Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #753594
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-18
Last occurrence
2023-03-19
Unique reports
1
Quality
-28

Statistics

Operating system Unique / Total count
Fedora 36 1 / 3
Operating system Count
Fedora 36 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kernfs_fop_write_iter
vmlinux 0x11b
2
? kernfs_fop_write_iter
vmlinux 0x11b
3
kernfs_fop_write_iter
vmlinux 0x11b
4
kernfs_fop_write_iter
vmlinux 0x11b
5
kernfs_fop_write_iter
vmlinux 0x11b
6
kernfs_fop_write_iter
vmlinux 0x11b
7
? kernfs_fop_write_iter
vmlinux 0x11b
8
? kernfs_fop_write_iter
vmlinux 0x11b
9
? kernfs_fop_write_iter
vmlinux 0x11b
10
kernfs_fop_write_iter
vmlinux 0x11b
WARNING: CPU: 5 PID: 1038 at fs/open.c:937 do_dentry_open+0x36b/0x410
Modules linked in: rfcomm snd_seq_dummy snd_hrtimer nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet 8021q nft_fib_ipv4 nft_fib_ipv6 garp nft_fib mrp stp llc nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink vmnet(O) qrtr ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(O) bnep binfmt_misc vfat fat snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof intel_rapl_msr snd_sof_utils intel_rapl_common soundwire_bus intel_tcc_cooling iwlmvm x86_pkg_temp_thermal intel_powerclamp snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp coretemp snd_soc_acpi_intel_match mei_pxp snd_soc_acpi mei_hdcp mac80211 ee1004 kvm_intel iTCO_wdt intel_pmc_bxt iTCO_vendor_support snd_soc_core snd_hda_codec_realtek
 libarc4 kvm snd_hda_codec_generic snd_compress ac97_bus snd_pcm_dmaengine snd_hda_codec_hdmi irqbypass asus_ec_sensors snd_usb_audio snd_hda_intel rapl iwlwifi btusb snd_intel_dspcfg intel_cstate snd_intel_sdw_acpi snd_hda_codec snd_usbmidi_lib snd_rawmidi eeepc_wmi btrtl asus_wmi btbcm mc snd_hda_core intel_uncore btintel snd_hwdep snd_seq ledtrig_audio btmtk sparse_keymap pcspkr cfg80211 snd_seq_device platform_profile bluetooth wmi_bmof snd_pcm i2c_i801 i2c_smbus snd_timer xpad snd mei_me joydev ff_memless soundcore mei rfkill acpi_pad acpi_tad zram nvidia_drm(PO) nvidia_modeset(PO) nvidia(PO) crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic mxm_wmi nvme ghash_clmulni_intel sha512_ssse3 e1000e nvme_core nvme_common video wmi pinctrl_cannonlake ip6_tables ip_tables fuse
CPU: 5 PID: 1038 Comm: vmnet-bridge Tainted: P        W IO       6.1.14-100.fc36.x86_64 #1
Hardware name: ASUS System Product Name/ROG MAXIMUS XI HERO (WI-FI), BIOS 2004 11/02/2021
RIP: 0010:do_dentry_open+0x36b/0x410
Code: 8b 90 64 01 00 00 85 d2 74 73 f0 ff 88 64 01 00 00 e9 21 fe ff ff c7 43 44 00 40 08 00 48 c7 43 28 20 ff 27 88 e9 79 ff ff ff <0f> 0b 41 bc ea ff ff ff e9 d7 fd ff ff 8b 85 60 01 00 00 85 c0 78
RSP: 0018:ffffa8f0c1f43ca0 EFLAGS: 00010206
RAX: ffffffffc47ce760 RBX: ffff8a7d0a29b000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 185c34e016722509 RDI: 00000000ffffffff
RBP: ffff8a7d1e4b7190 R08: ffff8a7d0c88b458 R09: 0000000000000228
R10: 0000000000000003 R11: ffffffff89147448 R12: 000000000000000c
R13: ffffffff873cdb90 R14: ffff8a7d0a29b010 R15: ffff8a7d0a29b000
FS:  00007f606528b740(0000) GS:ffff8a8c2dd40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f006829e5a0 CR3: 0000000113e46004 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 path_openat+0xb56/0x1230
 ? sock_sendmsg+0x5c/0x70
 do_filp_open+0x9e/0x130
 do_sys_openat2+0x96/0x150
 __x64_sys_openat+0x5c/0x80
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f60651018e8
Code: f0 25 00 00 41 00 3d 00 00 41 00 74 45 64 8b 04 25 18 00 00 00 85 c0 75 69 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 8c 00 00 00 48 8b 54 24 28 64 48 2b 14 25
RSP: 002b:00007ffe374793e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f60651018e8
RDX: 0000000000000002 RSI: 00005641c47cd3a0 RDI: 00000000ffffff9c
RBP: 00005641c47cd3a0 R08: 0000000000000000 R09: 0000000000000064
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
R13: 00007ffe374794f0 R14: 000000000000000b R15: 0000000000000000
 </TASK>