Opened 10 months ago
Last modified 9 months ago
#21952 new defect
0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] => fixed in svn
Reported by: | Srini8987 | Owned by: | |
---|---|---|---|
Component: | other | Version: | VirtualBox-7.0.12 |
Keywords: | Cc: | ||
Guest type: | Linux | Host type: | Linux |
Description (last modified by )
[Fri Jan 12 18:05:08 2024] ------------[ cut here ]------------ [Fri Jan 12 18:05:08 2024] WARNING: CPU: 1 PID: 2353 at /tmp/vbox.0/r0drv/linux/memobj-r0drv-linux.c:564 rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] [Fri Jan 12 18:05:08 2024] Modules linked in: nfsv3 nfs_acl nfs lockd grace fscache netfs vboxnetadp(O) vboxnetflt(O) vboxdrv(O) nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel snd_soc_avs kvm snd_soc_hda_codec snd_hda_ext_core snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic irqbypass ledtrig_audio snd_hda_codec_hdmi rapl snd_compress ac97_bus snd_pcm_dmaengine intel_cstate snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec iTCO_wdt intel_pmc_bxt iTCO_vendor_support mei_wdt snd_hda_core snd_hwdep snd_seq hp_wmi vfat sparse_keymap fat snd_seq_device snd_pcm platform_profile snd_timer rfkill intel_uncore intel_wmi_thunderbolt wmi_bmof mei_me snd i2c_i801 soundcore i2c_smbus mei [Fri Jan 12 18:05:08 2024] ioatdma joydev auth_rpcgss sunrpc fuse loop zram nouveau drm_ttm_helper ttm crct10dif_pclmul video crc32_pclmul crc32c_intel polyval_clmulni drm_exec polyval_generic gpu_sched nvme mxm_wmi drm_display_helper ghash_clmulni_intel igb nvme_core sha512_ssse3 e1000e sha256_ssse3 dca cec serio_raw sha1_ssse3 nvme_common i2c_algo_bit wmi hid_multitouch scsi_dh_rdac scsi_dh_emc scsi_dh_alua dm_multipath [Fri Jan 12 18:05:08 2024] CPU: 1 PID: 2353 Comm: EMT Tainted: G O 6.6.9-200.fc39.x86_64 #1 [Fri Jan 12 18:05:08 2024] Hardware name: HP HP Z4 G4 Workstation/81C5, BIOS P61 v02.92 08/10/2023 [Fri Jan 12 18:05:08 2024] RIP: 0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] [Fri Jan 12 18:05:08 2024] Code: 83 ff 40 74 25 48 89 c7 48 21 f7 48 85 d2 75 1c 48 89 f8 0f 1f 00 48 89 c6 48 89 cf e8 2e 4a fc ce 90 31 c0 5d c3 cc cc cc cc <0f> 0b f6 c2 01 75 15 48 f7 d0 48 89 c7 48 21 f7 48 81 e7 00 f0 ff [Fri Jan 12 18:05:08 2024] RSP: 0018:ffffc9000151bc30 EFLAGS: 00010246 [Fri Jan 12 18:05:08 2024] RAX: 00000001782ec000 RBX: ffff88810bc6c498 RCX: ffff88810bc6c490 [Fri Jan 12 18:05:08 2024] RDX: 0000000000000161 RSI: 000fffffffffffff RDI: 0000000000000040 [Fri Jan 12 18:05:08 2024] RBP: ffffc9000151bc30 R08: ffffc90001c4a000 R09: ffff888109362c90 [Fri Jan 12 18:05:08 2024] R10: ffffc90001c4a000 R11: 00000001003e0003 R12: 0000000000000001 [Fri Jan 12 18:05:08 2024] R13: ffffffffc10cc6b0 R14: ffffc90001a92000 R15: ffffc9000151bcf8 [Fri Jan 12 18:05:08 2024] FS: 00007f411897e6c0(0000) GS:ffff88bf7fe40000(0000) knlGS:0000000000000000 [Fri Jan 12 18:05:08 2024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Jan 12 18:05:08 2024] CR2: 00007f410b95f000 CR3: 0000000109362003 CR4: 00000000003706e0 [Fri Jan 12 18:05:08 2024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [Fri Jan 12 18:05:08 2024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [Fri Jan 12 18:05:08 2024] Call Trace: [Fri Jan 12 18:05:08 2024] <TASK> [Fri Jan 12 18:05:08 2024] ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] [Fri Jan 12 18:05:08 2024] ? __warn+0x81/0x130 [Fri Jan 12 18:05:08 2024] ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] [Fri Jan 12 18:05:08 2024] ? report_bug+0x171/0x1a0 [Fri Jan 12 18:05:08 2024] ? handle_bug+0x3c/0x80 [Fri Jan 12 18:05:08 2024] ? exc_invalid_op+0x17/0x70 [Fri Jan 12 18:05:08 2024] ? asm_exc_invalid_op+0x1a/0x20 [Fri Jan 12 18:05:08 2024] ? __pfx_rtR0MemObjLinuxApplyPageRange+0x10/0x10 [vboxdrv] [Fri Jan 12 18:05:08 2024] ? rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] [Fri Jan 12 18:05:08 2024] __apply_to_page_range+0x3cf/0x900 [Fri Jan 12 18:05:08 2024] rtR0MemObjNativeProtect+0x80/0xc0 [vboxdrv] [Fri Jan 12 18:05:08 2024] VBoxHost_RTR0MemObjProtect+0x8b/0xc0 [vboxdrv] [Fri Jan 12 18:05:08 2024] supdrvIOCtl+0x2cad/0x31b0 [vboxdrv] [Fri Jan 12 18:05:08 2024] VBoxDrvLinuxIOCtl_7_0_12+0x169/0x260 [vboxdrv] [Fri Jan 12 18:05:08 2024] __x64_sys_ioctl+0x94/0xd0 [Fri Jan 12 18:05:08 2024] do_syscall_64+0x5d/0x90 [Fri Jan 12 18:05:08 2024] ? ksys_write+0xd8/0xf0 [Fri Jan 12 18:05:08 2024] ? syscall_exit_to_user_mode+0x2b/0x40 [Fri Jan 12 18:05:08 2024] ? do_syscall_64+0x6c/0x90 [Fri Jan 12 18:05:08 2024] ? syscall_exit_to_user_mode+0x2b/0x40 [Fri Jan 12 18:05:08 2024] ? do_syscall_64+0x6c/0x90 [Fri Jan 12 18:05:08 2024] ? do_user_addr_fault+0x30f/0x660 [Fri Jan 12 18:05:08 2024] ? exc_page_fault+0x7f/0x180 [Fri Jan 12 18:05:08 2024] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [Fri Jan 12 18:05:08 2024] RIP: 0033:0x7f411c31417d [Fri Jan 12 18:05:08 2024] Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 [Fri Jan 12 18:05:08 2024] RSP: 002b:00007f411897cd20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [Fri Jan 12 18:05:08 2024] RAX: ffffffffffffffda RBX: 00007f410b69d010 RCX: 00007f411c31417d [Fri Jan 12 18:05:08 2024] RDX: 00007f410b69d010 RSI: 0000000000005684 RDI: 0000000000000007 [Fri Jan 12 18:05:08 2024] RBP: 00007f411897cd70 R08: 0000000000000000 R09: 00007f411897cc00 [Fri Jan 12 18:05:08 2024] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f4118ecc968 [Fri Jan 12 18:05:08 2024] R13: 0000000000000000 R14: 00007f40fc000b70 R15: 00007f411c0c5370 [Fri Jan 12 18:05:08 2024] </TASK> [Fri Jan 12 18:05:08 2024] ---[ end trace 0000000000000000 ]--- [Fri Jan 12 18:05:08 2024] vboxdrv: 00000000cf8949dd VMMR0.r0 [Fri Jan 12 18:05:08 2024] vboxdrv: 000000003248ce9f VBoxDDR0.r0
Change History (3)
comment:1 by , 10 months ago
comment:2 by , 9 months ago
Description: | modified (diff) |
---|---|
Summary: | 0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] → 0010:rtR0MemObjLinuxApplyPageRange+0x6b/0xa0 [vboxdrv] => fixed in svn |
Hi guys,
Fix for this issue now available on Test Builds page for both "Latest 7.0.x test builds" and "Development snapshots". It will be a part of the next release. Thank you for reporting.
comment:3 by , 9 months ago
fix confirmed (running kernel 6.8.0-rc5) Thanks !
but running the installer I get a warning/error (and see this since some testbuilds on Fedora 39):
===
Verifying archive integrity... 100% MD5 checksums are OK. All good. Uncompressing VirtualBox for Linux installation 100% VirtualBox Version 7.0.15 r161790 (2024-02-19T16:34:12Z) installer Installing VirtualBox to /opt/VirtualBox Python found: python2.7, installing bindings... Python found: python3, installing bindings... /usr/lib/python3.12/site-packages/setuptools/_distutils/cmd.py:66: SetuptoolsDeprecationWarning: setup.py install is deprecated. !!
Please avoid running
setup.py
directly. Instead, use pypa/build, pypa/installer, pypa/build or other standards-based tools.
See https://blog.ganssle.io/articles/2021/10/setup-py-deprecated.html for details.
!!
self.initialize_options()
/usr/lib/python3.12/site-packages/setuptools/_distutils/cmd.py:66: EasyInstallDeprecationWarning: easy_install command is deprecated. !!
Please avoid running
setup.py
and
easy_install
. Instead, use pypa/build, pypa/installer, pypa/build or other standards-based tools.
See https://github.com/pypa/setuptools/issues/917 for details.
!!
self.initialize_options()
zip_safe flag not set; analyzing archive contents...
VirtualBox has been installed successfully.
===
I've got it with VirtualBox 7.0.14 as well, see #21964.