Kerneloops

Similar reports
Problem #611355
Component
kernel
Last affected version
0:6.4.14-200.fc38
Executable
unknown
First occurrence
2023-09-12
Last occurrence
2023-09-12
Unique reports
1
Quality
-57

Statistics

Operating system Unique / Total count
Fedora 38 1 / 1
Operating system Count
Fedora 38 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:6.4.14-200.fc38 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
? drm_atomic_check_only
vmlinux 0x92f
2
? drm_atomic_check_only
vmlinux 0x92f
3
? drm_atomic_check_only
vmlinux 0x92f
4
? drm_atomic_check_only
vmlinux 0x92f
5
? drm_atomic_check_only
vmlinux 0x92f
6
? drm_atomic_check_only
vmlinux 0x92f
7
? drm_atomic_check_only
vmlinux 0x92f
8
? drm_atomic_check_only
vmlinux 0x92f
9
? drm_atomic_check_only
vmlinux 0x92f
10
? drm_atomic_check_only
vmlinux 0x92f
11
? drm_atomic_check_only
vmlinux 0x92f
12
? drm_atomic_check_only
vmlinux 0x92f
13
? drm_atomic_check_only
vmlinux 0x92f
14
? drm_atomic_check_only
vmlinux 0x92f
15
? drm_atomic_check_only
vmlinux 0x92f
16
? drm_atomic_check_only
vmlinux 0x92f
17
drm_atomic_check_only
vmlinux 0x92f
18
drm_atomic_check_only
vmlinux 0x92f
19
? drm_atomic_check_only
vmlinux 0x92f
20
drm_atomic_check_only
vmlinux 0x92f
WARNING: CPU: 1 PID: 434 at crypto/testmgr.c:5936 alg_test+0x516/0x630
Modules linked in: sha512_ssse3 virtio_net(+) virtio_scsi virtio_gpu net_failover virtio_crypto(+) failover crypto_engine virtio_console virtio_dma_buf serio_raw scsi_dh_rdac scsi_dh_emc scsi_dh_alua ip6_tables ip_tables dm_multipath fuse qemu_fw_cfg
CPU: 1 PID: 434 Comm: cryptomgr_test Not tainted 6.4.14-200.fc38.x86_64 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023
RIP: 0010:alg_test+0x516/0x630
Code: ff ff 4c 89 e6 4c 89 e7 41 89 c7 e8 d4 e4 fe ff e9 37 ff ff ff 44 89 f9 48 89 ea 4c 89 ee 48 c7 c7 f0 fb 91 85 e8 1a d1 9d ff <0f> 0b e9 7d fe ff ff 48 89 c2 48 89 ee 48 c7 c7 28 fb 91 85 45 89
RSP: 0018:ffffb37ac05a3e30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 00000000000000bf RCX: 0000000000000027
RDX: ffff92bb3bca1548 RSI: 0000000000000001 RDI: ffff92bb3bca1540
RBP: ffff92bac0b00400 R08: 0000000000000000 R09: ffffb37ac05a3cc0
R10: 0000000000000003 R11: ffffffff86146508 R12: 00000000000000cd
R13: ffff92bac0b00480 R14: 00000000ffffffff R15: 00000000ffffffea
FS:  0000000000000000(0000) GS:ffff92bb3bc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc6b557c000 CR3: 0000000108afa000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 <TASK>
 ? alg_test+0x516/0x630
 ? __warn+0x81/0x130
 ? alg_test+0x516/0x630
 ? report_bug+0x171/0x1a0
 ? prb_read_valid+0x1b/0x30
 ? srso_alias_return_thunk+0x5/0x7f
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
sd 6:0:0:0: Attached scsi generic sg0 type 0
 ? asm_exc_invalid_op+0x1a/0x20
 ? alg_test+0x516/0x630
 ? __x86_indirect_jump_thunk_r9+0x20/0x20
 ? srso_alias_return_thunk+0x5/0x7f
 ? __smp_call_single_queue+0xaa/0x110
 ? ttwu_queue_wakelist+0xef/0x110
 ? srso_alias_return_thunk+0x5/0x7f
 ? __pfx_cryptomgr_test+0x10/0x10
 cryptomgr_test+0x24/0x40
 kthread+0xe8/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 </TASK>