Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #747558
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-02-14
Last occurrence
2023-02-14
Unique reports
1
Quality
-44

Statistics

Operating system Unique / Total count
Fedora 37 1 / 1
Operating system Count
Fedora 37 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
vbsf_dentry_revalidate
vboxsf 0x4f
2
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
3
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
4
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
5
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
6
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
7
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
8
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
9
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
10
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
11
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
12
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
13
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
14
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
15
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
16
? ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
17
ioctl_has_perm.constprop.0.isra.0
vmlinux 0xca
WARNING: CPU: 0 PID: 7588 at /tmp/vbox.0/utils.c:591 vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Modules linked in: tun tls uinput isofs snd_seq_dummy snd_hrtimer xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp bridge stp llc rfkill vboxvideo(OE) nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables nfnetlink ip6table_filter iptable_filter qrtr vboxsf(OE) sunrpc binfmt_misc snd_intel8x0 snd_ac97_codec intel_rapl_msr ac97_bus intel_rapl_common snd_seq snd_seq_device snd_pcm rapl snd_timer snd joydev pcspkr e1000 soundcore i2c_piix4 zram crct10dif_pclmul crc32_pclmul vmwgfx crc32c_intel polyval_generic drm_ttm_helper ghash_clmulni_intel video sha512_ssse3 serio_raw ttm vboxguest(OE) wmi ata_generic pata_acpi scsi_dh_rdac scsi_dh_emc
 scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 0 PID: 7588 Comm: gvfsd-recent Tainted: G        W  OE      6.1.10-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_revalidate_worker+0x542/0x580 [vboxsf]
Code: cf fd ff ff b9 06 00 00 00 4c 89 fe 4c 89 14 24 48 c7 c2 e0 b8 95 c0 48 c7 c7 90 b8 95 c0 c6 05 04 a6 00 00 01 e8 54 4c 41 ec <0f> 0b 4c 8b 14 24 e9 9e fd ff ff 83 f8 98 41 bb b9 ff ff ff b8 fe
RSP: 0018:ffffa2b248b1fba0 EFLAGS: 00010292
RAX: 0000000000000073 RBX: ffff8af5024bd898 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffffad74c4bb RDI: 00000000ffffffff
RBP: ffff8af4358f015c R08: 0000000000000000 R09: ffffa2b248b1fa40
R10: 0000000000000003 R11: ffffffffae1465a8 R12: ffff8af63637f200
R13: ffff8af5df7a3840 R14: ffff8af50914dc80 R15: 0000000000000007
FS:  00007ff0fe5c6a00(0000) GS:ffff8af80fe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f647400d048 CR3: 000000022fbd8002 CR4: 00000000000306f0
Call Trace:
 <TASK>
 vbsf_dentry_revalidate+0x4f/0xb0 [vboxsf]
 lookup_fast+0x71/0xe0
 walk_component+0x1f/0x150
 link_path_walk.part.0.constprop.0+0x21e/0x380
 ? path_init+0x287/0x3c0
 path_lookupat+0x3e/0x190
 filename_lookup+0xd3/0x1c0
 ? getname_flags.part.0+0x4b/0x1c0
 user_path_at_empty+0x36/0x50
 do_faccessat+0x7e/0x250
 do_syscall_64+0x58/0x80
 ? do_faccessat+0x123/0x250
 ? fpregs_restore_userregs+0x12/0xe0
 ? exit_to_user_mode_prepare+0x18f/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7ff0fec1234b
Code: 77 05 c3 0f 1f 40 00 48 8b 15 e1 7a 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 0f 1f 40 00 f3 0f 1e fa b8 15 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 b1 7a 0d 00 f7 d8
RSP: 002b:00007ffcfc347208 EFLAGS: 00000246 ORIG_RAX: 0000000000000015
RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007ff0fec1234b
RDX: 000000055ff42cda RSI: 0000000000000000 RDI: 000055ff42cda920
RBP: 000055ff42cda920 R08: 000055ff42cdae00 R09: 0000000000000010
R10: 000055ff42cdb870 R11: 0000000000000246 R12: 000000000000003b
R13: 000055ff42cda920 R14: 000055ff42cd9f60 R15: 000055ff42cd6bb0
 </TASK>