Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #739006
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-24
Last occurrence
2023-03-26
Unique reports
1
Quality
-54

Statistics

Operating system Unique / Total count
Fedora 37 1 / 3
Operating system Count
Fedora 37 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? __pfx_VNetUserListenerEventHandler
vmnet 0x10
2
__pfx_VNetUserListenerEventHandler
vmnet 0x10
3
__pfx_VNetUserListenerEventHandler
vmnet 0x10
4
__pfx_VNetUserListenerEventHandler
vmnet 0x10
5
? do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
? do_futex
vmlinux 0xda
9
? do_futex
vmlinux 0xda
10
? do_futex
vmlinux 0xda
11
? do_futex
vmlinux 0xda
12
? do_futex
vmlinux 0xda
13
? do_futex
vmlinux 0xda
14
? do_futex
vmlinux 0xda
15
? do_futex
vmlinux 0xda
16
? do_futex
vmlinux 0xda
17
? do_futex
vmlinux 0xda
18
? do_futex
vmlinux 0xda
19
do_futex
vmlinux 0xda
WARNING: CPU: 0 PID: 762435 at /tmp/modconfig-zGNdFj/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Modules linked in: uinput tls uhid rfcomm snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nvidia_drm(POE) nvidia_modeset(POE) ip6table_nat ip6table_mangle ip6table_raw ip6table_security nvidia_uvm(POE) iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink nvidia(POE) ip6table_filter iptable_filter qrtr ppdev vmnet(OE) parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) bnep sunrpc snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof binfmt_misc snd_sof_utils soundwire_bus snd_soc_skl snd_soc_hdac_hda intel_rapl_msr
 snd_hda_ext_core snd_soc_sst_ipc intel_rapl_common snd_soc_sst_dsp vfat snd_soc_acpi_intel_match snd_hda_codec_hdmi fat snd_soc_acpi intel_tcc_cooling snd_soc_core x86_pkg_temp_thermal snd_ctl_led intel_powerclamp coretemp iwlmvm snd_compress ac97_bus snd_hda_codec_realtek kvm_intel snd_pcm_dmaengine snd_hda_codec_generic mac80211 ledtrig_audio kvm iTCO_wdt intel_pmc_bxt iTCO_vendor_support snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi libarc4 snd_hda_codec mei_hdcp ee1004 irqbypass mei_pxp btusb snd_hda_core uvcvideo btrtl btbcm squashfs videobuf2_vmalloc iwlwifi btintel videobuf2_memops snd_hwdep videobuf2_v4l2 rapl snd_seq btmtk videobuf2_common snd_seq_device intel_cstate bluetooth videodev intel_uncore intel_wmi_thunderbolt snd_pcm cfg80211 mc pcspkr snd_timer acer_wmi sparse_keymap i2c_i801 mei_me snd joydev wmi_bmof i2c_smbus soundcore mei idma64 rfkill intel_pch_thermal acer_wireless acpi_pad loop zram i915 nvme drm_buddy nvme_core crct10dif_pclmul
 drm_display_helper crc32_pclmul crc32c_intel cec polyval_clmulni hid_multitouch polyval_generic ghash_clmulni_intel nvme_common serio_raw sha512_ssse3 r8169 ttm i2c_hid_acpi i2c_hid video wmi pinctrl_cannonlake scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 0 PID: 762435 Comm: vmx-vcpu-0 Tainted: P           OE      6.2.7-200.fc37.x86_64 #1
Hardware name: Acer Aspire A515-54G/Doc_WC, BIOS V1.24 07/07/2021
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Code: 3d 33 78 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 c6 40 c1 4c 89 ee 48 c7 c7 00 c7 40 c1 c6 05 14 78 00 00 01 e8 9d 1f d0 d6 <0f> 0b e9 6a ff ff ff 5b 48 c7 c7 80 c6 40 c1 5d 41 5c 41 5d 41 5e
RSP: 0018:ffff9c9ae4747bc8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8f324511f000 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff998c1316 RDI: 00000000ffffffff
RBP: ffff8f336530c640 R08: 0000000000000000 R09: ffff9c9ae4747a58
R10: 0000000000000003 R11: ffffffff9a138f48 R12: ffff8f33a8390b08
R13: 000000000000001c R14: ffff8f336530c648 R15: ffff8f33a8390b00
FS:  00007fef999096c0(0000) GS:ffff8f3496400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ccb111b170 CR3: 000000010cbfa003 CR4: 00000000003706f0
Call Trace:
 <TASK>
 ? __pfx_VNetUserListenerEventHandler+0x10/0x10 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x10f0 [vmnet]
 VNetFileOpUnlockedIoctl+0x4e8/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? do_syscall_64+0x67/0x80
 ? commit_creds+0x110/0x2a0
 ? __sys_setresuid+0x162/0x410
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fefb7e43d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fef99905530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fef0401cf80 RCX: 00007fefb7e43d6f
RDX: 00007fef99905598 RSI: 00000000400899e2 RDI: 000000000000009a
RBP: 0000000000000001 R08: 00007fef0401cf98 R09: 00007fef99906160
R10: 00007fef0405d3f0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fef99905600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>