Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #739006
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-27
Last occurrence
2023-05-04
Unique reports
1
Quality
-39

Graphs

Statistics

Operating system Unique / Total count
Fedora 37 1 / 2
Fedora 38 1 / 2
Operating system Count
Fedora 37 2
Fedora 38 2
Architecture Count
x86_64 4

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? __pfx_VNetUserListenerEventHandler
vmnet 0x10
2
__pfx_VNetUserListenerEventHandler
vmnet 0x10
3
__pfx_VNetUserListenerEventHandler
vmnet 0x10
4
__pfx_VNetUserListenerEventHandler
vmnet 0x10
5
? do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
? do_futex
vmlinux 0xda
9
? do_futex
vmlinux 0xda
10
? do_futex
vmlinux 0xda
11
? do_futex
vmlinux 0xda
12
? do_futex
vmlinux 0xda
13
? do_futex
vmlinux 0xda
14
do_futex
vmlinux 0xda
WARNING: CPU: 5 PID: 17251 at /tmp/modconfig-YJTRZC/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Modules linked in: veth xt_nat xt_conntrack xt_MASQUERADE nf_conntrack_netlink xt_addrtype nft_compat br_netfilter bridge stp llc tls rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr vmnet(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) bnep snd_ctl_led snd_soc_skl_hda_dsp snd_soc_intel_hda_dsp_common snd_soc_hdac_hdmi snd_sof_probes snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic sunrpc snd_soc_dmic snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_hdac_hda snd_hda_ext_core binfmt_misc snd_soc_acpi_intel_match snd_soc_acpi soundwire_bus ath10k_pci vfat
 snd_soc_core fat snd_compress ath10k_core ac97_bus iTCO_wdt intel_pmc_bxt mei_pxp iTCO_vendor_support mei_hdcp snd_pcm_dmaengine ee1004 x86_pkg_temp_thermal intel_powerclamp snd_hda_intel coretemp uvcvideo snd_intel_dspcfg dell_laptop pmt_telemetry snd_intel_sdw_acpi pmt_class videobuf2_vmalloc intel_rapl_msr kvm_intel snd_usb_audio snd_hda_codec mac80211 dell_smm_hwmon videobuf2_memops videobuf2_v4l2 snd_hda_core snd_usbmidi_lib snd_hwdep videobuf2_common snd_rawmidi kvm snd_seq btusb btrtl videodev btbcm libarc4 ath irqbypass btintel snd_seq_device btmtk snd_pcm rapl mc cfg80211 bluetooth snd_timer dell_wmi intel_cstate intel_uncore snd processor_thermal_device_pci_legacy pcspkr processor_thermal_device dell_wmi_sysman dell_smbios soundcore ledtrig_audio mei_me rfkill processor_thermal_rfim i2c_i801 wmi_bmof dcdbas processor_thermal_mbox mei i2c_smbus firmware_attributes_class dell_wmi_descriptor processor_thermal_rapl joydev intel_rapl_common idma64 int3403_thermal
 int340x_thermal_zone intel_hid int3400_thermal intel_vsec intel_soc_dts_iosf sparse_keymap acpi_thermal_rel igen6_edac acpi_tad acpi_pad loop zram i915 drm_buddy nvme drm_display_helper nvme_core crct10dif_pclmul crc32_pclmul crc32c_intel cec polyval_clmulni hid_multitouch polyval_generic ghash_clmulni_intel r8169 sha512_ssse3 serio_raw nvme_common ttm video i2c_hid_acpi i2c_hid wmi pinctrl_tigerlake hid_jabra ip6_tables ip_tables fuse
CPU: 5 PID: 17251 Comm: vmx-vcpu-0 Tainted: G        W  OE      6.2.7-200.fc37.x86_64 #1
Hardware name: Dell Inc. Vostro 3500/0NX5H3, BIOS 1.11.0 12/16/2021
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Code: 3d 23 78 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 e6 7b c1 4c 89 ee 48 c7 c7 00 e7 7b c1 c6 05 04 78 00 00 01 e8 8d ff 94 d4 <0f> 0b e9 6a ff ff ff 5b 48 c7 c7 80 e6 7b c1 5d 41 5c 41 5d 41 5e
RSP: 0018:ffffadcfe244fc30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff893cc0f40400 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff978c1316 RDI: 00000000ffffffff
RBP: ffff893cd12fff80 R08: 0000000000000000 R09: ffffadcfe244fac0
R10: 0000000000000003 R11: ffffffff981447c8 R12: ffff8938c6bf3688
R13: 000000000000001c R14: ffff893cd12fff88 R15: ffff8938c6bf3680
FS:  00007fa8c4b5b6c0(0000) GS:ffff89402f740000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000564f483e4c40 CR3: 00000004c34ce004 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? __pfx_VNetUserListenerEventHandler+0x10/0x10 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x10e0 [vmnet]
 VNetFileOpUnlockedIoctl+0x4e8/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7faa32f23d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fa8c4b57530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fa8bc02ac30 RCX: 00007faa32f23d6f
RDX: 00007fa8c4b57598 RSI: 00000000400899e2 RDI: 00000000000000ad
RBP: 0000000000000001 R08: 0000000000000020 R09: 00007fa8c4b58160
R10: 00007fa8bc027350 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fa8c4b57600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>