Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #674268
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-29
Last occurrence
2023-07-07
Unique reports
5
Quality
-35

Statistics

Operating system Unique / Total count
Fedora 37 5 / 39
Operating system Count
Fedora 37 39
Architecture Count
x86_64 39

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? do_futex
vmlinux 0xda
2
do_futex
vmlinux 0xda
3
do_futex
vmlinux 0xda
4
do_futex
vmlinux 0xda
5
do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
do_futex
vmlinux 0xda
9
do_futex
vmlinux 0xda
10
? do_futex
vmlinux 0xda
11
? do_futex
vmlinux 0xda
12
? do_futex
vmlinux 0xda
13
? do_futex
vmlinux 0xda
14
do_futex
vmlinux 0xda
WARNING: CPU: 1 PID: 2841 at /tmp/vbox.0/dirops.c:690 vbsf_inode_lookup+0x39a/0x3e0 [vboxsf]
Modules linked in: uinput snd_seq_dummy snd_hrtimer vboxvideo(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat ip6table_filter iptable_mangle iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter bridge stp llc rpcrdma rdma_cm iw_cm ib_cm ib_core rfkill vboxsf(OE) binfmt_misc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq squashfs intel_rapl_msr snd_seq_device snd_pcm intel_rapl_common snd_timer rapl snd joydev soundcore pcspkr i2c_piix4 nfsd auth_rpcgss nfs_acl lockd grace sunrpc loop zram crct10dif_pclmul vmwgfx crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 e1000 serio_raw drm_ttm_helper vboxguest(OE) ttm video wmi ata_generic pata_acpi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 1 PID: 2841 Comm: gvfsd-trash Tainted: G           OE      6.2.7-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_inode_lookup+0x39a/0x3e0 [vboxsf]
Code: 00 00 0f 85 84 fd ff ff b9 06 00 00 00 48 c7 c2 28 44 8e c0 4c 89 fe 48 c7 c7 78 41 8e c0 c6 05 d7 08 01 00 01 e8 f6 1a 83 f8 <0f> 0b 48 8b 74 24 08 e9 56 fd ff ff 49 8b 4c 24 18 49 c7 c6 f4 ff
RSP: 0018:ffffb7e4c3d27b40 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff9db741170060 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffba8c1316 RDI: 00000000ffffffff
RBP: ffff9db852dde500 R08: 0000000000000000 R09: ffffb7e4c3d279d0
R10: 0000000000000003 R11: ffffffffbb1447c8 R12: ffff9db78e577180
R13: ffff9db8592ee700 R14: ffff9db74117015c R15: 000000000000000b
FS:  00007fecf8925a00(0000) GS:ffff9db85bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f69340a9048 CR3: 00000001154c0002 CR4: 00000000000706e0
Call Trace:
 <TASK>
 ? selinux_inode_permission+0x132/0x1b0
 __lookup_slow+0x86/0x130
 walk_component+0xdb/0x150
 path_lookupat+0x67/0x190
 filename_lookup+0xe4/0x1f0
 vfs_statx+0x9e/0x180
 vfs_fstatat+0x51/0x70
 __do_sys_newfstatat+0x3f/0x80
 do_syscall_64+0x5b/0x80
 ? __x64_sys_inotify_add_watch+0x124/0x150
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? __irq_exit_rcu+0x3d/0x140
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fecf8f7077e
Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 07 00 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 0b 31 c0 c3 0f 1f 84 00 00 00 00 00 48 8b 15 79
RSP: 002b:00007ffcf8a85278 EFLAGS: 00000202 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 00007fecdc007050 RCX: 00007fecf8f7077e
RDX: 00007ffcf8a85280 RSI: 00005635ffb37c50 RDI: 00000000ffffff9c
RBP: 00005635ffb37c50 R08: 00007fece0004770 R09: 00007fece4009b38
R10: 0000000000000100 R11: 0000000000000202 R12: 00005635ffb20400
R13: 00007fecdc007050 R14: 00005635fe351a00 R15: 00005635fe350960
 </TASK>