Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-25
Last occurrence
2023-05-05
Unique reports
1
Quality
-41

Graphs

Statistics

Operating system Unique / Total count
Fedora 37 4 / 4
Fedora 38 1 / 1
Operating system Count
Fedora 37 4
Fedora 38 1
Architecture Count
x86_64 5

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
? selinux_inode_permission
vmlinux 0x10e
5
selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 0 PID: 1122 at /tmp/modconfig-eV9B8f/vmnet-only/vnetEvent.c:405 VNetEvent_Send+0x14c/0x180 [vmnet]
Modules linked in: nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink ppdev vmnet(OE) parport_pc parport qrtr vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) bnep snd_ctl_led snd_soc_skl_hda_dsp snd_soc_intel_hda_dsp_common snd_soc_hdac_hdmi snd_sof_probes snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic snd_soc_dmic snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp sunrpc snd_sof snd_sof_utils soundwire_bus snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi intel_tcc_cooling snd_soc_core x86_pkg_temp_thermal intel_powerclamp coretemp iTCO_wdt snd_compress ac97_bus intel_pmc_bxt ee1004 vfat iTCO_vendor_support kvm_intel fat snd_pcm_dmaengine snd_hda_intel mei_hdcp dell_rbtn mei_pxp snd_intel_dspcfg intel_rapl_msr kvm iwlmvm snd_usb_audio(+) dell_laptop
 snd_intel_sdw_acpi irqbypass snd_hda_codec snd_usbmidi_lib dell_smm_hwmon rapl snd_hda_core snd_rawmidi btusb intel_cstate snd_hwdep uvcvideo mac80211 dell_wmi snd_seq intel_uncore btrtl videobuf2_vmalloc btbcm dell_wmi_sysman videobuf2_memops pcspkr firmware_attributes_class videobuf2_v4l2 dell_smbios btintel snd_seq_device dcdbas videobuf2_common btmtk snd_pcm ledtrig_audio dell_wmi_descriptor intel_wmi_thunderbolt squashfs wmi_bmof libarc4 i2c_i801 videodev loop i2c_smbus snd_timer bluetooth mc snd soundcore joydev idma64 iwlwifi int3403_thermal cfg80211 processor_thermal_device_pci_legacy processor_thermal_device intel_hid processor_thermal_rfim processor_thermal_mbox int3400_thermal processor_thermal_rapl acpi_thermal_rel sparse_keymap intel_rapl_common acpi_pad mei_me rfkill mei acpi_tad intel_pch_thermal int340x_thermal_zone intel_soc_dts_iosf zram hid_semitek hid_sensor_hub intel_ishtp_hid i915 nouveau nvme drm_ttm_helper drm_buddy mxm_wmi nvme_core
 drm_display_helper intel_ish_ipc hid_multitouch ucsi_acpi crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel cec video sha512_ssse3 typec_ucsi r8169 serio_raw nvme_common ttm intel_ishtp typec i2c_hid_acpi i2c_hid wmi pinctrl_cannonlake ip6_tables ip_tables fuse
CPU: 0 PID: 1122 Comm: vmnet-bridge Tainted: G           OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Dell Inc. Latitude 3410/0G9T8F, BIOS 1.20.2 10/27/2022
RIP: 0010:VNetEvent_Send+0x14c/0x180 [vmnet]
Code: 00 00 0f 85 61 ff ff ff b9 14 00 00 00 48 c7 c2 80 b5 8e c1 4c 89 ee 48 c7 c7 c8 b5 8e c1 c6 05 4a 74 00 00 01 e8 18 20 48 e2 <0f> 0b e9 38 ff ff ff b8 ea ff ff ff eb 81 b8 f0 ff ff ff e9 77 ff
RSP: 0018:ffffaeb9447fbc00 EFLAGS: 00010292
RAX: 0000000000000089 RBX: ffff93f7348e6948 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffa474b8a3 RDI: 00000000ffffffff
RBP: ffffaeb9447fbc28 R08: 0000000000000000 R09: ffffaeb9447fbaa0
R10: 0000000000000003 R11: ffffffffa5146488 R12: ffff93f7348e6140
R13: 000000000000001c R14: ffff93f700d98060 R15: 0000000000000000
FS:  00007fb51981b740(0000) GS:ffff93fa5c800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005561e426e028 CR3: 0000000133484006 CR4: 00000000003706f0
Call Trace:
 <TASK>
 VNetBridgeUp+0x223/0x340 [vmnet]
 VNetBridge_Create+0x1d8/0x220 [vmnet]
 VNetFileOpUnlockedIoctl+0x6eb/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fb51991ed6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007ffc7b71ff70 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055d78cfa9090 RCX: 00007fb51991ed6f
RDX: 00007ffc7b720000 RSI: 00000000402499e4 RDI: 0000000000000008
RBP: 000055d78cae0180 R08: 000055d78cfa90c0 R09: 0000000000000020
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc7b71ffe0
R13: 00007ffc7b720000 R14: 000055d78cfa9098 R15: 0000000000000000
 </TASK>