Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #727927
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-18
Last occurrence
2023-01-27
Unique reports
1
Quality
-40

Statistics

Operating system Unique / Total count
Fedora 37 1 / 9
Operating system Count
Fedora 37 9
Architecture Count
x86_64 9

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
VNetBridgeUp
vmnet 0x223
5
? suspend_devices_and_enter
vmlinux 0x1bd
6
suspend_devices_and_enter
vmlinux 0x1bd
7
suspend_devices_and_enter
vmlinux 0x1bd
8
? suspend_devices_and_enter
vmlinux 0x1bd
9
? suspend_devices_and_enter
vmlinux 0x1bd
10
? suspend_devices_and_enter
vmlinux 0x1bd
11
? suspend_devices_and_enter
vmlinux 0x1bd
12
? suspend_devices_and_enter
vmlinux 0x1bd
13
? suspend_devices_and_enter
vmlinux 0x1bd
14
suspend_devices_and_enter
vmlinux 0x1bd
WARNING: CPU: 5 PID: 12941 at /tmp/modconfig-5tl4ls/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Modules linked in: tls ntfs3 binfmt_misc hidp rfcomm snd_seq_dummy snd_hrtimer xt_conntrack tun xt_MASQUERADE nf_conntrack_netlink xt_addrtype nft_compat br_netfilter bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 overlay ip_set nf_tables nfnetlink vmnet(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock nvidia_drm(POE) nvidia_modeset(POE) vmw_vmci qrtr vmmon(OE) nvidia_uvm(POE) bnep nvidia(POE) sunrpc snd_ctl_led snd_soc_skl_hda_dsp snd_soc_intel_hda_dsp_common snd_soc_hdac_hdmi snd_sof_probes vfat fat snd_hda_codec_realtek snd_hda_codec_generic snd_soc_dmic snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence iwlmvm snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp intel_tcc_cooling snd_sof x86_pkg_temp_thermal
 intel_powerclamp mac80211 snd_sof_utils snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi coretemp soundwire_bus iTCO_wdt intel_pmc_bxt libarc4 snd_soc_core mei_pxp mei_hdcp mei_wdt iTCO_vendor_support ee1004 intel_rapl_msr kvm_intel snd_compress ac97_bus snd_hda_codec_hdmi snd_pcm_dmaengine kvm iwlwifi squashfs snd_hda_intel irqbypass btusb snd_intel_dspcfg snd_usb_audio intel_cstate snd_intel_sdw_acpi loop btrtl snd_usbmidi_lib uvcvideo intel_uncore snd_hda_codec btbcm snd_rawmidi think_lmi videobuf2_vmalloc videobuf2_memops pcspkr cfg80211 snd_hda_core snd_seq btintel firmware_attributes_class mei_me videobuf2_v4l2 i2c_i801 wmi_bmof videobuf2_common btmtk snd_seq_device i2c_smbus snd_hwdep idma64 mei videodev snd_pcm bluetooth joydev thunderbolt mc processor_thermal_device_pci_legacy thinkpad_acpi snd_timer processor_thermal_device ledtrig_audio platform_profile processor_thermal_rfim rfkill processor_thermal_mbox processor_thermal_rapl snd
 intel_rapl_common intel_soc_dts_iosf soundcore int3403_thermal int340x_thermal_zone acpi_tad acpi_pad int3400_thermal acpi_thermal_rel zram dm_crypt i915 drm_buddy drm_display_helper rtsx_pci_sdmmc mmc_core cec nvme uas ucsi_acpi hid_multitouch crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme_core typec_ucsi ghash_clmulni_intel sha512_ssse3 usb_storage rtsx_pci ttm serio_raw typec i2c_hid_acpi nvme_common i2c_hid video wmi pinctrl_tigerlake ip6_tables ip_tables fuse
CPU: 5 PID: 12941 Comm: vmx-vcpu-0 Tainted: P        W  OE      6.1.5-200.fc37.x86_64 #1
Hardware name: LENOVO 20Y30066US/20Y30066US, BIOS N40ET39W (1.21 ) 12/01/2022
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Code: 3d 53 6f 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 06 f6 c0 4c 89 ee 48 c7 c7 00 07 f6 c0 c6 05 34 6f 00 00 01 e8 01 cb e0 e6 <0f> 0b e9 6a ff ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 41 55 41 89
RSP: 0018:ffffb3294fe9bc48 EFLAGS: 00010286
RAX: 0000000000000090 RBX: ffff8b29a626d600 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffa874a863 RDI: 00000000ffffffff
RBP: ffff8b2a3a357340 R08: 0000000000000000 R09: ffffb3294fe9bae8
R10: 0000000000000003 R11: ffffffffa9146488 R12: ffff8b283c99d608
R13: 000000000000001c R14: ffff8b2a3a357348 R15: ffff8b283c99d600
FS:  00007f74cd35c6c0(0000) GS:ffff8b371f540000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005653aaeac1a0 CR3: 0000000348294005 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? VNetUserListenerFree+0x60/0x60 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x182 [vmnet]
 VNetFileOpUnlockedIoctl+0x392/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? __sys_setresuid+0x162/0x410
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f773bf23d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007f74cd358530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f74c4008fe0 RCX: 00007f773bf23d6f
RDX: 00007f74cd358598 RSI: 00000000400899e2 RDI: 00000000000000bd
RBP: 0000000000000001 R08: 00007f74c4008ff8 R09: 00007f74cd359160
R10: 00007f74c40084a0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f74cd358600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>