Kerneloops

Similar reports
Problem #611598
Component
kernel Tainted
Last affected version
0:5.3.7-301.fc31
Executable
unknown
First occurrence
2022-06-14
Last occurrence
2022-06-22
Unique reports
1
Quality
-22

Statistics

Operating system Unique / Total count
Fedora 31 1 / 4
Operating system Count
Fedora 31 4
Architecture Count
x86_64 4
Related packages Count
kernel-core 4
 0:5.3.7-301.fc31 4

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
__flush_work
vmlinux 0x92
2
zufc_ioctl
zuf 0x836
3
? __flush_work
vmlinux 0x92
4
__flush_work
vmlinux 0x92
5
? __flush_work
vmlinux 0x92
6
__flush_work
vmlinux 0x92
7
__flush_work
vmlinux 0x92
8
__flush_work
vmlinux 0x92
9
__flush_work
vmlinux 0x92
WARNING: CPU: 0 PID: 28445 at mm/usercopy.c:75 usercopy_warn+0x7d/0xa0
Modules linked in: zuf(OE) cmac nls_utf8 isofs rfcomm nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_REJECT nf_reject_ipv6 ip6t_rpfilter ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event btusb btrtl btbcm btintel bluetooth dax_pmem snd_ens1371 snd_ac97_codec dax_pmem_core gameport ac97_bus snd_rawmidi ecdh_generic snd_seq rfkill ecc nd_pmem nd_btt snd_seq_device nd_e820 snd_pcm libnvdimm crct10dif_pclmul snd_timer crc32_pclmul snd vmw_balloon ghash_clmulni_intel soundcore joydev i2c_piix4 vmw_vmci ip_tables vmwgfx drm_kms_helper crc32c_intel ttm drm serio_raw nvme nvme_core ata_generic vmxnet3 pata_acpi fuse
CPU: 0 PID: 28445 Comm: zus_mounter Tainted: G           OE     5.3.7-301.fc31.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:usercopy_warn+0x7d/0xa0
Code: 15 93 41 51 49 89 c0 49 c7 c2 be fd 13 93 49 89 f1 48 89 f9 4c 0f 45 d2 48 c7 c7 78 4a 15 93 4c 89 da 4c 89 d6 e8 31 c6 de ff <0f> 0b 48 83 c4 18 c3 48 c7 c6 f2 f2 16 93 49 89 f1 48 89 f0 eb 96
RSP: 0018:ffffbd71006b7d58 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000069 RCX: 0000000000000006
RDX: 0000000000000007 RSI: 0000000000000092 RDI: ffff9e4837c17900
RBP: ffff9e4807092069 R08: 0000000000000001 R09: 0000000000000621
R10: 0000000000022b90 R11: 0000000000000003 R12: ffff9e4807092000
R13: 0000000000000001 R14: ffffbd71006b7da8 R15: ffff9e47f4fd8600
FS:  00007f07cad7d700(0000) GS:ffff9e4837c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe9dc3ad2c8 CR3: 00000001c64c4003 CR4: 0000000000760ef0
PKRU: 55555554
Call Trace:
 __check_object_size+0x136/0x147
 zufc_ioctl+0x836/0x1420 [zuf]
 ? finish_wait+0x80/0x80
 do_vfs_ioctl+0x405/0x660
 ? handle_mm_fault+0xc4/0x1e0
 ksys_ioctl+0x5e/0x90
 __x64_sys_ioctl+0x16/0x20
 do_syscall_64+0x5f/0x1a0
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f0886d652fb
Code: 0f 1e fa 48 8b 05 8d 9b 0c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 5d 9b 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f07cad7cd68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0886d652fb
RDX: 00007f0886e46000 RSI: 00000000c0685a0b RDI: 0000000000000005
RBP: 00007f0886e5e440 R08: 0000000000000000 R09: 00007f0886e37c10
R10: 00007f0886e4f76d R11: 0000000000000246 R12: 00007f07cad7cdc0
R13: 00007f07cad7cdc0 R14: 00007f0886e46000 R15: 00007f0886e5e440