Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-01
Last occurrence
2023-02-01
Unique reports
1
Quality
-51

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
VNetBridgeUp
vmnet 0x223
5
? selinux_inode_permission
vmlinux 0x10e
6
? selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
selinux_inode_permission
vmlinux 0x10e
9
selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
? selinux_inode_permission
vmlinux 0x10e
16
? selinux_inode_permission
vmlinux 0x10e
17
? selinux_inode_permission
vmlinux 0x10e
18
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 4 PID: 185842 at /tmp/modconfig-ABDFVw/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Modules linked in: vmnet(OE) vmmon(OE) exfat snd_usb_audio snd_usbmidi_lib snd_rawmidi gspca_sonixj gspca_main videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc tls ntfs3 uas usb_storage uinput rfcomm snd_seq_dummy snd_hrtimer nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr binfmt_misc ppdev parport_pc parport vmw_vsock_vmci_transport vsock bnep vmw_vmci sunrpc vfat fat intel_rapl_msr intel_rapl_common snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp snd_hda_intel snd_intel_dspcfg kvm_intel snd_intel_sdw_acpi snd_hda_codec btusb iTCO_wdt kvm btrtl btbcm
 snd_hda_core btintel irqbypass intel_pmc_bxt snd_hwdep iTCO_vendor_support btmtk rapl ee1004 intel_cstate mei_hdcp mei_pxp snd_seq intel_uncore bluetooth snd_seq_device gigabyte_wmi wmi_bmof pcspkr i2c_i801 snd_pcm i2c_smbus snd_timer joydev rfkill snd soundcore mei_me mei acpi_tad acpi_pad zram ip6_tables ip_tables vhci_hcd nouveau crct10dif_pclmul crc32_pclmul drm_ttm_helper crc32c_intel nvme ttm polyval_clmulni polyval_generic mxm_wmi nvme_core drm_display_helper ghash_clmulni_intel sha512_ssse3 r8169 sky2 nvme_common cec video wmi usbip_host usbip_core fuse
CPU: 4 PID: 185842 Comm: vmx-vcpu-0 Tainted: G        W  OE      6.1.7-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. H310M S2H 2.0/H310M S2H 2.0, BIOS F12 08/13/2019
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xe0 [vmnet]
Code: 3d 53 6f 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 c6 3a c1 4c 89 ee 48 c7 c7 00 c7 3a c1 c6 05 34 6f 00 00 01 e8 01 0b 9c d3 <0f> 0b e9 6a ff ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 41 55 41 89
RSP: 0018:ffffb9868834bbe0 EFLAGS: 00010296
RAX: 0000000000000090 RBX: ffff8ce646486800 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffff9574b8a3 RDI: 00000000ffffffff
RBP: ffff8ce5ea2b8440 R08: 0000000000000000 R09: ffffb9868834ba80
R10: 0000000000000003 R11: ffffffff96146488 R12: ffff8ce683fa18c8
R13: 000000000000001c R14: ffff8ce5ea2b8448 R15: ffff8ce683fa18c0
FS:  00007f0209b9c6c0(0000) GS:ffff8ce766d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f01ec010000 CR3: 0000000125540005 CR4: 00000000003706e0
Call Trace:
 <TASK>
 ? VNetUserListenerFree+0x60/0x60 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x182 [vmnet]
 VNetFileOpUnlockedIoctl+0x392/0x7a0 [vmnet]
 ? sysvec_call_function_single+0xab/0xc0
 ? asm_sysvec_call_function_single+0x16/0x20
 ? do_vfs_ioctl+0x2bb/0x950
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? __x64_sys_ioctl+0xa8/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_sys_openat2+0x77/0x150
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? __irq_exit_rcu+0x3d/0x140
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f0228923d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007f0209b98530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f01ec002670 RCX: 00007f0228923d6f
RDX: 00007f0209b98598 RSI: 00000000400899e2 RDI: 00000000000000ab
RBP: 0000000000000001 R08: 00007f01ec002688 R09: 00007f0209b99160
R10: 00007f01ec0042d0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0209b98600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>