Kerneloops

Similar reports
Problem #816948
Component
kernel
Last affected version
0:6.17.4-200.fc42
Executable
unknown
First occurrence
2025-10-24
Last occurrence
2025-10-24
Unique reports
1
Quality
-40

Statistics

Operating system Unique / Total count
Fedora 42 1 / 1
Operating system Count
Fedora 42 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.17.4-200.fc42 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
kvm_check_and_inject_events
kvm 0xdb
2
kvm_check_and_inject_events
kvm 0xdb
3
? vmx_vcpu_load
kvm_intel 0x2f
4
? kvm_check_and_inject_events
kvm 0xdb
5
? warn_thunk_thunk
vmlinux 0x16
6
? warn_thunk_thunk
vmlinux 0x16
7
kvm_check_and_inject_events
kvm 0xdb
8
kvm_check_and_inject_events
kvm 0xdb
9
kvm_check_and_inject_events
kvm 0xdb
10
warn_thunk_thunk
vmlinux 0x16
11
warn_thunk_thunk
vmlinux 0x16
12
? warn_thunk_thunk
vmlinux 0x16
13
? warn_thunk_thunk
vmlinux 0x16
14
? warn_thunk_thunk
vmlinux 0x16
15
? warn_thunk_thunk
vmlinux 0x16
16
warn_thunk_thunk
vmlinux 0x16
WARNING: CPU: 9 PID: 613700 at arch/x86/kvm/vmx/nested.c:4377 vmx_check_nested_events+0x858/0x890 [kvm_intel]
Modules linked in: vhost_net vhost vhost_iotlb tap tun nft_reject_ipv4 act_csum cls_u32 sch_htb nf_nat_tftp nft_masq nf_conntrack_tftp uinput snd_seq_dummy snd_hrtimer nf_conntrack_netlink xt_nat veth xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set xt_addrtype nft_compat overlay rfkill sunrpc nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables qrtr vfat fat snd_hda_codec_intelhdmi snd_hda_codec_alc662 snd_hda_codec_realtek_lib snd_hda_codec_generic snd_hda_intel snd_sof_pci_intel_tgl snd_sof_pci_intel_cnl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi intel_rapl_msr soundwire_cadence intel_rapl_common snd_sof_pci snd_sof_xtensa_dsp intel_uncore_frequency intel_uncore_frequency_common snd_sof
 snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi crc8 soundwire_bus x86_pkg_temp_thermal snd_soc_sdca intel_powerclamp coretemp snd_soc_avs kvm_intel snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_usb_audio kvm snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_core snd_usbmidi_lib snd_hwdep mc snd_compress snd_ump ac97_bus snd_rawmidi snd_pcm_dmaengine snd_seq spi_nor irqbypass rapl iTCO_wdt mei_hdcp snd_seq_device mei_pxp intel_pmc_bxt intel_cstate ee1004 mtd iTCO_vendor_support snd_pcm r8169 mei_me snd_timer i2c_i801 spi_intel_pci intel_uncore snd realtek mei i2c_smbus pcspkr gigabyte_wmi spi_intel idma64 wmi_bmof soundcore intel_pmc_core pmt_telemetry joydev intel_hid pmt_discovery acpi_pad acpi_tad sparse_keymap pmt_class intel_pmc_ssram_telemetry loop nfnetlink zram lz4hc_compress lz4_compress xe intel_vsec drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec hid_logitech_hidpp i915 i2c_algo_bit drm_buddy ttm nvme
 drm_display_helper nvme_core nvme_keyring polyval_clmulni ghash_clmulni_intel nvme_auth cec video intel_oc_wdt wmi pinctrl_alderlake hid_logitech_dj fuse i2c_dev
CPU: 9 UID: 107 PID: 613700 Comm: CPU 0/KVM Not tainted 6.17.4-200.fc42.x86_64 #1 PREEMPT(lazy) 
Hardware name: Gigabyte Technology Co., Ltd. BigTech_PC_W1387/H610M S2H V3 DDR4, BIOS F3 12/14/2023
RIP: 0010:vmx_check_nested_events+0x858/0x890 [kvm_intel]
Code: be 01 00 00 00 81 ca 00 00 00 80 89 44 24 08 4c 89 0c 24 e8 2a e6 ff ff 8b 74 24 08 48 8b 3c 24 e8 ad e2 f7 ff e9 32 f8 ff ff <0f> 0b e9 ed f9 ff ff 45 85 c0 0f 85 df fa ff ff 41 c6 81 d8 20 00
RSP: 0018:ffffd0f700e3fcd8 EFLAGS: 00010286
RAX: 00000000ffffffff RBX: ffff8c5985e423c0 RCX: ffff8c5a6fb8a000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffd0f700e3fda8 R08: 0000000000000000 R09: ffff8c5985e423c0
R10: 0000000000000001 R11: 0000000000000060 R12: 0000000000000000
R13: ffff8c6083e85000 R14: 0000000000000000 R15: ffffd0f700e3fd4f
FS:  00007f2a1de586c0(0000) GS:ffff8c616dec5000(0000) knlGS:00000000007cd000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000002cd6bba2d7e CR3: 000000088f3ce005 CR4: 0000000000f72ef0
PKRU: 55555554
Call Trace:
 <TASK>
 kvm_check_and_inject_events+0xdb/0x540 [kvm]
 vcpu_enter_guest.constprop.0+0xbe/0xfc0 [kvm]
 ? vmx_vcpu_load+0x2f/0xd0 [kvm_intel]
 ? kvm_arch_vcpu_load+0xe0/0x300 [kvm]
 ? do_futex+0x11f/0x190
 ? __x64_sys_futex+0x12d/0x210
 vcpu_run+0x32/0x290 [kvm]
 kvm_arch_vcpu_ioctl_run+0x33b/0x4d0 [kvm]
 kvm_vcpu_ioctl+0x117/0x8a0 [kvm]
 __x64_sys_ioctl+0x94/0xe0
 do_syscall_64+0x7e/0x250
 ? arch_exit_to_user_mode_prepare.isra.0+0x3f/0x80
 ? do_syscall_64+0xb6/0x250
 ? do_syscall_64+0xb6/0x250
 ? irqentry_exit_to_user_mode+0x2c/0x1c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f2a21b6a0ed
Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00
RSP: 002b:00007f2a1de56a70 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000559e79753e60 RCX: 00007f2a21b6a0ed
RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000001e
RBP: 00007f2a1de56ac0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000ae80
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>