Kerneloops

Similar reports
Problem #674026
Component
kernel Tainted
Last affected version
0:6.2.14-300.fc38
Executable
unknown
First occurrence
2023-05-15
Last occurrence
2023-06-02
Unique reports
2
Quality
-31

Statistics

Operating system Unique / Total count
Fedora 38 2 / 3
Operating system Count
Fedora 38 3
Architecture Count
x86_64 3
Related packages Count
kernel-core 3
 0:6.2.14-300.fc38 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
do_one_initcall
vmlinux 0x56
2
do_one_initcall
vmlinux 0x56
3
do_one_initcall
vmlinux 0x56
4
do_one_initcall
vmlinux 0x56
5
? do_one_initcall
vmlinux 0x56
6
? do_one_initcall
vmlinux 0x56
7
? do_one_initcall
vmlinux 0x56
8
? do_one_initcall
vmlinux 0x56
9
? do_one_initcall
vmlinux 0x56
10
? do_one_initcall
vmlinux 0x56
11
do_one_initcall
vmlinux 0x56
WARNING: CPU: 6 PID: 8667 at /tmp/vbox.0/dirops.c:1129 vbsf_unlink_worker.isra.0+0x2b5/0x2e0 [vboxsf]
Modules linked in: uinput isofs snd_seq_dummy snd_hrtimer vboxvideo(OE) nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct rfkill nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr vboxsf(OE) sunrpc binfmt_misc vfat fat intel_rapl_msr intel_rapl_common snd_intel8x0 kvm_intel snd_ac97_codec iTCO_wdt ac97_bus kvm snd_seq intel_pmc_bxt iTCO_vendor_support snd_seq_device irqbypass snd_pcm rapl snd_timer snd lpc_ich soundcore pcspkr i2c_piix4 joydev loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic video ghash_clmulni_intel vmwgfx sha512_ssse3 drm_ttm_helper wmi vboxguest(OE) e1000 ttm serio_raw ata_generic pata_acpi ip6_tables ip_tables fuse
CPU: 6 PID: 8667 Comm: soffice.bin Tainted: G        W  OE      6.2.14-300.fc38.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0010:vbsf_unlink_worker.isra.0+0x2b5/0x2e0 [vboxsf]
Code: fe ff ff b9 06 00 00 00 4c 89 ce 48 c7 c2 40 01 55 c0 48 c7 c7 78 01 55 c0 4c 89 4c 24 08 c6 05 2a 29 01 00 01 e8 4b 8b bc c1 <0f> 0b 48 8b 74 24 18 4c 8b 4c 24 08 e9 fa fd ff ff 41 c6 45 08 01
RSP: 0018:ffffb4561290bda0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000027 RDI: 00000000ffffffff
RBP: ffff9d4a657ea480 R08: 0000000000000000 R09: ffffb4561290bc30
R10: 0000000000000003 R11: ffffffff841447c8 R12: 0000000000000000
R13: ffff9d4a732436c0 R14: ffff9d4b02eeb500 R15: ffff9d4ad78b0060
FS:  00007f8c7dbff0c0(0000) GS:ffff9d4d2df80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000563295887000 CR3: 000000010c7ae002 CR4: 00000000000706e0
Call Trace:
 <TASK>
 vfs_unlink+0x10e/0x280
 do_unlinkat+0x148/0x320
 __x64_sys_unlink+0x3e/0x70
 do_syscall_64+0x5c/0x90
 ? switch_fpu_return+0x17/0xe0
 ? exit_to_user_mode_prepare+0x13a/0x1f0
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x68/0x90
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x68/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f8c869e6abb
Code: f0 ff ff 73 01 c3 48 8b 0d 4a 13 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 57 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 19 13 0d 00 f7 d8
RSP: 002b:00007ffde1876218 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 00007ffde18762e0 RCX: 00007f8c869e6abb
RDX: 0000000000008000 RSI: 00007ffde18762e0 RDI: 00007ffde18762e0
RBP: 00007ffde18762d0 R08: 0000000000000001 R09: 0000000000001000
R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffde18774f0
R13: 0000563295544380 R14: 0000000000000001 R15: 00007ffde18773e0
 </TASK>