Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #747558
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-12
Last occurrence
2023-03-12
Unique reports
2
Quality
-49

Statistics

Operating system Unique / Total count
Fedora 37 2 / 3
Operating system Count
Fedora 37 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
vbsf_dentry_revalidate
vboxsf 0x4f
2
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
3
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
4
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
5
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
6
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
7
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
8
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
9
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
10
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
11
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
12
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
13
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
14
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
15
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
16
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
17
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
18
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
19
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
WARNING: CPU: 2 PID: 2022 at /tmp/vbox.0/utils.c:591 vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Modules linked in: snd_seq_dummy snd_hrtimer uinput vboxvideo(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security rfkill ip_set nf_tables nfnetlink ip6table_filter iptable_filter qrtr vboxsf(OE) sunrpc intel_rapl_msr binfmt_misc intel_rapl_common kvm_intel snd_intel8x0 snd_ac97_codec kvm ac97_bus snd_seq snd_seq_device snd_pcm irqbypass pktcdvd rapl snd_timer snd i2c_piix4 joydev soundcore pcspkr zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic vmwgfx ghash_clmulni_intel drm_ttm_helper ttm sha512_ssse3 e1000 serio_raw vboxguest(OE) video wmi ata_generic
 pata_acpi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 2 PID: 2022 Comm: plasmashell Tainted: G        W  OE      6.1.10-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Code: cf fd ff ff b9 06 00 00 00 4c 89 fe 4c 89 14 24 48 c7 c2 e0 e8 71 c0 48 c7 c7 90 e8 71 c0 c6 05 04 a6 00 00 01 e8 54 1c 65 cb <0f> 0b 4c 8b 14 24 e9 9e fd ff ff 83 f8 98 41 bb b9 ff ff ff b8 fe
RSP: 0018:ffffb7b0c4ac3ab0 EFLAGS: 00010296
RAX: 0000000000000073 RBX: ffff92a46172a000 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff8c74c4bb RDI: 00000000ffffffff
RBP: ffff92a3354b0144 R08: 0000000000000000 R09: ffffb7b0c4ac3950
R10: 0000000000000003 R11: ffffffff8d1465a8 R12: ffff92a4591a3700
R13: ffff92a405c38f00 R14: ffff92a4037fdd80 R15: 0000000000000009
FS:  00007f4ecbd0ce40(0000) GS:ffff92a70fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4e75ffbd58 CR3: 00000001571fc001 CR4: 00000000000706e0
Call Trace:
 <TASK>
 vbsf_dentry_revalidate+0x4f/0xb0 [vboxsf]
 lookup_fast+0x74/0xe0
 walk_component+0x1f/0x150
 link_path_walk.part.0.constprop.0+0x21e/0x380
 ? path_init+0x287/0x3c0
 path_lookupat+0x3e/0x190
 filename_lookup+0xd3/0x1c0
 vfs_statx+0x8e/0x150
 do_statx+0x50/0x80
 __x64_sys_statx+0x62/0x80
 do_syscall_64+0x5b/0x80
 ? __x64_sys_inotify_add_watch+0x104/0x150
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? __x64_sys_statx+0x6c/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f4ecdd1da5e
Code: 83 0d 00 ba ff ff ff ff 64 c7 00 16 00 00 00 e9 a5 fd ff ff e8 d3 0f 02 00 0f 1f 00 f3 0f 1e fa 41 89 ca b8 4c 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 2a 89 c1 85 c0 74 0f 48 8b 05 9d 83 0d 00 64
RSP: 002b:00007ffcd2dbebf8 EFLAGS: 00000206 ORIG_RAX: 000000000000014c
RAX: ffffffffffffffda RBX: 0000556387a25370 RCX: 00007f4ecdd1da5e
RDX: 0000000000000800 RSI: 0000556387aa3928 RDI: 00000000ffffff9c
RBP: 0000000072a67077 R08: 00007ffcd2dbec40 R09: 00000000000000c0
R10: 0000000000000fff R11: 0000000000000206 R12: 0000556387a25358
R13: 00007ffcd2dbec20 R14: 0000000000020000 R15: 00007ffcd2dbec18
 </TASK>