Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #544706
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-31
Last occurrence
2023-05-05
Unique reports
1
Quality
-23

Graphs

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Fedora 38 1 / 1
Operating system Count
Fedora 37 1
Fedora 38 1
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
__pfx_VNetUserListenerEventHandler
vmnet 0x10
2
__pfx_VNetUserListenerEventHandler
vmnet 0x10
3
__pfx_VNetUserListenerEventHandler
vmnet 0x10
4
? do_futex
vmlinux 0xda
5
? do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
? do_futex
vmlinux 0xda
9
do_futex
vmlinux 0xda
WARNING: CPU: 0 PID: 884 at /tmp/modconfig-7sLUHv/vmnet-only/vnetEvent.c:405 VNetEvent_Send+0x14c/0x180 [vmnet]
Modules linked in: qrtr vmnet(OE) ppdev parport_pc parport rfkill vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) sunrpc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel binfmt_misc vfat snd_hda_codec_realtek fat snd_hda_codec_generic kvm snd_hda_codec_hdmi ledtrig_audio snd_hda_intel iTCO_wdt mei_pxp mei_hdcp intel_pmc_bxt at24 iTCO_vendor_support snd_intel_dspcfg irqbypass snd_intel_sdw_acpi rapl snd_hda_codec intel_cstate intel_uncore pcspkr snd_hda_core snd_hwdep snd_seq i2c_i801 snd_seq_device i2c_smbus lpc_ich snd_pcm snd_timer mei_me snd mei soundcore loop zram nouveau crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic drm_ttm_helper ttm mxm_wmi drm_display_helper ghash_clmulni_intel r8169 sha512_ssse3 cec serio_raw video wmi ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 0 PID: 884 Comm: vmnet-bridge Tainted: G           OE      6.2.7-200.fc37.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./H61M-VG3, BIOS P1.80 06/18/2013
RIP: 0010:VNetEvent_Send+0x14c/0x180 [vmnet]
Code: 00 00 0f 85 61 ff ff ff b9 14 00 00 00 48 c7 c2 80 75 e4 c0 4c 89 ee 48 c7 c7 c8 75 e4 c0 c6 05 aa 7d 00 00 01 e8 34 75 2c d5 <0f> 0b e9 38 ff ff ff b8 ea ff ff ff eb 81 b8 f0 ff ff ff e9 77 ff
RSP: 0018:ffffb36141457c90 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9f95a4437c08 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff978c1316 RDI: 00000000ffffffff
RBP: ffffb36141457cc0 R08: 0000000000000000 R09: ffffb36141457b20
R10: 0000000000000003 R11: ffffffff981447c8 R12: ffff9f95a4437b80
R13: 000000000000001c R14: ffff9f959e4aa060 R15: 0000000000000000
FS:  00007f15e8b6d740(0000) GS:ffff9f9696c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f15e8c211f0 CR3: 000000011e572004 CR4: 00000000000606f0
Call Trace:
 <TASK>
 VNetBridgeUp+0x2a5/0x360 [vmnet]
 VNetBridge_Create+0x1d8/0x220 [vmnet]
 VNetFileOpUnlockedIoctl+0x3a4/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 ? syscall_exit_to_user_mode+0x17/0x40
 __x64_sys_ioctl+0x90/0xd0
 do_syscall_64+0x5b/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f15e8c70d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007ffee70bc1b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055fb82292050 RCX: 00007f15e8c70d6f
RDX: 00007ffee70bc240 RSI: 00000000402499e4 RDI: 0000000000000008
RBP: 000055fb81db3180 R08: 000055fb82292080 R09: 0000000000000020
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffee70bc220
R13: 00007ffee70bc240 R14: 000055fb82292058 R15: 0000000000000000
 </TASK>