Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-01-28
Last occurrence
2023-02-01
Unique reports
2
Quality
-52

Statistics

Operating system Unique / Total count
Fedora 37 2 / 2
Operating system Count
Fedora 37 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
VNetBridgeUp
vmnet 0x223
5
? selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
? selinux_inode_permission
vmlinux 0x10e
16
? selinux_inode_permission
vmlinux 0x10e
17
? selinux_inode_permission
vmlinux 0x10e
18
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 2 PID: 29816 at /tmp/modconfig-rZRkdq/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Modules linked in: vmnet(OE) vmmon(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci tls uinput ntfs3 rfcomm snd_seq_dummy snd_hrtimer bnep btusb btrtl btbcm btintel btmtk bluetooth qrtr snd_sof_pci_intel_skl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils soundwire_bus snd_soc_avs snd_soc_hda_codec snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_hda_codec_hdmi snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi intel_rapl_msr snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress ledtrig_audio ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi intel_rapl_common mei_pxp mei_hdcp snd_hda_codec sunrpc intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp mwifiex_pcie snd_hda_core snd_hwdep mwifiex kvm_intel snd_seq hid_sensor_rotation hid_sensor_accel_3d hid_sensor_gyro_3d
 surface_gpe hid_sensor_als kvm hid_sensor_trigger hid_sensor_iio_common snd_seq_device industrialio_triggered_buffer kfifo_buf irqbypass snd_pcm industrialio cfg80211 rapl intel_cstate snd_timer vfat fat intel_uncore pcspkr snd rfkill soundcore uas mei_me mei idma64 usb_storage ipu3_imgu(C) ipu3_cio2 videobuf2_dma_sg videobuf2_memops ov5693 intel_pch_thermal ov8865 ov7251 videobuf2_v4l2 v4l2_fwnode videobuf2_common joydev v4l2_async intel_skl_int3472_tps68470 videodev tps68470_regulator clk_tps68470 intel_xhci_usb_role_switch mc intel_skl_int3472_discrete surfacepro3_button soc_button_array acpi_pad zram i915 drm_buddy nvme drm_display_helper nvme_core cec crct10dif_pclmul crc32_pclmul hid_sensor_hub crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel ttm sha512_ssse3 nvme_common hid_multitouch i2c_hid_acpi i2c_hid video wmi pinctrl_sunrisepoint ip6_tables ip_tables fuse
CPU: 2 PID: 29816 Comm: vmx-vcpu-0 Tainted: G        WC OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Microsoft Corporation Surface Book/Surface Book, BIOS 92.3748.768 05.04.2021
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Code: 3d 53 6f 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 c6 5f c1 4c 89 ee 48 c7 c7 00 c7 5f c1 c6 05 34 6f 00 00 01 e8 01 0b 77 f8 <0f> 0b e9 6a ff ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 41 55 41 89
RSP: 0018:ffff95ff0fe0bbf8 EFLAGS: 00010286
RAX: 0000000000000090 RBX: ffff897a069e5000 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffba74b8a3 RDI: 00000000ffffffff
RBP: ffff897955703a40 R08: 0000000000000000 R09: ffff95ff0fe0ba98
R10: 0000000000000003 R11: ffffffffbb146488 R12: ffff8978c2a5ffc8
R13: 000000000000001c R14: ffff897955703a48 R15: ffff8978c2a5ffc0
FS:  00007f0c6560f6c0(0000) GS:ffff897a27500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000559cb7a01420 CR3: 000000012ff2c003 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 ? VNetUserListenerFree+0x60/0x60 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x182 [vmnet]
 VNetFileOpUnlockedIoctl+0x392/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? __x64_sys_ioctl+0xa8/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f0c8483cd6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007f0c6560b530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f0b8c01b3b0 RCX: 00007f0c8483cd6f
RDX: 00007f0c6560b598 RSI: 00000000400899e2 RDI: 00000000000000a2
RBP: 0000000000000001 R08: 00007f0b8c01b3c8 R09: 00007f0c6560c160
R10: 00007f0b8c00f330 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0c6560b600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>