Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-24
Last occurrence
2023-01-24
Unique reports
1
Quality
-49

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
? selinux_inode_permission
vmlinux 0x10e
4
selinux_inode_permission
vmlinux 0x10e
5
selinux_inode_permission
vmlinux 0x10e
6
? selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
? selinux_inode_permission
vmlinux 0x10e
16
? selinux_inode_permission
vmlinux 0x10e
17
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 4 PID: 6777 at /tmp/modconfig-wLUNVY/vmnet-only/vnetEvent.c:405 VNetEvent_Send+0x14c/0x180 [vmnet]
Modules linked in: vmnet(OE) vmmon(OE) tls rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nft_objref nf_conntrack_tftp bridge stp llc nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver fscache netfs intel_rapl_msr ppdev iTCO_wdt ee1004 intel_pmc_bxt iTCO_vendor_support bnep mei_hdcp mei_pxp intel_rapl_common intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass rapl intel_cstate intel_uncore pcspkr gigabyte_wmi wmi_bmof vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) nvidia(POE) nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables
 ip6table_filter ip6_tables iptable_filter ip_tables snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp parport_pc parport snd_sof vmw_vsock_vmci_transport vsock snd_sof_utils snd_soc_hdac_hda snd_hda_ext_core vmw_vmci snd_soc_acpi_intel_match snd_soc_acpi soundwire_bus snd_soc_core snd_virtuoso snd_compress snd_hda_codec_realtek snd_oxygen_lib ac97_bus i2c_i801 snd_pcm_dmaengine snd_mpu401_uart i2c_smbus btusb snd_hda_codec_generic mei_me btrtl ledtrig_audio snd_hda_codec_hdmi mei snd_usb_audio binfmt_misc btbcm btintel snd_hda_intel btmtk snd_intel_dspcfg snd_usbmidi_lib vfat snd_intel_sdw_acpi fat bluetooth idma64 snd_hda_codec snd_rawmidi mc snd_hda_core rfkill snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore intel_hid sparse_keymap acpi_tad pktcdvd acpi_pad squashfs loop zram uas usb_storage crct10dif_pclmul nvme crc32_pclmul crc32c_intel
 polyval_clmulni polyval_generic mxm_wmi nvme_core ghash_clmulni_intel r8152 r8169 sha512_ssse3 mii nvme_common video wmi pinctrl_alderlake scsi_dh_rdac scsi_dh_emc scsi_dh_alua fuse dm_multipath
CPU: 4 PID: 6777 Comm: vmnet-natd Tainted: P           OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. Z690 UD DDR4/Z690 UD DDR4, BIOS F21 11/15/2022
RIP: 0010:VNetEvent_Send+0x14c/0x180 [vmnet]
Code: 00 00 0f 85 61 ff ff ff b9 14 00 00 00 48 c7 c2 80 45 6b c0 4c 89 ee 48 c7 c7 c8 45 6b c0 c6 05 4a 74 00 00 01 e8 18 90 6b d0 <0f> 0b e9 38 ff ff ff b8 ea ff ff ff eb 81 b8 f0 ff ff ff e9 77 ff
RSP: 0018:ffffbbc50c2abbe8 EFLAGS: 00010282
RAX: 0000000000000089 RBX: ffff9eabb7833348 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffff9174b8a3 RDI: 00000000ffffffff
RBP: ffffbbc50c2abc20 R08: 0000000000000000 R09: ffffbbc50c2aba88
R10: 0000000000000003 R11: ffffffff92146488 R12: ffff9eabb7833400
R13: 000000000000001c R14: ffff9eaa8aad9700 R15: 0000000000000000
FS:  00007f0e39b47280(0000) GS:ffff9eb8bd700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000080e0f8 CR3: 00000003101f8004 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 <TASK>
 VNetUserIfIoctl+0x3cf/0x4a0 [vmnet]
 VNetFileOpUnlockedIoctl+0x59c/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? __x64_sys_poll+0x93/0x120
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? _copy_to_user+0x21/0x30
 ? __x64_sys_rt_sigaction+0xa5/0xf0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f0e39c48d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007ffd2a23bd00 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000004d2190 RCX: 00007f0e39c48d6f
RDX: 00007ffd2a23bd6f RSI: 00000000000099fd RDI: 0000000000000003
RBP: 00000000004fd670 R08: 0000000000000000 R09: 0000000000000058
R10: 00007ffd2a23bd80 R11: 0000000000000246 R12: 00007ffd2a23bd6f
R13: 00000000004dde90 R14: 00000000007dcb50 R15: 0000000000000000
 </TASK>