← Back to team overview

kernel-packages team mailing list archive

[Bug 1070256] Re: mount.cifs occasionally causes GPF error/kernel panic when mounting at boot [crypto_larval_kill+0x2b/0x90]

 

shinyblue, this bug was reported a while ago and there hasn't been any
activity in it recently. We were wondering if this is still an issue? If
so, could you please test for this with the latest development release
of Ubuntu? ISO images are available from http://cdimage.ubuntu.com
/daily-live/current/ .

If it remains an issue, could you please run the following command in
the development release from a Terminal
(Applications->Accessories->Terminal), as it will automatically gather
and attach updated debug information to this report:

apport-collect -p linux <replace-with-bug-number>

If reproducible, could you also please test the latest upstream kernel available (not the daily folder) following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow additional upstream developers to examine the issue. Once you've tested the upstream kernel, please comment on which kernel version specifically you tested. If this bug is fixed in the mainline kernel, please add the following tags:
kernel-fixed-upstream
kernel-fixed-upstream-VERSION-NUMBER

where VERSION-NUMBER is the version number of the kernel you tested. For example:
kernel-fixed-upstream-v3.13-rc6

This can be done by clicking on the yellow circle with a black pencil icon next to the word Tags located at the bottom of the bug description. As well, please remove the tag:
needs-upstream-testing

If the mainline kernel does not fix this bug, please add the following tags:
kernel-bug-exists-upstream
kernel-bug-exists-upstream-VERSION-NUMBER

As well, please remove the tag:
needs-upstream-testing

Once testing of the upstream kernel is complete, please mark this bug's
Status as Confirmed. Please let us know your results. Thank you for your
understanding.

** This bug is no longer a duplicate of bug 1114673
   mount.cifs occasionally causes GPF error/kernel panic when mounting at boot [crypto_larval_kill+0x2b/0x90]

** Description changed:

- Stop! If you're about to add a 'me to' to this bug, please report a new bug with ubuntu-bug linux and collect logs, and then add a comment stating the bug number to here.
+ Stop! If you're about to add a 'Me too!' to this bug, please report a new bug with ubuntu-bug linux and collect logs, and then add a comment in your own report.
  Thanks.
- -----------------------------------------------------------------------------------------
+ -------------------------------------------------------------------------------------
  
  I have a number of Ubuntu Precise Desktop machines which are turned on
  during office hours on a LAN which rely on /etc/fstab entries to auto
  mount cifs shares to a Debian Samba server on the LAN. Normally this
  works fine. Some machines have static IPs, some use DHCP.
  
  Occasionally though, at boot time, I get a black screen of death with
  stack trace dumped like that shown below. Note that often this causes
  the entire system to hang, but that today it's continued to boot and
  everything seems to be working, except the samba shares. It is usually
  fine after a reboot.
  
  There is no reason to suggest there is any problem at the server end
  (nothing in syslog) and the server is in use by a dozen other machines
  on the LAN which are successfully connected.
  
  Sample output (I expect ubuntu-bug attached this anyway):
  
  [   18.231766] CIFS VFS: default security mechanism requested.  The default security mechanism will be upgraded from ntlm to ntlmv2 in kernel release 3.3
  [   18.470676] general protection fault: 0000 [#1] SMP
  [   18.470700] CPU 1
  [   18.470715] Modules linked in: des_generic md4 bnep rfcomm bluetooth parport_pc ppdev nls_utf8 cifs snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi joydev snd_rawmidi snd_seq_midi_event hid_cherry snd_seq snd_timer snd_seq_device snd i915 drm_kms_helper drm i2c_algo_bit video soundcore mei(C) psmouse snd_page_alloc serio_raw mac_hid lp parport usbhid hid e1000e
  [   18.470865]
  [   18.470872] Pid: 1967, comm: mount.cifs Tainted: G         C   3.2.0-32-generic #51-Ubuntu VeryPC BL5340-D/DH67CF
  [   18.470901] RIP: 0010:[<ffffffff812dcd1b>]  [<ffffffff812dcd1b>] crypto_larval_kill+0x2b/0x90
  [   18.470930] RSP: 0018:ffff880114417988  EFLAGS: 00010292
  [   18.470944] RAX: dead000000200200 RBX: ffff880117599200 RCX: 00000000c0000100
  [   18.470964] RDX: dead000000100100 RSI: 0000000000000282 RDI: ffffffff81c63a40
  [   18.470983] RBP: ffff880114417998 R08: ffff880114416000 R09: 0000000000000001
  [   18.471001] R10: dead000000200200 R11: 0000000000000001 R12: ffff880115e14a00
  [   18.471020] R13: 0000000000000004 R14: ffffffffa037a0de R15: ffff880117ad4500
  [   18.471039] FS:  00007f068af22700(0000) GS:ffff88011f280000(0000) knlGS:0000000000000000
  [   18.471059] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
  [   18.471075] CR2: 00007fb2ad326000 CR3: 0000000114a66000 CR4: 00000000001406e0
  [   18.471094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [   18.471113] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  [   18.471132] Process mount.cifs (pid: 1967, threadinfo ffff880114416000, task ffff880117ad4500)
  [   18.471155] Stack:
  [   18.471161]  ffff880117599200 ffff880115e14a00 ffff8801144179b8 ffffffff812dd57b
  [   18.471187]  ffff8801159639f6 000000000000008f ffff880114417a08 ffffffff812dd611
  [   18.471210]  0000000000000000 0000000000000000 0000000000000000 ffff8801159639f6
  [   18.471235] Call Trace:
  [   18.471245]  [<ffffffff812dd57b>] crypto_alg_mod_lookup+0x6b/0x90
  [   18.471263]  [<ffffffff812dd611>] crypto_alloc_base+0x41/0xb0
  [   18.471283]  [<ffffffffa03610f9>] smbhash+0x49/0x130 [cifs]
  [   18.471301]  [<ffffffffa036120d>] E_P24+0x2d/0x80 [cifs]
  [   18.471318]  [<ffffffffa03616b7>] SMBNTencrypt+0xb7/0xe0 [cifs]
  [   18.471337]  [<ffffffffa0365b4a>] setup_ntlm_response+0x8a/0x200 [cifs]
  [   18.471357]  [<ffffffffa0368e6f>] CIFS_SessSetup+0x49f/0xde0 [cifs]
  [   18.471377]  [<ffffffffa035fd4a>] ? cifs_buf_release+0x1a/0x30 [cifs]
  [   18.471397]  [<ffffffffa035197f>] cifs_setup_session+0x6f/0x1e0 [cifs]
  [   18.471417]  [<ffffffffa0351e03>] cifs_get_smb_ses+0x313/0x4a0 [cifs]
  [   18.471436]  [<ffffffffa0352039>] cifs_mount+0xa9/0x5f0 [cifs]
  [   18.471453]  [<ffffffffa033f961>] ? cifs_do_mount+0x91/0x280 [cifs]
  [   18.471471]  [<ffffffffa033f985>] cifs_do_mount+0xb5/0x280 [cifs]
  [   18.471489]  [<ffffffff8117bad3>] mount_fs+0x43/0x1b0
  [   18.471504]  [<ffffffff8119637a>] vfs_kern_mount+0x6a/0xc0
  [   18.471521]  [<ffffffff81197884>] do_kern_mount+0x54/0x110
  [   18.471536]  [<ffffffff811993e4>] do_mount+0x1a4/0x260
  [   18.471552]  [<ffffffff811998c0>] sys_mount+0x90/0xe0
  [   18.471568]  [<ffffffff81663442>] system_call_fastpath+0x16/0x1b
  [   18.471583] Code: 55 48 89 e5 53 48 83 ec 08 0f 1f 44 00 00 48 89 fb 48 c7 c7 40 3a c6 81 e8 b3 d3 37 00 48 8b 13 48 8b 43 08 48 c7 c7 40 3a c6 81 <48> 89 42 08 48 89 10 48 b8 00 01 10 00 00 00 ad de 48 ba 00 02
  [   18.471727] RIP  [<ffffffff812dcd1b>] crypto_larval_kill+0x2b/0x90
  [   18.471745]  RSP <ffff880114417988>
  [   18.532660] ---[ end trace fff9eff2aae1eac8 ]---
  
  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: cifs-utils 2:5.1-1ubuntu1
  ProcVersionSignature: Ubuntu 3.2.0-32.51-generic 3.2.30
  Uname: Linux 3.2.0-32-generic x86_64
  ApportVersion: 2.0.1-0ubuntu13
  Architecture: amd64
  Date: Tue Oct 23 10:36:30 2012
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Release amd64 (20120425)
  ProcEnviron:
   LANGUAGE=en_GB:en
   TERM=xterm
   PATH=(custom, user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  SourcePackage: cifs-utils
  UpgradeStatus: No upgrade log present (probably fresh install)

** Changed in: linux (Ubuntu)
       Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1070256

Title:
  mount.cifs occasionally causes GPF error/kernel panic when mounting at
  boot [crypto_larval_kill+0x2b/0x90]

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Stop! If you're about to add a 'Me too!' to this bug, please report a new bug with ubuntu-bug linux and collect logs, and then add a comment in your own report.
  Thanks.
  -------------------------------------------------------------------------------------

  I have a number of Ubuntu Precise Desktop machines which are turned on
  during office hours on a LAN which rely on /etc/fstab entries to auto
  mount cifs shares to a Debian Samba server on the LAN. Normally this
  works fine. Some machines have static IPs, some use DHCP.

  Occasionally though, at boot time, I get a black screen of death with
  stack trace dumped like that shown below. Note that often this causes
  the entire system to hang, but that today it's continued to boot and
  everything seems to be working, except the samba shares. It is usually
  fine after a reboot.

  There is no reason to suggest there is any problem at the server end
  (nothing in syslog) and the server is in use by a dozen other machines
  on the LAN which are successfully connected.

  Sample output (I expect ubuntu-bug attached this anyway):

  [   18.231766] CIFS VFS: default security mechanism requested.  The default security mechanism will be upgraded from ntlm to ntlmv2 in kernel release 3.3
  [   18.470676] general protection fault: 0000 [#1] SMP
  [   18.470700] CPU 1
  [   18.470715] Modules linked in: des_generic md4 bnep rfcomm bluetooth parport_pc ppdev nls_utf8 cifs snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi joydev snd_rawmidi snd_seq_midi_event hid_cherry snd_seq snd_timer snd_seq_device snd i915 drm_kms_helper drm i2c_algo_bit video soundcore mei(C) psmouse snd_page_alloc serio_raw mac_hid lp parport usbhid hid e1000e
  [   18.470865]
  [   18.470872] Pid: 1967, comm: mount.cifs Tainted: G         C   3.2.0-32-generic #51-Ubuntu VeryPC BL5340-D/DH67CF
  [   18.470901] RIP: 0010:[<ffffffff812dcd1b>]  [<ffffffff812dcd1b>] crypto_larval_kill+0x2b/0x90
  [   18.470930] RSP: 0018:ffff880114417988  EFLAGS: 00010292
  [   18.470944] RAX: dead000000200200 RBX: ffff880117599200 RCX: 00000000c0000100
  [   18.470964] RDX: dead000000100100 RSI: 0000000000000282 RDI: ffffffff81c63a40
  [   18.470983] RBP: ffff880114417998 R08: ffff880114416000 R09: 0000000000000001
  [   18.471001] R10: dead000000200200 R11: 0000000000000001 R12: ffff880115e14a00
  [   18.471020] R13: 0000000000000004 R14: ffffffffa037a0de R15: ffff880117ad4500
  [   18.471039] FS:  00007f068af22700(0000) GS:ffff88011f280000(0000) knlGS:0000000000000000
  [   18.471059] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
  [   18.471075] CR2: 00007fb2ad326000 CR3: 0000000114a66000 CR4: 00000000001406e0
  [   18.471094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [   18.471113] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  [   18.471132] Process mount.cifs (pid: 1967, threadinfo ffff880114416000, task ffff880117ad4500)
  [   18.471155] Stack:
  [   18.471161]  ffff880117599200 ffff880115e14a00 ffff8801144179b8 ffffffff812dd57b
  [   18.471187]  ffff8801159639f6 000000000000008f ffff880114417a08 ffffffff812dd611
  [   18.471210]  0000000000000000 0000000000000000 0000000000000000 ffff8801159639f6
  [   18.471235] Call Trace:
  [   18.471245]  [<ffffffff812dd57b>] crypto_alg_mod_lookup+0x6b/0x90
  [   18.471263]  [<ffffffff812dd611>] crypto_alloc_base+0x41/0xb0
  [   18.471283]  [<ffffffffa03610f9>] smbhash+0x49/0x130 [cifs]
  [   18.471301]  [<ffffffffa036120d>] E_P24+0x2d/0x80 [cifs]
  [   18.471318]  [<ffffffffa03616b7>] SMBNTencrypt+0xb7/0xe0 [cifs]
  [   18.471337]  [<ffffffffa0365b4a>] setup_ntlm_response+0x8a/0x200 [cifs]
  [   18.471357]  [<ffffffffa0368e6f>] CIFS_SessSetup+0x49f/0xde0 [cifs]
  [   18.471377]  [<ffffffffa035fd4a>] ? cifs_buf_release+0x1a/0x30 [cifs]
  [   18.471397]  [<ffffffffa035197f>] cifs_setup_session+0x6f/0x1e0 [cifs]
  [   18.471417]  [<ffffffffa0351e03>] cifs_get_smb_ses+0x313/0x4a0 [cifs]
  [   18.471436]  [<ffffffffa0352039>] cifs_mount+0xa9/0x5f0 [cifs]
  [   18.471453]  [<ffffffffa033f961>] ? cifs_do_mount+0x91/0x280 [cifs]
  [   18.471471]  [<ffffffffa033f985>] cifs_do_mount+0xb5/0x280 [cifs]
  [   18.471489]  [<ffffffff8117bad3>] mount_fs+0x43/0x1b0
  [   18.471504]  [<ffffffff8119637a>] vfs_kern_mount+0x6a/0xc0
  [   18.471521]  [<ffffffff81197884>] do_kern_mount+0x54/0x110
  [   18.471536]  [<ffffffff811993e4>] do_mount+0x1a4/0x260
  [   18.471552]  [<ffffffff811998c0>] sys_mount+0x90/0xe0
  [   18.471568]  [<ffffffff81663442>] system_call_fastpath+0x16/0x1b
  [   18.471583] Code: 55 48 89 e5 53 48 83 ec 08 0f 1f 44 00 00 48 89 fb 48 c7 c7 40 3a c6 81 e8 b3 d3 37 00 48 8b 13 48 8b 43 08 48 c7 c7 40 3a c6 81 <48> 89 42 08 48 89 10 48 b8 00 01 10 00 00 00 ad de 48 ba 00 02
  [   18.471727] RIP  [<ffffffff812dcd1b>] crypto_larval_kill+0x2b/0x90
  [   18.471745]  RSP <ffff880114417988>
  [   18.532660] ---[ end trace fff9eff2aae1eac8 ]---

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: cifs-utils 2:5.1-1ubuntu1
  ProcVersionSignature: Ubuntu 3.2.0-32.51-generic 3.2.30
  Uname: Linux 3.2.0-32-generic x86_64
  ApportVersion: 2.0.1-0ubuntu13
  Architecture: amd64
  Date: Tue Oct 23 10:36:30 2012
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Release amd64 (20120425)
  ProcEnviron:
   LANGUAGE=en_GB:en
   TERM=xterm
   PATH=(custom, user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  SourcePackage: cifs-utils
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1070256/+subscriptions