Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-26
Last occurrence
2023-03-16
Unique reports
6
Quality
-43

Statistics

Operating system Unique / Total count
Fedora 37 6 / 26
Operating system Count
Fedora 37 26
Architecture Count
x86_64 26

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
VNetBridgeUp
vmnet 0x223
5
? selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 2 PID: 30542 at /var/lib/dkms/vmnet/17.0.0/build/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Modules linked in: tls ntfs3 uinput nf_conntrack_netbios_ns nf_conntrack_broadcast rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nft_objref nf_conntrack_tftp nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib bridge nft_reject_inet stp nf_reject_ipv4 llc nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) qrtr vmnet(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock nvidia(POE) vmw_vmci bnep vmmon(OE) sunrpc snd_acp3x_pdm_dma snd_soc_dmic snd_acp3x_rn snd_sof_amd_rembrandt intel_rapl_msr snd_ctl_led snd_sof_amd_renoir intel_rapl_common iwlmvm snd_sof_amd_acp snd_hda_codec_realtek snd_sof_pci snd_hda_codec_generic snd_sof snd_hda_codec_hdmi edac_mce_amd snd_hda_intel snd_sof_utils btusb mac80211 vfat snd_intel_dspcfg snd_soc_core snd_intel_sdw_acpi btrtl snd_compress fat kvm_amd libarc4
 btbcm ac97_bus snd_usb_audio snd_hda_codec kvm btintel snd_pcm_dmaengine snd_hda_core iwlwifi snd_usbmidi_lib snd_pci_ps irqbypass btmtk snd_rpl_pci_acp6x dcdbas rapl uvcvideo snd_rawmidi snd_pci_acp6x snd_hwdep ledtrig_audio alienware_wmi sparse_keymap dell_wmi_descriptor snd_seq wmi_bmof nvidia_wmi_ec_backlight snd_pci_acp5x zenpower(OE) bluetooth videobuf2_vmalloc snd_seq_device snd_rn_pci_acp3x videobuf2_memops snd_acp_config videobuf2_v4l2 cfg80211 xpad i2c_piix4 joydev snd_pcm ff_memless videobuf2_common snd_soc_acpi snd_pci_acp3x snd_timer snd soundcore dell_rbtn rfkill cm32181 industrialio amd_pmc acpi_cpufreq zram xfs amdgpu drm_ttm_helper ttm iommu_v2 video gpu_sched hid_logitech_hidpp drm_buddy drm_display_helper hid_multitouch nvme uas ucsi_acpi crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 nvme_core typec_ucsi usb_storage serio_raw sp5100_tco ccp r8169 hid_logitech_dj cec typec nvme_common
 i2c_hid_acpi wmi i2c_hid v4l2loopback(OE) videodev mc scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse dell_smm_hwmon
CPU: 2 PID: 30542 Comm: vmx-vcpu-0 Tainted: P        W  OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Alienware Alienware m15 Ryzen Ed. R5/0F8CRX, BIOS 1.9.0 11/10/2022
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Code: 3d 53 6f 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 c6 40 c1 4c 89 ee 48 c7 c7 00 c7 40 c1 c6 05 34 6f 00 00 01 e8 01 0b 96 d6 <0f> 0b e9 6a ff ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 41 55 41 89
RSP: 0018:ffffaa7a8edfbc28 EFLAGS: 00010282
RAX: 0000000000000090 RBX: ffff94ade26b5800 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffff9874b8a3 RDI: 00000000ffffffff
RBP: ffff94b033a0fe80 R08: 0000000000000000 R09: ffffaa7a8edfbac8
R10: 0000000000000003 R11: ffffffff99146488 R12: ffff94ada96a3cc8
R13: 000000000000001c R14: ffff94b033a0fe88 R15: ffff94ada96a3cc0
FS:  00007fc73721c6c0(0000) GS:ffff94b07e480000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000557bb2780f00 CR3: 0000000371666000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? VNetUserListenerFree+0x60/0x60 [vmnet]
 VNetEvent_CreateListener+0xaf/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x182 [vmnet]
 VNetFileOpUnlockedIoctl+0x392/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x90/0xd0
 do_syscall_64+0x5b/0x80
 ? __x64_sys_ioctl+0xa8/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fc9a5f21d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fc737218530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fc72c015e30 RCX: 00007fc9a5f21d6f
RDX: 00007fc737218598 RSI: 00000000400899e2 RDI: 0000000000000103
RBP: 0000000000000001 R08: 0000000000000020 R09: 00007fc737219160
R10: 00007fc72c018120 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fc737218600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>