Kerneloops

Similar reports
Problem #645927
Component
kernel Tainted
Last affected version
0:6.8.7-200.fc39
Executable
unknown
First occurrence
2024-01-17
Last occurrence
2024-05-17
Unique reports
184
Quality
-58

Graphs

Statistics

Operating system Unique / Total count
Fedora 38 22 / 73
Fedora 39 184 / 420
Operating system Count
Fedora 39 420
Fedora 38 73
Architecture Count
x86_64 493
Related packages Count
kernel-core 493
 0:6.7.9-200.fc39 74
 0:6.7.7-200.fc39 73
 0:6.7.4-200.fc39 58
 0:6.7.5-200.fc39 56
 0:6.7.6-200.fc39 35
 0:6.7.9-100.fc38 25
 0:6.6.13-200.fc39 19
 0:6.7.3-200.fc39 17
 0:6.7.4-100.fc38 16
 0:6.7.11-200.fc39 16
 0:6.6.14-200.fc39 16
 0:6.8.4-200.fc39 15
 0:6.7.10-200.fc39 13
 0:6.7.10-100.fc38 11
 0:6.8.5-201.fc39 10
 0:6.6.12-200.fc39 9
 0:6.6.14-100.fc38 8
 0:6.6.11-200.fc39 5
 0:6.8.4-100.fc38 5
 0:6.7.7-100.fc38 3
 0:6.6.11-100.fc38 3
 0:6.8.6-200.fc39 3
 0:6.8.7-100.fc38 2
 0:6.8.7-200.fc39 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
2
? syscore_resume
vmlinux 0x163
3
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
4
? syscore_resume
vmlinux 0x163
5
? syscore_resume
vmlinux 0x163
6
? syscore_resume
vmlinux 0x163
7
? syscore_resume
vmlinux 0x163
8
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
9
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
10
? rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
11
syscore_resume
vmlinux 0x163
12
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
13
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
14
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
15
rtR0MemObjLinuxApplyPageRange
vboxdrv 0x6b
16
syscore_resume
vmlinux 0x163
17
syscore_resume
vmlinux 0x163
18
? syscore_resume
vmlinux 0x163
19
? syscore_resume
vmlinux 0x163
20
? syscore_resume
vmlinux 0x163
21
syscore_resume
vmlinux 0x163
WARNING: CPU: 5 PID: 15989 at /tmp/vbox.0/r0drv/linux/memobj-r0drv-linux.c:564 rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
Modules linked in: vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) rfcomm snd_seq_dummy snd_hrtimer nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) nvidia(POE) nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc binfmt_misc vfat fat snd_soc_avs intel_rapl_msr snd_soc_hda_codec intel_rapl_common snd_hda_ext_core intel_tcc_cooling snd_soc_core x86_pkg_temp_thermal intel_powerclamp snd_hda_codec_realtek coretemp snd_usb_audio snd_hda_codec_generic snd_compress ledtrig_audio kvm_intel snd_hda_codec_hdmi ac97_bus snd_pcm_dmaengine iTCO_wdt intel_pmc_bxt mei_pxp ee1004 iTCO_vendor_support snd_hda_intel kvm snd_usbmidi_lib snd_intel_dspcfg mei_hdcp ucsi_ccg ppdev typec_ucsi snd_intel_sdw_acpi typec snd_hda_codec snd_ump irqbypass rapl snd_hda_core btusb snd_rawmidi btrtl btintel btbcm mc snd_hwdep btmtk
 intel_cstate gigabyte_wmi i2c_i801 snd_seq intel_uncore snd_seq_device wmi_bmof bluetooth snd_pcm pcspkr i2c_smbus mei_me snd_timer mei snd rfkill i2c_nvidia_gpu soundcore parport_pc parport joydev acpi_pad acpi_tad loop zram crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ghash_clmulni_intel nvme sha512_ssse3 sha256_ssse3 nvme_core sha1_ssse3 r8169 nvme_common video wmi ip6_tables ip_tables fuse
CPU: 5 PID: 15989 Comm: EMT-0 Tainted: P           OE      6.6.11-200.fc39.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. B365M DS3H/B365M DS3H, BIOS F5 08/13/2019
RIP: 0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
Code: 83 ff 40 74 25 48 89 c7 48 21 f7 48 85 d2 75 1c 48 89 f8 0f 1f 00 48 89 c6 48 89 cf e8 3e 8a 19 f0 90 31 c0 5d c3 cc cc cc cc <0f> 0b f6 c2 01 75 15 48 f7 d0 48 89 c7 48 21 f7 48 81 e7 00 f0 ff
RSP: 0018:ffffc9000c7e3cc8 EFLAGS: 00010246
RAX: 00000006002ad000 RBX: ffff88813cf9b278 RCX: ffff88813cf9b270
RDX: 0000000000000061 RSI: 000fffffffffffff RDI: 0000000000000040
RBP: ffffc9000c7e3cc8 R08: ffffc9000ca06000 R09: ffff8880591cec90
R10: ffffc9000ca06000 R11: 00000001003e0003 R12: 0000000000000001
R13: ffffffffc4ef86b0 R14: ffffc9000c84e000 R15: ffffc9000c7e3d90
FS:  00007f2634f7e6c0(0000) GS:ffff88861df40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2610563000 CR3: 00000000591ce005 CR4: 00000000003706e0
Call Trace:
 <TASK>
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 ? __warn+0x81/0x130
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 ? report_bug+0x171/0x1a0
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __pfx_rtR0MemObjLinuxApplyPageRange+0x10/0x10 [vboxdrv]
 ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv]
 ? __pfx_rtR0MemObjLinuxApplyPageRange+0x10/0x10 [vboxdrv]
 __apply_to_page_range+0x3cf/0x900
 rtR0MemObjNativeProtect+0x80/0xc0 [vboxdrv]
 VBoxHost_RTR0MemObjProtect+0x8b/0xc0 [vboxdrv]
 supdrvIOCtl+0x2cad/0x31b0 [vboxdrv]
 VBoxDrvLinuxIOCtl_7_0_14+0x169/0x260 [vboxdrv]
 __x64_sys_ioctl+0x94/0xd0
 do_syscall_64+0x5d/0x90
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? do_syscall_64+0x6c/0x90
 ? exc_page_fault+0x7f/0x180
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8
RIP: 0033:0x7f265ea1817d
Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00
RSP: 002b:00007f2634f7cd20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f26102a20f0 RCX: 00007f265ea1817d
RDX: 00007f26102a20f0 RSI: 0000000000005684 RDI: 0000000000000007
RBP: 00007f2634f7cd70 R08: 0000000000000000 R09: 00007f2634f7cc00
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f26354cc968
R13: 0000000000000000 R14: 00007f2610000eb0 R15: 00007f265e6c5390
 </TASK>