Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #611647
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-01
Last occurrence
2023-02-01
Unique reports
1
Quality
-50

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
VNetBridgeUp
vmnet 0x223
2
VNetBridgeUp
vmnet 0x223
3
VNetBridgeUp
vmnet 0x223
4
? selinux_inode_permission
vmlinux 0x10e
5
selinux_inode_permission
vmlinux 0x10e
6
selinux_inode_permission
vmlinux 0x10e
7
? selinux_inode_permission
vmlinux 0x10e
8
? selinux_inode_permission
vmlinux 0x10e
9
? selinux_inode_permission
vmlinux 0x10e
10
? selinux_inode_permission
vmlinux 0x10e
11
? selinux_inode_permission
vmlinux 0x10e
12
? selinux_inode_permission
vmlinux 0x10e
13
? selinux_inode_permission
vmlinux 0x10e
14
? selinux_inode_permission
vmlinux 0x10e
15
? selinux_inode_permission
vmlinux 0x10e
16
? selinux_inode_permission
vmlinux 0x10e
17
? selinux_inode_permission
vmlinux 0x10e
18
selinux_inode_permission
vmlinux 0x10e
WARNING: CPU: 4 PID: 1152 at /tmp/modconfig-hKVCAk/vmnet-only/vnetEvent.c:405 VNetEvent_Send+0x14c/0x180 [vmnet]
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr vmnet(OE) ppdev parport_pc parport overlay vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) bnep sunrpc intel_rapl_msr intel_rapl_common edac_mce_amd binfmt_misc rtw88_8822ce kvm_amd rtw88_8822c vfat fat rtw88_pci kvm snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi rtw88_core asus_nb_wmi irqbypass snd_hda_intel asus_wmi rapl btusb snd_intel_dspcfg ledtrig_audio snd_intel_sdw_acpi mac80211 pcspkr sparse_keymap uvcvideo snd_hda_codec btrtl platform_profile wmi_bmof btbcm videobuf2_vmalloc snd_hda_core videobuf2_memops btintel videobuf2_v4l2 snd_hwdep libarc4 btmtk snd_seq videobuf2_common snd_seq_device k10temp videodev bluetooth snd_pcm squashfs cfg80211 joydev loop mc snd_timer
 snd soundcore i2c_piix4 rfkill amd_pmc acpi_cpufreq zram amdgpu hid_logitech_hidpp drm_ttm_helper ttm iommu_v2 nvme gpu_sched drm_buddy nvme_core drm_display_helper crct10dif_pclmul video crc32_pclmul crc32c_intel polyval_clmulni polyval_generic hid_multitouch ghash_clmulni_intel sha512_ssse3 serio_raw ccp sp5100_tco hid_logitech_dj cec nvme_common wmi i2c_hid_acpi i2c_hid scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 4 PID: 1152 Comm: vmnet-bridge Tainted: G           OE      6.1.7-200.fc37.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. VivoBook_ASUSLaptop X421IA_M433IA/X421IA, BIOS X421IA.310 06/02/2021
RIP: 0010:VNetEvent_Send+0x14c/0x180 [vmnet]
Code: 00 00 0f 85 61 ff ff ff b9 14 00 00 00 48 c7 c2 80 b5 73 c0 4c 89 ee 48 c7 c7 c8 b5 73 c0 c6 05 4a 74 00 00 01 e8 18 20 63 f0 <0f> 0b e9 38 ff ff ff b8 ea ff ff ff eb 81 b8 f0 ff ff ff e9 77 ff
RSP: 0018:ffffb37c449bbbe0 EFLAGS: 00010296
RAX: 0000000000000089 RBX: ffff98c84d95a2c8 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffb174b8a3 RDI: 00000000ffffffff
RBP: ffffb37c449bbc08 R08: 0000000000000000 R09: ffffb37c449bba80
R10: 0000000000000003 R11: ffffffffb2146488 R12: ffff98c84d95a500
R13: 000000000000001c R14: ffff98c840bfc060 R15: 0000000000000000
FS:  00007f52de44b740(0000) GS:ffff98cb3f700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c002435000 CR3: 000000013187c000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 VNetBridgeUp+0x223/0x340 [vmnet]
 VNetBridge_Create+0x1d8/0x220 [vmnet]
 VNetFileOpUnlockedIoctl+0x6eb/0x7a0 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xca/0x110
 __x64_sys_ioctl+0x90/0xd0
 do_syscall_64+0x5b/0x80
 ? __x64_sys_ioctl+0x90/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f52de54ed6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007ffe0ce9dc30 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055da03f580b0 RCX: 00007f52de54ed6f
RDX: 00007ffe0ce9dcc0 RSI: 00000000402499e4 RDI: 0000000000000008
RBP: 000055da02805180 R08: 000055da03f580e0 R09: 0000000000000020
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe0ce9dca0
R13: 00007ffe0ce9dcc0 R14: 000055da03f580b8 R15: 0000000000000000
 </TASK>