Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #747558
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-12
Last occurrence
2023-02-12
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
vbsf_dentry_revalidate
vboxsf 0x4f
2
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
3
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
4
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
5
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
6
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
7
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
8
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
9
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
10
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
11
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
12
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
13
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
14
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
15
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
WARNING: CPU: 11 PID: 3409 at /tmp/vbox.0/utils.c:591 vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Modules linked in: uinput snd_seq_dummy snd_hrtimer vboxvideo(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set rfkill nfnetlink ebtable_filter ebtables ip6table_filter iptable_filter qrtr vboxsf(OE) sunrpc binfmt_misc intel_rapl_msr intel_rapl_common squashfs loop kvm_amd ccp kvm snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device irqbypass snd_pcm snd_timer snd soundcore i2c_piix4 pcspkr joydev zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel vmwgfx sha512_ssse3 hid_multitouch
 serio_raw e1000 drm_ttm_helper ttm video vboxguest(OE) wmi ata_generic pata_acpi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 11 PID: 3409 Comm: DefaultDispatch Tainted: G        W  OE      6.1.10-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Code: cf fd ff ff b9 06 00 00 00 4c 89 fe 4c 89 14 24 48 c7 c2 e0 a8 79 c0 48 c7 c7 90 a8 79 c0 c6 05 04 a6 00 00 01 e8 54 5c 5d c4 <0f> 0b 4c 8b 14 24 e9 9e fd ff ff 83 f8 98 41 bb b9 ff ff ff b8 fe
RSP: 0018:ffff9f3d48237b20 EFLAGS: 00010296
RAX: 0000000000000074 RBX: ffff8db88fa72e40 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff8574c4bb RDI: 00000000ffffffff
RBP: ffff8db7758f015c R08: 0000000000000000 R09: ffff9f3d482379c0
R10: 0000000000000003 R11: ffffffff861465a8 R12: ffff8db8b0f6c000
R13: ffff8db84b354480 R14: ffff8db843766600 R15: 0000000000000012
FS:  00007ff93c1e16c0(0000) GS:ffff8dbf3fcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff870070bc8 CR3: 00000001708a0000 CR4: 00000000000506e0
Call Trace:
 <TASK>
 vbsf_dentry_revalidate+0x4f/0xb0 [vboxsf]
 lookup_fast+0x74/0xe0
 walk_component+0x1f/0x150
 link_path_walk.part.0.constprop.0+0x21e/0x380
 ? path_init+0x287/0x3c0
 path_lookupat+0x3e/0x190
 filename_lookup+0xd3/0x1c0
 ? __check_object_size+0x1e6/0x200
 vfs_statx+0x8e/0x150
 vfs_fstatat+0x51/0x70
 __do_sys_newstat+0x2f/0x50
 do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7ff953b2f7e8
Code: 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 89 f8 48 89 f7 48 89 d6 83 f8 01 77 2f b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 08 c3 0f 1f 80 00 00 00 00 48 8b 15 11 66 0c
RSP: 002b:00007ff93c1dfb48 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
RAX: ffffffffffffffda RBX: 00007ff8ac001298 RCX: 00007ff953b2f7e8
RDX: 00007ff93c1dfb50 RSI: 00007ff93c1dfb50 RDI: 00007ff8b0018a30
RBP: 00007ff93c1dfc00 R08: 00000000f636b529 R09: 00000000f645f6c0
R10: 0000000000000010 R11: 0000000000000246 R12: 00007ff8b0000eb0
R13: 0000000000000000 R14: 00007ff8b0018a30 R15: 00007ff8ac000ff0
 </TASK>