0 7b 01 00 41 54 55 53 f6 40 10 02 75 23 be 08 00 00 00 48 c7 c7 b8 66 5b a8 e8 20 35 15 00 <0f> 0b 41 bc f2 ff ff ff 5b 44 89 e0 5d 41 5c 41 5d c3 48 89 fb 49
RSP: 0018:ffffa8a9c376fc10 EFLAGS: 00010282
RAX: 0000000000000023 RBX: ffffffffc03e74e0 RCX: 0000000000000027
RDX: ffff9877bcc18a08 RSI: 0000000000000001 RDI: ffff9877bcc18a00
RBP: ffff987734cd8000 R08: 0000000000000000 R09: ffffa8a9c376fa48
R10: ffffa8a9c376fa40 R11: ffffffffa8d39950 R12: 0000000000000000
R13: 00007f18753077e0 R14: 0000000000000000 R15: ffffa8a9c376fc40
FS:  00007f1875308640(0000) GS:ffff9877bcc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1864016158 CR3: 0000000007626000 CR4: 00000000000006f0
Call Trace:
 ethtool_get_rxnfc+0xc8/0x1b0
 dev_ethtool+0xb20/0x2970
 ? __mod_memcg_lruvec_state+0x22/0xe0
 ? netdev_name_node_lookup_rcu+0x67/0x80
 dev_ioctl+0x18d/0x490
 sock_do_ioctl+0xa6/0x140
 sock_ioctl+0x246/0x330
 ? security_file_ioctl+0x32/0x50
 __x64_sys_ioctl+0x82/0xb0
 do_syscall_64+0x40/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1888e290ab
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9d bd 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f1875307778 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000002540be400 RCX: 00007f1888e290ab
RDX: 00007f18753077b0 RSI: 0000000000008946 RDI: 0000000000000009
RBP: 0000000000000009 R08: 0000000000000000 R09: 00007f1888e72860
R10: 00007f1864016784 R11: 0000000000000246 R12: 0000000000000001
R13: 00007f1864015460 R14: 00007f1864016720 R15: 00007f18640167c4