Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #761632
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-19
Last occurrence
2023-05-03
Unique reports
3
Quality
-35

Statistics

Operating system Unique / Total count
Fedora 37 3 / 19
Operating system Count
Fedora 37 19
Architecture Count
x86_64 19

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
schedule
vmlinux 0x67
2
schedule
vmlinux 0x67
3
schedule
vmlinux 0x67
4
? schedule
vmlinux 0x67
5
schedule
vmlinux 0x67
6
schedule
vmlinux 0x67
7
? schedule
vmlinux 0x67
8
schedule
vmlinux 0x67
9
schedule
vmlinux 0x67
10
schedule
vmlinux 0x67
11
? schedule
vmlinux 0x67
12
? schedule
vmlinux 0x67
13
? schedule
vmlinux 0x67
14
schedule
vmlinux 0x67
WARNING: CPU: 0 PID: 7186 at /tmp/vbox.0/dirops.c:690 vbsf_inode_lookup+0x378/0x3b0 [vboxsf]
Modules linked in: tls uinput isofs snd_seq_dummy snd_hrtimer rfkill vboxvideo drm_vram_helper nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr vboxsf(OE) sunrpc binfmt_misc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq intel_rapl_msr snd_seq_device intel_rapl_common snd_pcm snd_timer rapl joydev snd soundcore pcspkr i2c_piix4 zram vmwgfx crc32c_intel sha512_ssse3 e1000 serio_raw drm_ttm_helper video wmi ttm vboxguest(OE) ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 0 PID: 7186 Comm: pool-gvfsd-admi Tainted: G           OE      6.1.14-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_lookup+0x378/0x3b0 [vboxsf]
Code: 00 00 0f 85 84 fd ff ff b9 06 00 00 00 48 c7 c2 28 e4 5f c0 4c 89 fe 48 c7 c7 78 e1 5f c0 c6 05 69 f9 00 00 01 e8 2e 60 77 d5 <0f> 0b 48 8b 74 24 08 e9 56 fd ff ff 49 8b 4c 24 18 49 c7 c6 f4 ff
RSP: 0018:ffffa7b84cebbbc8 EFLAGS: 00010282
RAX: 0000000000000074 RBX: ffff979b354f0048 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff96749b33 RDI: 00000000ffffffff
RBP: ffff979c05635180 R08: 0000000000000000 R09: ffffa7b84cebba68
R10: 0000000000000003 R11: ffffffff97147448 R12: ffff979da65766c0
R13: ffff979c15998c80 R14: ffff979b354f0144 R15: 0000000000000008
FS:  00007f7673fff6c0(0000) GS:ffff979dc6a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f766c018020 CR3: 00000000484a4001 CR4: 00000000000306f0
Call Trace:
 <TASK>
 __lookup_slow+0x73/0x120
 walk_component+0xdb/0x150
 link_path_walk.part.0.constprop.0+0x21e/0x380
 ? path_init+0x287/0x3c0
 path_lookupat+0x3e/0x190
 filename_lookup+0xd3/0x1c0
 ? getname_flags.part.0+0x4b/0x1c0
 user_path_at_empty+0x36/0x50
 do_faccessat+0x7e/0x250
 do_syscall_64+0x58/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f768fbfe34b
Code: 77 05 c3 0f 1f 40 00 48 8b 15 e1 7a 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 0f 1f 40 00 f3 0f 1e fa b8 15 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 b1 7a 0d 00 f7 d8
RSP: 002b:00007f7673ffe818 EFLAGS: 00000202 ORIG_RAX: 0000000000000015
RAX: ffffffffffffffda RBX: 00007f7673ffea60 RCX: 00007f768fbfe34b
RDX: 0000000000400000 RSI: 0000000000000002 RDI: 00007f766c0188a0
RBP: 00007f766c0188a0 R08: 00007f7673ffea60 R09: 00000000fff00000
R10: 0000000000000000 R11: 0000000000000202 R12: 00007f766c018840
R13: 00007f766c0188a0 R14: 0000000000000000 R15: 00007f7673ffeae0
 </TASK>