Kerneloops

Similar reports
Problem #788042
Component
kernel Tainted
Last affected version
0:6.16.7-200.fc42
Executable
unknown
First occurrence
2025-09-22
Last occurrence
2025-09-22
Unique reports
1
Quality
-38

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.16.7-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
vmx_inject_irq
kvm_intel 0x18e
2
kvm_check_and_inject_events
kvm 0xdb
3
kvm_check_and_inject_events
kvm 0xdb
4
kvm_check_and_inject_events
kvm 0xdb
5
kvm_check_and_inject_events
kvm 0xdb
6
kvm_check_and_inject_events
kvm 0xdb
7
kvm_check_and_inject_events
kvm 0xdb
8
warn_thunk_thunk
vmlinux 0x16
9
warn_thunk_thunk
vmlinux 0x16
10
? warn_thunk_thunk
vmlinux 0x16
11
? warn_thunk_thunk
vmlinux 0x16
12
? warn_thunk_thunk
vmlinux 0x16
13
? warn_thunk_thunk
vmlinux 0x16
14
? warn_thunk_thunk
vmlinux 0x16
15
warn_thunk_thunk
vmlinux 0x16
WARNING: CPU: 1 PID: 37628 at arch/x86/kvm/vmx/vmx.c:469 vmwrite_error+0x63/0x140 [kvm_intel]
Modules linked in: nft_masq nft_reject_ipv4 act_csum cls_u32 sch_htb nf_nat_tftp nf_conntrack_tftp bridge stp llc overlay uinput rfcomm snd_seq_dummy snd_hrtimer tun nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 vboxnetadp(OE) vboxnetflt(OE) nf_tables vboxdrv(OE) qrtr bnep binfmt_misc vfat fat snd_sof_pci_intel_tgl snd_sof_pci_intel_cnl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda intel_rapl_msr soundwire_cadence intel_rapl_common snd_sof_pci snd_sof_xtensa_dsp intel_uncore_frequency intel_uncore_frequency_common snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi crc8 soundwire_bus snd_soc_sdca snd_soc_avs x86_pkg_temp_thermal intel_powerclamp snd_soc_hda_codec
 coretemp snd_hda_ext_core snd_soc_core kvm_intel snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component snd_hda_codec_hdmi ac97_bus snd_usb_audio snd_pcm_dmaengine kvm snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_usbmidi_lib mc btusb snd_hda_core snd_ump btrtl snd_rawmidi snd_hwdep btintel snd_seq btbcm spi_nor jc42 irqbypass btmtk snd_seq_device rapl iTCO_wdt snd_pcm intel_cstate intel_pmc_bxt mtd mei_pxp mei_hdcp ee1004 snd_timer iTCO_vendor_support bluetooth intel_uncore gigabyte_wmi wmi_bmof pcspkr spi_intel_pci i2c_i801 mei_me spi_intel i2c_smbus rfkill snd mei idma64 soundcore joydev intel_pmc_core pmt_telemetry pmt_class acpi_tad intel_pmc_ssram_telemetry intel_hid intel_vsec acpi_pad sparse_keymap loop zram lz4hc_compress lz4_compress amdgpu amdxcp i2c_algo_bit drm_ttm_helper ttm drm_exec gpu_sched drm_suballoc_helper drm_panel_backlight_quirks drm_buddy nvme intel_oc_wdt drm_display_helper r8169 polyval_clmulni nvme_core ghash_clmulni_intel
 sha512_ssse3 sha1_ssse3 realtek cec nvme_keyring nvme_auth video wmi pinctrl_alderlake sunrpc iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi i2c_dev fuse nfnetlink
CPU: 1 UID: 1000 PID: 37628 Comm: CPU 0/KVM Tainted: G        W  OE       6.16.7-200.fc42.x86_64 #1 PREEMPT(lazy) 
Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Gigabyte Technology Co., Ltd. B660M GAMING X DDR4/B660M GAMING X DDR4, BIOS F32 06/20/2025
RIP: 0010:vmwrite_error+0x63/0x140 [kvm_intel]
Code: c3 cc cc cc cc c6 05 2e a5 ea ff 01 66 90 b9 00 44 00 00 0f 78 c9 76 41 4c 89 f2 48 89 de 48 c7 c7 88 81 48 c2 e8 bd 6c 2b d7 <0f> 0b eb b4 83 3d 42 fb 17 00 11 76 30 0f b7 05 9d fb 17 00 66 85
RSP: 0018:ffffd543a11dfd28 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000810 RCX: 0000000000000027
RDX: ffff8e4adf89cf88 RSI: 0000000000000001 RDI: ffff8e4adf89cf80
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffd543a11dfbd0
R10: ffffffff9bb39808 R11: 00000000ffffdfff R12: ffff8e438c66aa40
R13: ffff8e4a22bd1000 R14: 00000000000000ec R15: 0000000000000000
FS:  00007f9fa35fe6c0(0000) GS:ffff8e4b42edf000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc901df0d58 CR3: 00000007d8af3005 CR4: 0000000000f72ef0
PKRU: 55555554
Call Trace:
 <TASK>
 vmx_sync_pir_to_irr+0xd3/0x110 [kvm_intel]
 apic_has_interrupt_for_ppr+0x23/0xb0 [kvm]
 kvm_cpu_has_interrupt+0x3b/0x70 [kvm]
 kvm_vcpu_has_events+0x1a1/0x1c0 [kvm]
 vcpu_run+0x143/0x290 [kvm]
 kvm_arch_vcpu_ioctl_run+0x315/0x480 [kvm]
 kvm_vcpu_ioctl+0x117/0x8a0 [kvm]
 __x64_sys_ioctl+0x94/0xe0
 do_syscall_64+0x7e/0x250
 ? do_syscall_64+0xb6/0x250
 ? fire_user_return_notifiers+0x34/0x60
 ? arch_exit_to_user_mode_prepare.isra.0+0x3f/0x80
 ? do_syscall_64+0xb6/0x250
 ? irqentry_exit_to_user_mode+0x2c/0x1c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fa26928a0ed
Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00
RSP: 002b:00007f9fa35fca70 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000056350496adc0 RCX: 00007fa26928a0ed
RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000001a
RBP: 00007f9fa35fcac0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000ae80
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>