Kerneloops

Similar reports
Problem #645927
Component
kernel Tainted
Last affected version
0:6.8.6-200.fc39
Executable
unknown
First occurrence
2024-01-16
Last occurrence
2024-05-16
Unique reports
114
Quality
-48

Graphs

Statistics

Operating system Unique / Total count
Fedora 38 8 / 13
Fedora 39 114 / 208
Operating system Count
Fedora 39 208
Fedora 38 13
Architecture Count
x86_64 221
Related packages Count
kernel-core 221
 0:6.7.4-200.fc39 35
 0:6.7.5-200.fc39 27
 0:6.7.9-200.fc39 26
 0:6.7.7-200.fc39 23
 0:6.6.14-200.fc39 18
 0:6.6.11-200.fc39 17
 0:6.7.3-200.fc39 12
 0:6.7.6-200.fc39 11
 0:6.7.10-200.fc39 10
 0:6.8.4-200.fc39 9
 0:6.6.13-200.fc39 6
 0:6.7.11-200.fc39 4
 0:6.8.2-250.vanilla.fc39 3
 0:6.6.9-100.fc38 3
 0:6.8.6-200.fc39 3
 0:6.7.4-100.fc38 3
 0:6.7.5-100.fc38 3
 0:6.7.1-250.vanilla.fc39 2
 0:6.7.7-100.fc38 2
 0:6.6.12-200.fc39 2
 0:6.6.13-100.fc38 1
 0:6.8.5-101.fc38 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
2
? syscore_resume
vmlinux 0x163
3
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
4
? syscore_resume
vmlinux 0x163
5
? syscore_resume
vmlinux 0x163
6
? syscore_resume
vmlinux 0x163
7
? syscore_resume
vmlinux 0x163
8
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
9
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
10
syscore_resume
vmlinux 0x163
11
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
12
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
13
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
14
? syscore_resume
vmlinux 0x163
15
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
16
syscore_resume
vmlinux 0x163
17
syscore_resume
vmlinux 0x163
18
syscore_resume
vmlinux 0x163
WARNING: CPU: 7 PID: 3949 at /tmp/vbox.0/r0drv/linux/memobj-r0drv-linux.c:564 rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
Modules linked in: uinput hidp rfcomm snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) qrtr bnep sunrpc binfmt_misc vfat fat snd_soc_dmic snd_soc_acp6x_mach snd_acp6x_pdm_dma snd_sof_amd_vangogh snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_hda_codec_realtek uvcvideo snd_hda_codec_generic snd_sof_xtensa_dsp uvc ledtrig_audio rtw88_8822ce intel_rapl_msr snd_hda_codec_hdmi snd_sof intel_rapl_common rtw88_8822c snd_sof_utils videobuf2_vmalloc edac_mce_amd btusb rtw88_pci snd_hda_intel videobuf2_memops btrtl snd_soc_core snd_intel_dspcfg kvm_amd btintel rtw88_core snd_intel_sdw_acpi videobuf2_v4l2 snd_compress btbcm videobuf2_common btmtk snd_hda_codec kvm ac97_bus mac80211 snd_pcm_dmaengine videodev snd_hda_core
 snd_pci_ps irqbypass snd_rpl_pci_acp6x snd_hwdep snd_pci_acp6x libarc4 mc bluetooth snd_pci_acp5x rapl snd_seq snd_rn_pci_acp3x cfg80211 snd_seq_device snd_acp_config wmi_bmof pcspkr acpi_cpufreq snd_pcm snd_soc_acpi snd_timer k10temp i2c_piix4 snd_pci_acp3x ideapad_laptop snd sparse_keymap platform_profile soundcore rfkill joydev amd_pmc loop zram amdgpu i2c_algo_bit drm_ttm_helper ttm drm_exec drm_suballoc_helper amdxcp drm_buddy crct10dif_pclmul crc32_pclmul gpu_sched rtsx_pci_sdmmc crc32c_intel polyval_clmulni nvme polyval_generic mmc_core drm_display_helper nvme_core video hid_multitouch ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 ccp rtsx_pci cec sp5100_tco nvme_common wmi i2c_hid_acpi i2c_hid serio_raw ip6_tables ip_tables fuse
CPU: 7 PID: 3949 Comm: EMT-0 Tainted: G           OE      6.6.11-200.fc39.x86_64 #1
Hardware name: LENOVO 82X5/LNVNB161216, BIOS KSCN25WW 03/17/2023
RIP: 0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
Code: 83 ff 40 74 25 48 89 c7 48 21 f7 48 85 d2 75 1c 48 89 f8 0f 1f 00 48 89 c6 48 89 cf e8 3e 8a 30 e2 90 31 c0 5d e9 c5 12 27 e3 <0f> 0b f6 c2 01 75 15 48 f7 d0 48 89 c7 48 21 f7 48 81 e7 00 f0 ff
RSP: 0018:ffffc90007c63d20 EFLAGS: 00010246
RAX: 000000000433e000 RBX: ffff8881168c0d98 RCX: ffff8881168c0d90
RDX: 0000000000000161 RSI: 000fffffffffffff RDI: 0000000000000040
RBP: ffffc90007c63d20 R08: ffffc9000976a000 R09: ffff888166486c90
R10: ffffc9000976a000 R11: 00000001003e0003 R12: 0000000000000001
R13: ffffffffc1d886b0 R14: ffffc900095b2000 R15: ffffc90007c63de8
FS:  00007fc6fc1d06c0(0000) GS:ffff8881b7dc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc6b4ff9000 CR3: 0000000166486000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 ? __warn+0x81/0x130
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 ? report_bug+0x171/0x1a0
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __pfx_rtR0MemObjLinuxApplyPageRange+0x10/0x10 [vboxdrv]
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 __apply_to_page_range+0x3d2/0x900
 rtR0MemObjNativeProtect+0x80/0xc0 [vboxdrv]
 VBoxHost_RTR0MemObjProtect+0x8b/0xc0 [vboxdrv]
 supdrvIOCtl+0x2cad/0x31b0 [vboxdrv]
 ? srso_return_thunk+0x5/0x10
 VBoxDrvLinuxIOCtl_7_0_14+0x169/0x260 [vboxdrv]
 __x64_sys_ioctl+0x97/0xd0
 do_syscall_64+0x60/0x90
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8
RIP: 0033:0x7fc73146c17d
Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00
RSP: 002b:00007fc6fc1ced20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fc6b4d37010 RCX: 00007fc73146c17d
RDX: 00007fc6b4d37010 RSI: 0000000000005684 RDI: 0000000000000007
RBP: 00007fc6fc1ced70 R08: 0000000000000000 R09: 00007fc6fc1cec00
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fc6fc8cc968
R13: 0000000000000000 R14: 00007fc6b8000b70 R15: 00007fc7312c5390
 </TASK>