#13261 closed defect (duplicate)
F20 kernel crash. tainted vbox kernel modules
Reported by: | steve_b | Owned by: | |
---|---|---|---|
Component: | USB | Version: | VirtualBox 4.3.14 |
Keywords: | kernel, crash, usb | Cc: | |
Guest type: | Windows | Host type: | Linux |
Description (last modified by )
I regularly get ABRT reporting kernel crashes after i use vbox (w7 64 guest) ABRT reports
WARNING: CPU: 0 PID:9335 at drivers/usb/core/urb.c:476 usb_submit_urb+0x28d/0x5c0() "A kernel problem occurred, but your kernel has been tainted (flags:GOE). Kernel maintainers are unable to diagnose tainted reports. Tainted Modules: vboxpci,vboxnetadp,vboxnetflt,vboxdrv."
This error has occurred both in F19 and F20 and with at least the last 3 vbox releases. currently running 4.3.14-95030-Linux_amd64. Have updated fedora weekly and have not seen any change. This kernel crash doesn't appear to impinge performance of either the host or guest but is getting annoying as it can happen 2 or 3 times a day. screenshot of ABRT report attached.
Attachments (1)
Change History (4)
by , 11 years ago
Attachment: | ABRT vbox kernel crash info.jpg added |
---|
comment:1 by , 11 years ago
Whenever I tell VirtualBox to enable a USB device for the guest Win 7 64 this happens for me:
Sep 8 16:57:02 danomite kernel: ------------[ cut here ]------------ Sep 8 16:57:02 danomite kernel: WARNING: CPU: 0 PID: 5226 at drivers/usb/core/urb.c:476 usb_submit_urb+0x28d/0x5c0() Sep 8 16:57:02 danomite kernel: usb 2-1.3.1: BOGUS urb flags, 1 --> 0 Sep 8 16:57:02 danomite kernel: Modules linked in: vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) ip6t_rpfilter cfg80211 ip6t_REJECT xt_conntrack bnep ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw x86_pkg_temp_thermal coretemp kvm_intel kvm ath3k crct10dif_pclmul crc32_pclmul ftdi_sio eeepc_wmi asus_wmi iTCO_wdt crc32c_intel sparse_keymap iTCO_vendor_support mei_me ghash_clmulni_intel snd_hda_codec_realtek uas usb_storage btusb bluetooth mei lpc_ich snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel mxm_wmi snd_hda_controller snd_hda_codec Sep 8 16:57:02 danomite kernel: shpchp wmi rfkill mfd_core snd_hwdep snd_seq i2c_i801 serio_raw snd_seq_device snd_pcm microcode nfsd auth_rpcgss nfs_acl lockd sunrpc snd_timer snd soundcore radeon i915 i2c_algo_bit drm_kms_helper ttm e1000e drm ptp i2c_core pps_core video Sep 8 16:57:02 danomite kernel: CPU: 0 PID: 5226 Comm: USBDevIo--1 Tainted: G W OE 3.15.8-200.fc20.x86_64 #1 Sep 8 16:57:02 danomite kernel: Hardware name: System manufacturer System Product Name/P8Z68-V, BIOS 0501 05/09/2011 Sep 8 16:57:02 danomite kernel: 0000000000000000 00000000444fa304 ffff88007b377c88 ffffffff816ef9ae Sep 8 16:57:02 danomite kernel: ffff88007b377cd0 ffff88007b377cc0 ffffffff8108933d ffff880428351540 Sep 8 16:57:02 danomite kernel: ffff880423fa8800 0000000000000002 0000000000000001 0000000000000020 Sep 8 16:57:02 danomite kernel: Call Trace: Sep 8 16:57:02 danomite kernel: [<ffffffff816ef9ae>] dump_stack+0x45/0x56 Sep 8 16:57:02 danomite kernel: [<ffffffff8108933d>] warn_slowpath_common+0x7d/0xa0 Sep 8 16:57:02 danomite kernel: [<ffffffff810893bc>] warn_slowpath_fmt+0x5c/0x80 Sep 8 16:57:02 danomite kernel: [<ffffffff814df37d>] usb_submit_urb+0x28d/0x5c0 Sep 8 16:57:02 danomite kernel: [<ffffffff814eb7e0>] proc_do_submiturb+0xca0/0xcf0 Sep 8 16:57:02 danomite kernel: [<ffffffff8120147f>] ? touch_atime+0x12f/0x160 Sep 8 16:57:02 danomite kernel: [<ffffffff814ebdb4>] usbdev_do_ioctl+0x584/0x1190 Sep 8 16:57:02 danomite kernel: [<ffffffff814ec9ee>] usbdev_ioctl+0xe/0x20 Sep 8 16:57:02 danomite kernel: [<ffffffff811f9ad0>] do_vfs_ioctl+0x2e0/0x4a0 Sep 8 16:57:02 danomite kernel: [<ffffffff811e66c4>] ? vfs_read+0xf4/0x160 Sep 8 16:57:02 danomite kernel: [<ffffffff811f9d11>] SyS_ioctl+0x81/0xa0 Sep 8 16:57:02 danomite kernel: [<ffffffff8111fc36>] ? __audit_syscall_exit+0x1f6/0x2a0 Sep 8 16:57:02 danomite kernel: [<ffffffff816ff9e9>] system_call_fastpath+0x16/0x1b Sep 8 16:57:02 danomite kernel: ---[ end trace 01f7bd450439a8ff ]---
Host systems: Fedora 20 $ uname -r 3.15.8-200.fc20.x86_64 $ uname -r 3.15.10-200.fc20.x86_64 $ uname -r 3.15.10-201.fc20.x86_64
comment:2 by , 11 years ago
Resolution: | → duplicate |
---|---|
Status: | new → closed |
Sounds like a duplicate of #13085.
comment:3 by , 11 years ago
Description: | modified (diff) |
---|
ABRT report screen