Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #694092
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-05-10
Last occurrence
2023-05-31
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
Fedora 37 1 / 3
Operating system Count
Fedora 37 3
Architecture Count
x86_64 3

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? vbsf_inode_atomic_open
vboxsf 0x44
2
pci_pm_suspend
vmlinux 0x78
3
pci_pm_suspend
vmlinux 0x78
4
? pci_pm_suspend
vmlinux 0x78
5
? pci_pm_suspend
vmlinux 0x78
6
pci_pm_suspend
vmlinux 0x78
7
pci_pm_suspend
vmlinux 0x78
8
pci_pm_suspend
vmlinux 0x78
9
pci_pm_suspend
vmlinux 0x78
10
? pci_pm_suspend
vmlinux 0x78
11
? pci_pm_suspend
vmlinux 0x78
12
pci_pm_suspend
vmlinux 0x78
WARNING: CPU: 0 PID: 3215 at /tmp/vbox.0/regops.c:3075 vbsf_reg_open+0x480/0x560 [vboxsf]
Modules linked in: uinput snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink vboxvideo drm_vram_helper qrtr vboxsf(OE) snd_intel8x0 snd_ac97_codec sunrpc ac97_bus snd_seq intel_rapl_msr intel_rapl_common snd_seq_device intel_powerclamp snd_pcm rapl snd_timer snd soundcore joydev pcspkr i2c_piix4 binfmt_misc squashfs loop zram dm_crypt vmwgfx crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni e1000 polyval_generic drm_ttm_helper ghash_clmulni_intel ttm sha512_ssse3 serio_raw video vboxguest(OE) wmi ata_generic pata_acpi scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse
CPU: 0 PID: 3215 Comm: cp Tainted: G        W  OE      6.2.12-200.fc37.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_reg_open+0x480/0x560 [vboxsf]
Code: fc ff ff b9 06 00 00 00 4c 89 c6 48 c7 c2 d0 e7 6f c0 48 c7 c7 08 e8 6f c0 4c 89 44 24 10 c6 05 44 c3 00 00 01 e8 10 36 a1 e9 <0f> 0b 49 8b 75 00 4c 8b 44 24 10 e9 3d fc ff ff 4c 89 f7 89 04 24
RSP: 0018:ffff9fc2846e7bc0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8cee0f4c0048 RCX: 0000000000000000
RDX: 0000000000000002 RSI: ffffffffab8c1b46 RDI: 00000000ffffffff
RBP: ffff8ceeae542280 R08: 0000000000000000 R09: ffff9fc2846e7a50
R10: 0000000000000003 R11: ffffffffac1447c8 R12: ffff8cee2acbaf00
R13: ffff8cee8a8168a0 R14: ffff8cee2add6020 R15: ffff8ceedb645c00
FS:  00007f8febf34380(0000) GS:ffff8cef1bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ef205fbe40 CR3: 000000004b83c001 CR4: 00000000000706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 ? __pfx_vbsf_reg_open+0x10/0x10 [vboxsf]
 do_dentry_open+0x1e5/0x410
 path_openat+0xb59/0x1270
 ? terminate_walk+0x61/0x100
 ? path_lookupat+0x97/0x190
 do_filp_open+0xaf/0x160
 do_sys_openat2+0xaf/0x170
 __x64_sys_openat+0x6a/0xa0
 do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f8fec0cd0b3
Code: 24 38 31 c0 f6 c2 40 75 4e 89 d0 45 31 d2 25 00 00 41 00 3d 00 00 41 00 74 3d 80 3d 4e 05 0e 00 00 74 61 b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 a1 00 00 00 48 8b 54 24 38 64 48 2b 14 25
RSP: 002b:00007ffec37ceb90 EFLAGS: 00000202 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f8fec0cd0b3
RDX: 0000000000000201 RSI: 000055ef20794cf8 RDI: 0000000000000003
RBP: 00007ffec37d031b R08: 00007ffec37cf530 R09: 00000000000001a4
R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffec37cf150
R13: 0000000000000001 R14: 00007ffec37d031b R15: 00007ffec37cf530
 </TASK>