Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #727927
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-20
Last occurrence
2023-05-03
Unique reports
5
Quality
-46

Statistics

Operating system Unique / Total count
Fedora 37 5 / 7
Operating system Count
Fedora 37 7
Architecture Count
x86_64 7

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
VNetBridgeUp
vmnet 0x223
5
? suspend_devices_and_enter
vmlinux 0x1bd
6
suspend_devices_and_enter
vmlinux 0x1bd
7
suspend_devices_and_enter
vmlinux 0x1bd
8
? suspend_devices_and_enter
vmlinux 0x1bd
9
? suspend_devices_and_enter
vmlinux 0x1bd
10
? suspend_devices_and_enter
vmlinux 0x1bd
11
? suspend_devices_and_enter
vmlinux 0x1bd
12
? suspend_devices_and_enter
vmlinux 0x1bd
13
? suspend_devices_and_enter
vmlinux 0x1bd
14
? suspend_devices_and_enter
vmlinux 0x1bd
15
? suspend_devices_and_enter
vmlinux 0x1bd
16
suspend_devices_and_enter
vmlinux 0x1bd
WARNING: CPU: 20 PID: 40131 at /home/cjmo/Descargas/vmware-host-modules-w16.2.4-k5.19/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Modules linked in: ntfs3 tls snd_seq_dummy snd_hrtimer nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set vboxnetadp(OE) vboxnetflt(OE) nf_tables nfnetlink vboxdrv(OE) ppdev vmnet(OE) parport_pc parport vmw_vsock_vmci_transport vsock qrtr vmw_vmci vmmon(OE) sunrpc vfat fat intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel sb_edac snd_intel_dspcfg snd_intel_sdw_acpi x86_pkg_temp_thermal intel_powerclamp coretemp snd_usb_audio snd_hda_codec snd_usbmidi_lib kvm_intel snd_rawmidi snd_hda_core mc snd_hwdep snd_seq mei_wdt iTCO_wdt snd_seq_device kvm intel_pmc_bxt iTCO_vendor_support snd_pcm irqbypass mei_me hp_wmi snd_timer rapl sparse_keymap intel_cstate i2c_i801 platform_profile joydev intel_uncore rfkill wmi_bmof pcspkr mei
 i2c_smbus snd lpc_ich soundcore zram nvidia_drm(POE) nvidia_modeset(POE) nvidia(POE) nvme crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic nvme_core e1000e ghash_clmulni_intel sha512_ssse3 serio_raw video nvme_common wmi scsi_dh_rdac scsi_dh_emc scsi_dh_alua fuse dm_multipath
CPU: 20 PID: 40131 Comm: vmx-vcpu-0 Tainted: P        W  OE      6.1.5-200.fc37.x86_64 #1
Hardware name: Hewlett-Packard HP Z440 Workstation/212B, BIOS M60 v02.59 03/31/2022
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Code: 3d f3 6d 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 50 e7 07 c4 4c 89 ee 48 c7 c7 c0 e7 07 c4 c6 05 d4 6d 00 00 01 e8 a1 e9 ce e2 <0f> 0b e9 6a ff ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 41 55 41 89
RSP: 0018:ffffb359e0293c10 EFLAGS: 00010296
RAX: 00000000000000b1 RBX: ffff9f0ee31ff800 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffa774a863 RDI: 00000000ffffffff
RBP: ffff9f0c168d3600 R08: 0000000000000000 R09: ffffb359e0293ab0
R10: 0000000000000003 R11: ffffffffa8146488 R12: ffff9f0be2fe0b08
R13: 000000000000001c R14: ffff9f0c168d3608 R15: ffff9f0be2fe0b00
FS:  00007fb224cd36c0(0000) GS:ffff9f1aafb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faf61ffa000 CR3: 000000042cb44006 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 ? VNetUserListenerFree+0x60/0x60 [vmnet]
 VNetEvent_CreateListener+0xaf/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x182 [vmnet]
 VNetFileOpUnlockedIoctl+0x6f2/0x8a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x90/0xd0
 do_syscall_64+0x5b/0x80
 ? __x64_sys_ioctl+0xa8/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? __sys_setresuid+0x162/0x410
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fb244d23d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fb224ccf510 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007faf9000f960 RCX: 00007fb244d23d6f
RDX: 00007fb224ccf578 RSI: 00000000400899e2 RDI: 00000000000000ec
RBP: 0000000000000001 R08: 0000000000000020 R09: 00007fb224cd0160
R10: 00007faf900218d0 R11: 0000000000000246 R12: 00007faf90056b80
R13: 00007fb224ccf5e0 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>