Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #673972
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-04-30
Last occurrence
2023-05-03
Unique reports
2
Quality
-34

Statistics

Operating system Unique / Total count
Fedora 37 2 / 2
Operating system Count
Fedora 37 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
vbsf_inode_atomic_open
vboxsf 0x44
2
pci_pm_suspend
vmlinux 0x78
3
pci_pm_suspend
vmlinux 0x78
4
pci_pm_suspend
vmlinux 0x78
5
pci_pm_suspend
vmlinux 0x78
6
pci_pm_suspend
vmlinux 0x78
7
pci_pm_suspend
vmlinux 0x78
8
? pci_pm_suspend
vmlinux 0x78
9
? pci_pm_suspend
vmlinux 0x78
10
? pci_pm_suspend
vmlinux 0x78
11
? pci_pm_suspend
vmlinux 0x78
12
? pci_pm_suspend
vmlinux 0x78
13
pci_pm_suspend
vmlinux 0x78
WARNING: CPU: 2 PID: 315096 at /tmp/vbox.0/utils.c:591 vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Modules linked in: vhost_net vhost vhost_iotlb tap tun tls uinput snd_seq_dummy snd_hrtimer vboxvideo(OE) rfkill ip_set nf_tables nfnetlink qrtr vboxsf(OE) sunrpc binfmt_misc vfat fat intel_rapl_msr intel_rapl_common snd_intel8x0 snd_ac97_codec ac97_bus snd_seq rapl snd_seq_device pcspkr snd_pcm snd_timer snd joydev soundcore i2c_piix4 loop zram xfs crct10dif_pclmul crc32_pclmul vmwgfx nvme crc32c_intel video polyval_clmulni polyval_generic wmi nvme_core ghash_clmulni_intel drm_ttm_helper sha512_ssse3 serio_raw e1000 ttm nvme_common vboxguest(OE) ip6_tables ip_tables fuse
CPU: 2 PID: 315096 Comm: updatedb Tainted: G        W  OE      6.2.12-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Code: cf fd ff ff b9 06 00 00 00 4c 89 fe 4c 89 14 24 48 c7 c2 e0 08 9d c0 48 c7 c7 90 08 9d c0 c6 05 f4 b1 00 00 01 e8 be 04 74 f4 <0f> 0b 4c 8b 14 24 e9 9e fd ff ff 83 f8 98 41 bb b9 ff ff ff b8 fe
RSP: 0018:ffffb43812cb3b90 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9a0e5b9e2a60 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffb68c1b46 RDI: 00000000ffffffff
RBP: ffff9a0e5b8b015c R08: 0000000000000000 R09: ffffb43812cb3a20
R10: 0000000000000003 R11: ffffffffb71447c8 R12: ffff9a0f98137480
R13: ffff9a105570d840 R14: ffff9a0e88139200 R15: 0000000000000012
FS:  00007fc287b1d740(0000) GS:ffff9a1083900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ab0fe84be0 CR3: 0000000248504006 CR4: 00000000000706e0
Call Trace:
 <TASK>
 vbsf_dentry_revalidate+0x4f/0xb0 [vboxsf]
 lookup_fast+0x74/0xe0
 path_openat+0x106/0x1270
 do_filp_open+0xaf/0x160
 do_sys_openat2+0xaf/0x170
 __x64_sys_openat+0x6a/0xa0
 do_syscall_64+0x5b/0x80
 ? handle_mm_fault+0xff/0x2f0
 ? preempt_count_add+0x47/0xa0
 ? up_read+0x37/0x70
 ? do_user_addr_fault+0x1ef/0x710
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fc28771e0b3
Code: 24 38 31 c0 f6 c2 40 75 4e 89 d0 45 31 d2 25 00 00 41 00 3d 00 00 41 00 74 3d 80 3d 4e 05 0e 00 00 74 61 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a1 00 00 00 48 8b 54 24 38 64 48 2b 14 25
RSP: 002b:00007fff0d84edf0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007fc28771e0b3
RDX: 0000000000050000 RSI: 000055ab0fe7fec0 RDI: 0000000000000006
RBP: 000055ab0fe7fec0 R08: 000055ab0f8277d0 R09: 0000000000000020
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 000055ab0fe84cd0 R14: 000055ab0d9ca2fd R15: 000055ab0fe7feb0
 </TASK>