Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #727927
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-04-16
Last occurrence
2023-04-16
Unique reports
1
Quality
-50

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
VNetBridgeUp
vmnet 0x2a5
2
VNetBridgeUp
vmnet 0x2a5
3
VNetBridgeUp
vmnet 0x2a5
4
? suspend_devices_and_enter
vmlinux 0x17c
5
suspend_devices_and_enter
vmlinux 0x17c
6
suspend_devices_and_enter
vmlinux 0x17c
7
? suspend_devices_and_enter
vmlinux 0x17c
8
? suspend_devices_and_enter
vmlinux 0x17c
9
? suspend_devices_and_enter
vmlinux 0x17c
10
? suspend_devices_and_enter
vmlinux 0x17c
11
? suspend_devices_and_enter
vmlinux 0x17c
12
? suspend_devices_and_enter
vmlinux 0x17c
13
? suspend_devices_and_enter
vmlinux 0x17c
14
? suspend_devices_and_enter
vmlinux 0x17c
15
? suspend_devices_and_enter
vmlinux 0x17c
16
? suspend_devices_and_enter
vmlinux 0x17c
17
? suspend_devices_and_enter
vmlinux 0x17c
18
suspend_devices_and_enter
vmlinux 0x17c
WARNING: CPU: 1 PID: 5949 at /tmp/modconfig-rzUoi2/vmnet-only/vnetEvent.c:405 VNetEvent_Send+0x14c/0x180 [vmnet]
Modules linked in: vmnet(OE) vmmon(OE) tls uinput uhid rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink ppdev parport_pc parport vmw_vsock_vmci_transport qrtr vsock vmw_vmci bnep sunrpc snd_ctl_led snd_soc_skl_hda_dsp snd_soc_intel_hda_dsp_common snd_soc_hdac_hdmi snd_sof_probes binfmt_misc vfat fat snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_soc_dmic snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel iwlmvm soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_hdac_hda mac80211 snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi soundwire_bus snd_soc_core snd_compress x86_pkg_temp_thermal ac97_bus intel_powerclamp
 snd_pcm_dmaengine libarc4 coretemp kvm_intel snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi mei_pxp mei_hdcp ee1004 kvm snd_hda_codec snd_hda_core squashfs btusb irqbypass iTCO_wdt snd_hwdep btrtl uvcvideo iwlwifi rapl intel_pmc_bxt btbcm videobuf2_vmalloc snd_seq iTCO_vendor_support videobuf2_memops snd_seq_device btintel intel_cstate videobuf2_v4l2 hp_wmi intel_rapl_msr btmtk snd_pcm intel_uncore videobuf2_common cfg80211 bluetooth platform_profile wmi_bmof pcspkr videodev snd_timer i2c_i801 mei_me snd spi_pxa2xx_platform mc mei joydev dw_dmac i2c_smbus rfkill soundcore idma64 int3403_thermal processor_thermal_device_pci intel_hid int3400_thermal processor_thermal_device sparse_keymap acpi_tad acpi_thermal_rel acpi_pad processor_thermal_rfim processor_thermal_mbox processor_thermal_rapl intel_rapl_common int340x_thermal_zone igen6_edac loop zram i915 nouveau nvme nvme_core drm_ttm_helper drm_buddy mxm_wmi drm_display_helper crct10dif_pclmul crc32_pclmul crc32c_intel
 polyval_clmulni ucsi_acpi hid_multitouch polyval_generic ghash_clmulni_intel cec sha512_ssse3 typec_ucsi r8169 serio_raw nvme_common ttm typec i2c_hid_acpi i2c_hid video wmi pinctrl_tigerlake ip6_tables ip_tables fuse
CPU: 1 PID: 5949 Comm: vmnet-bridge Tainted: G           OE      6.2.9-200.fc37.x86_64 #1
Hardware name: HP HP ZHAN 66 Pro 14 inch G5 Notebook PC/8979, BIOS U73 Ver. 01.03.02 05/24/2022
RIP: 0010:VNetEvent_Send+0x14c/0x180 [vmnet]
Code: 00 00 0f 85 61 ff ff ff b9 14 00 00 00 48 c7 c2 80 e5 e1 c1 4c 89 ee 48 c7 c7 c8 e5 e1 c1 c6 05 aa 7d 00 00 01 e8 34 05 2f c8 <0f> 0b e9 38 ff ff ff b8 ea ff ff ff eb 81 b8 f0 ff ff ff e9 77 ff
RSP: 0018:ffffc1ac014a3bb0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff9f94e4028148 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff8b8c0f46 RDI: 00000000ffffffff
RBP: ffffc1ac014a3be0 R08: 0000000000000000 R09: ffffc1ac014a3a40
R10: 0000000000000003 R11: ffffffff8c1447c8 R12: ffff9f94e4028a40
R13: 000000000000001c R14: ffff9f94c4af6060 R15: 0000000000000000
FS:  00007f1e2bb61740(0000) GS:ffff9f982f640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1e2bd04000 CR3: 0000000221820002 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 <TASK>
 VNetBridgeUp+0x2a5/0x360 [vmnet]
 VNetBridge_Create+0x1d8/0x220 [vmnet]
 VNetFileOpUnlockedIoctl+0x3a4/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? preempt_count_add+0x47/0xa0
 ? up_read+0x37/0x70
 ? do_user_addr_fault+0x1ef/0x710
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f1e2bc64d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fff4b974650 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000556eef8d0050 RCX: 00007f1e2bc64d6f
RDX: 00007fff4b9746e0 RSI: 00000000402499e4 RDI: 0000000000000008
RBP: 0000556eee581180 R08: 0000556eef8d0080 R09: 0000000000000020
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff4b9746c0
R13: 00007fff4b9746e0 R14: 0000556eef8d0058 R15: 0000000000000000
 </TASK>