Bug 1380379 - kernel oops: Process cryptomgr_test (pid: 474, stack limit = 0xdc550220)
Summary: kernel oops: Process cryptomgr_test (pid: 474, stack limit = 0xdc550220)
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 24
Hardware: armv7hl
OS: Linux
unspecified
high
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-09-29 12:26 UTC by Anton Arapov
Modified: 2016-11-01 10:43 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-11-01 10:43:34 UTC
Type: Bug


Attachments (Terms of Use)
boot.log (62.48 KB, text/plain)
2016-09-29 12:26 UTC, Anton Arapov
no flags Details

Description Anton Arapov 2016-09-29 12:26:54 UTC
Created attachment 1205944 [details]
boot.log

I've downloaded and installed recent Fedora-Server-armhfp-24-1.2-sda.raw.xz image.
Hardware is BeagleBoneBlack rev.C

After the dnf upgrade -y, where the new kernel has been installed: 
[root@bigot ~]# uname -a
Linux bigot 4.7.4-200.fc24.armv7hl #1 SMP Thu Sep 15 20:44:24 UTC 2016 armv7l armv7l armv7l GNU/Linux

I am getting the following kernel oops message:
[   37.016417] Unable to handle kernel NULL pointer dereference at virtual address 0000002c
[   37.024929] pgd = c0204000
[   37.027764] [0000002c] *pgd=00000000
[   37.031526] Internal error: Oops: 5 [#1] SMP ARM
[   37.036368] Modules linked in: virtio omap_aes(+) crypto_engine omap_sham(+) omap_rng omap_hwspinlock hwspinlock_core omap_mailbox at24 nvmem_core musb_am335x omap_wdt 8250_omap leds_gpio nfsd auth_rpcgss nfs_acl lockd grace sunrpc xfs libcrc32c smsc davinci_mdio mmc_block ti_cpsw cpsw_common ptp pps_core cpsw_ale tda998x tilcdc davinci_cpdma drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops omap_hsmmc mmc_core drm
[   37.076143] CPU: 0 PID: 474 Comm: cryptomgr_test Not tainted 4.7.4-200.fc24.armv7hl #1
[   37.084445] Hardware name: Generic AM33XX (Flattened Device Tree)
[   37.090836] task: cfce3a00 ti: dc550000 task.ti: dc550000
[   37.096519] PC is at _raw_spin_lock_irqsave+0x18/0x54
[   37.101831] LR is at crypto_transfer_request+0x24/0x84 [crypto_engine]
[   37.108677] pc : [<c08c24d4>]    lr : [<bf3ec090>]    psr: a0010093
[   37.108677] sp : dc551c88  ip : dc551d60  fp : 00000000
[   37.120718] r10: dc551d40  r9 : dc6f03c0  r8 : 00000001
[   37.126196] r7 : dba39000  r6 : dc6f0400  r5 : 0000002c  r4 : 00000000
[   37.133041] r3 : 0000002c  r2 : 00000001  r1 : dc6f0400  r0 : a0010013
[   37.139889] Flags: NzCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment none
[   37.147463] Control: 10c5387d  Table: 9bd3c019  DAC: 00000051
[   37.153487] Process cryptomgr_test (pid: 474, stack limit = 0xdc550220)
[   37.160424] Stack: (0xdc551c88 to 0xdc552000)
[   37.164995] 1c80:                   c0da6ec8 dc6f09c0 00000001 dba39000 00000000 c04beb08
[   37.173576] 1ca0: 99e63f22 00000008 00002800 c04b1904 c0b1a3ec bf3f3468 00000000 c0da6ec8
[   37.182157] 1cc0: c0b0d88d 00000000 00000004 dfdbf480 cfce3a80 00000001 00000000 00000000
[   37.190737] 1ce0: 0000015f c0281ec4 1eecebf7 00000000 00000000 dc551cf4 dc551cf4 c02867d0
[   37.199318] 1d00: dba39000 dcb27000 dcbac000 dbded000 dc506000 dc507000 dcba8000 dcba9000
[   37.207898] 1d20: 00000073 00000000 0001870e 00000000 ffffffff 00000000 00000003 c0d4ca68
[   37.216477] 1d40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   37.225057] 1d60: deb63006 00000000 00000010 00000000 00000000 c023a694 c0d57b50 00000000
[   37.233638] 1d80: 00000000 c023a7c0 c0d57b50 00000080 c0d4f814 c023a974 c0d57b50 00000000
[   37.242218] 1da0: c0d57b50 00000000 00000000 c023ac48 c0d57b50 00000003 00000003 c0d57b50
[   37.250800] 1dc0: c0d57bb0 a0010013 00000000 c023b244 00000000 de1d5240 00000001 c028de44
[   37.259380] 1de0: de1d60e0 60010093 00000003 00000000 00000000 c0625bf0 de1d6010 c0625bf0
[   37.267961] 1e00: de1d6010 c06262d0 de1d6010 de199c10 00000000 de1d6074 dc550000 c06262d8
[   37.276541] 1e20: 9e4cea0e 00000008 a0070093 db77cd00 dd656600 cfce3a80 00000000 de1d6010
[   37.285122] 1e40: 00000004 de1d6074 60010013 dc62a180 00003085 c0626524 dc55bd80 dc6f0798
[   37.293703] 1e60: dc55bd80 00000000 dc62a180 bf3f11b4 dc55bd80 bf3f3400 00000000 c04b5c58
[   37.302284] 1e80: dc6f09c0 00000000 dc6f0a00 bf3f3400 dc62a180 c04ba2a4 dc6f09c0 dc6f0a00
[   37.310864] 1ea0: c08e1fa8 dc6f09c0 dc6f09c0 00000001 c0da6ec8 00000004 c04c1280 00000076
[   37.319446] 1ec0: ffffffff c04c11f4 00000000 00000000 dc62a180 dc6f09c0 c08e2ea0 dc62a1c0
[   37.328027] 1ee0: 00000400 c04c130c dc62a180 00001085 c0ef1444 c04c1960 dc551f54 c08bea0c
[   37.336608] 1f00: cfce3fe8 dbd3bc44 dbd3bc50 00000001 00000003 00000000 00000001 c08bed3c
[   37.345188] 1f20: 00000000 1f086000 dbd3bc4c dbd3bc48 a00f0013 dc550000 00000000 dc62a180
[   37.353768] 1f40: 00000000 dc62a180 c04be1d4 00000000 00000000 00000000 00000000 c04be200
[   37.362349] 1f60: dd6c8e80 c026e9d0 00000000 00000000 dc551f70 dc62a180 00000000 00000000
[   37.370929] 1f80: dc551f80 dc551f80 00000000 00000000 dc551f90 dc551f90 dd6c8e80 dd6c8e80
[   37.379509] 1fa0: c026e8f0 00000000 00000000 c020fd18 00000000 00000000 00000000 00000000
[   37.388089] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   37.396669] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[   37.405270] [<c08c24d4>] (_raw_spin_lock_irqsave) from [<bf3ec090>] (crypto_transfer_request+0x24/0x84 [crypto_engine])
[   37.416622] [<bf3ec090>] (crypto_transfer_request [crypto_engine]) from [<c04beb08>] (__test_skcipher+0x2d0/0x868)
[   37.427485] [<c04beb08>] (__test_skcipher) from [<c04c11f4>] (test_skcipher+0x2c/0xb8)
[   37.435793] [<c04c11f4>] (test_skcipher) from [<c04c130c>] (alg_test_skcipher+0x8c/0xa8)
[   37.444283] [<c04c130c>] (alg_test_skcipher) from [<c04c1960>] (alg_test+0x2c4/0x37c)
[   37.452498] [<c04c1960>] (alg_test) from [<c04be200>] (cryptomgr_test+0x2c/0x4c)
[   37.460272] [<c04be200>] (cryptomgr_test) from [<c026e9d0>] (kthread+0xe0/0xf0)
[   37.467954] [<c026e9d0>] (kthread) from [<c020fd18>] (ret_from_fork+0x14/0x3c)
[   37.475536] Code: e1a03000 e10f0000 f10c0080 f5d3f000 (e1931f9f) 
[   37.481931] ---[ end trace 80b94c3c9fab1855 ]---

See the full log attached.

Comment 1 Anton Arapov 2016-09-29 12:33:24 UTC
Temporary workaround is to use *cryptomgr.notests* kernel parameter. This "fixes" the issue.

Comment 2 Anton Arapov 2016-10-03 11:36:58 UTC
Issue still not resolved:
Linux bigot 4.7.5-200.fc24.armv7hl #1 SMP Mon Sep 26 18:12:03 UTC 2016 armv7l armv7l armv7l GNU/Linux

Comment 3 Anton Arapov 2016-10-10 07:45:54 UTC
Issue still here:
Linux bigot 4.7.6-200.fc24.armv7hl #1 SMP Mon Oct 3 19:32:29 UTC 2016 armv7l armv7l armv7l GNU/Linux

Even though there was couple NULL pointer issues in crypto subsystem resolved in 4.7.6 branch, none of the had effect :-( :
e151a6f10fb1439832083dbf0b40a77f4f23cba3
aa3520cf8c14a61e315b7e43756464e45dcc7ed1
from linux-stable branch.

Comment 4 Anton Arapov 2016-11-01 10:43:34 UTC
Issue has gone with 4.8.4-200.fc24.armv7hl #1 SMP Tue Oct 25 15:16:17 UTC 2016 armv7l armv7l armv7l GNU/Linux

the commit #f82e90b28654804ab72881d577d87c3d5c65e2bc is likely to fix it. :)


Note You need to log in before you can comment on or make changes to this bug.