Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #727927
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-04-26
Last occurrence
2023-04-26
Unique reports
1
Quality
-49

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? VNetBridgeUp
vmnet 0x2a5
2
VNetBridgeUp
vmnet 0x2a5
3
VNetBridgeUp
vmnet 0x2a5
4
VNetBridgeUp
vmnet 0x2a5
5
? suspend_devices_and_enter
vmlinux 0x17c
6
suspend_devices_and_enter
vmlinux 0x17c
7
suspend_devices_and_enter
vmlinux 0x17c
8
? suspend_devices_and_enter
vmlinux 0x17c
9
? suspend_devices_and_enter
vmlinux 0x17c
10
? suspend_devices_and_enter
vmlinux 0x17c
11
? suspend_devices_and_enter
vmlinux 0x17c
12
? suspend_devices_and_enter
vmlinux 0x17c
13
? suspend_devices_and_enter
vmlinux 0x17c
14
? suspend_devices_and_enter
vmlinux 0x17c
15
? suspend_devices_and_enter
vmlinux 0x17c
16
? suspend_devices_and_enter
vmlinux 0x17c
17
suspend_devices_and_enter
vmlinux 0x17c
WARNING: CPU: 6 PID: 113911 at /tmp/modconfig-jl9v3h/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Modules linked in: nf_conntrack_netlink xt_addrtype br_netfilter overlay tun tls snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nfnetlink ebtable_filter ebtables iptable_filter qrtr vmnet(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) sunrpc binfmt_misc snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio intel_rapl_msr nvidia_drm(POE) intel_rapl_common nvidia_modeset(POE) snd_hda_intel edac_mce_amd snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec kvm_amd snd_hda_core snd_hwdep snd_seq raid1 kvm nvidia(POE) snd_seq_device
 snd_pcm irqbypass snd_timer joydev gigabyte_wmi rapl wmi_bmof snd video i2c_piix4 pcspkr soundcore k10temp acpi_cpufreq loop zram hid_logitech_hidpp crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel uas nvme sha512_ssse3 usb_storage ccp hid_logitech_dj serio_raw nvme_core sp5100_tco r8169 nvme_common wmi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 6 PID: 113911 Comm: vmx-vcpu-0 Tainted: P        W  OE      6.2.9-200.fc37.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. X570 GAMING X/X570 GAMING X, BIOS F38a 02/08/2023
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Code: 3d 33 78 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 06 8f c0 4c 89 ee 48 c7 c7 00 07 8f c0 c6 05 14 78 00 00 01 e8 9d df 81 ce <0f> 0b e9 6a ff ff ff 5b 48 c7 c7 80 06 8f c0 5d 41 5c 41 5d 41 5e
RSP: 0018:ffffc421d0b87c08 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffa051dec73400 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff908c0f46 RDI: 00000000ffffffff
RBP: ffffa05013686380 R08: 0000000000000000 R09: ffffc421d0b87a98
R10: 0000000000000003 R11: ffffffff911447c8 R12: ffffa05032b1b5c8
R13: 000000000000001c R14: ffffa05013686388 R15: ffffa05032b1b5c0
FS:  00007f553ee616c0(0000) GS:ffffa0571ed80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f541405f000 CR3: 0000000194070000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? __pfx_VNetUserListenerEventHandler+0x10/0x10 [vmnet]
 VNetEvent_CreateListener+0xac/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x10f0 [vmnet]
 VNetFileOpUnlockedIoctl+0x4e8/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 __x64_sys_ioctl+0x8d/0xd0
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? __x64_sys_ioctl+0xa8/0xd0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f555d223d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007f553ee5d5e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f541403ade0 RCX: 00007f555d223d6f
RDX: 00007f553ee5d648 RSI: 00000000400899e2 RDI: 0000000000000132
RBP: 0000000000000001 R08: 00007f541403adf8 R09: 00007f553ee5e160
R10: 00007f5414037b40 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f553ee5d6b0 R14: 0000000000989680 R15: 00000000000186a0
 </TASK>