Robert: Please file a separate bug using ubuntu-bug if possible - and
add a comment on here giving the bug number - NFS will probably be a
separate bug, but CIFS is what we have here ; we need to see whether
it's really the same or just similar.

Now; everyone who has reported this bug, lets see if there is any commonality; 
so please reply adding a comment stating:
   * How you configured the samba - any particular options you used etc (if you 
can include config files that would be great - *as long as you can remove 
anything confidential like passwords etc*)
   * What CPUs are your clients?
   * What are your servers (Windows - if so what version, Linux? Some type of 
NAS box? What version)
   * Do you know if you have any particular crypt option enabled?

Dave

** Description changed:

+ Stop! If you're about to add a 'me to' to this bug, please report a new bug 
with ubuntu-bug linux and collect logs, and then add a comment stating the bug 
number to here.
+ Thanks.
+ 
-----------------------------------------------------------------------------------------
+ 
  I have a number of Ubuntu Precise Desktop machines which are turned on
  during office hours on a LAN which rely on /etc/fstab entries to auto
  mount cifs shares to a Debian Samba server on the LAN. Normally this
  works fine. Some machines have static IPs, some use DHCP.
  
  Occasionally though, at boot time, I get a black screen of death with
  stack trace dumped like that shown below. Note that often this causes
  the entire system to hang, but that today it's continued to boot and
  everything seems to be working, except the samba shares. It is usually
  fine after a reboot.
  
  There is no reason to suggest there is any problem at the server end
  (nothing in syslog) and the server is in use by a dozen other machines
  on the LAN which are successfully connected.
  
  Sample output (I expect ubuntu-bug attached this anyway):
  
  [   18.231766] CIFS VFS: default security mechanism requested.  The default 
security mechanism will be upgraded from ntlm to ntlmv2 in kernel release 3.3
- [   18.470676] general protection fault: 0000 [#1] SMP 
- [   18.470700] CPU 1 
+ [   18.470676] general protection fault: 0000 [#1] SMP
+ [   18.470700] CPU 1
  [   18.470715] Modules linked in: des_generic md4 bnep rfcomm bluetooth 
parport_pc ppdev nls_utf8 cifs snd_hda_codec_hdmi snd_hda_codec_realtek 
snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi joydev snd_rawmidi 
snd_seq_midi_event hid_cherry snd_seq snd_timer snd_seq_device snd i915 
drm_kms_helper drm i2c_algo_bit video soundcore mei(C) psmouse snd_page_alloc 
serio_raw mac_hid lp parport usbhid hid e1000e
- [   18.470865] 
+ [   18.470865]
  [   18.470872] Pid: 1967, comm: mount.cifs Tainted: G         C   
3.2.0-32-generic #51-Ubuntu VeryPC BL5340-D/DH67CF
  [   18.470901] RIP: 0010:[<ffffffff812dcd1b>]  [<ffffffff812dcd1b>] 
crypto_larval_kill+0x2b/0x90
  [   18.470930] RSP: 0018:ffff880114417988  EFLAGS: 00010292
  [   18.470944] RAX: dead000000200200 RBX: ffff880117599200 RCX: 
00000000c0000100
  [   18.470964] RDX: dead000000100100 RSI: 0000000000000282 RDI: 
ffffffff81c63a40
  [   18.470983] RBP: ffff880114417998 R08: ffff880114416000 R09: 
0000000000000001
  [   18.471001] R10: dead000000200200 R11: 0000000000000001 R12: 
ffff880115e14a00
  [   18.471020] R13: 0000000000000004 R14: ffffffffa037a0de R15: 
ffff880117ad4500
  [   18.471039] FS:  00007f068af22700(0000) GS:ffff88011f280000(0000) 
knlGS:0000000000000000
  [   18.471059] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
  [   18.471075] CR2: 00007fb2ad326000 CR3: 0000000114a66000 CR4: 
00000000001406e0
  [   18.471094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
  [   18.471113] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
  [   18.471132] Process mount.cifs (pid: 1967, threadinfo ffff880114416000, 
task ffff880117ad4500)
  [   18.471155] Stack:
  [   18.471161]  ffff880117599200 ffff880115e14a00 ffff8801144179b8 
ffffffff812dd57b
  [   18.471187]  ffff8801159639f6 000000000000008f ffff880114417a08 
ffffffff812dd611
  [   18.471210]  0000000000000000 0000000000000000 0000000000000000 
ffff8801159639f6
  [   18.471235] Call Trace:
  [   18.471245]  [<ffffffff812dd57b>] crypto_alg_mod_lookup+0x6b/0x90
  [   18.471263]  [<ffffffff812dd611>] crypto_alloc_base+0x41/0xb0
  [   18.471283]  [<ffffffffa03610f9>] smbhash+0x49/0x130 [cifs]
  [   18.471301]  [<ffffffffa036120d>] E_P24+0x2d/0x80 [cifs]
  [   18.471318]  [<ffffffffa03616b7>] SMBNTencrypt+0xb7/0xe0 [cifs]
  [   18.471337]  [<ffffffffa0365b4a>] setup_ntlm_response+0x8a/0x200 [cifs]
  [   18.471357]  [<ffffffffa0368e6f>] CIFS_SessSetup+0x49f/0xde0 [cifs]
  [   18.471377]  [<ffffffffa035fd4a>] ? cifs_buf_release+0x1a/0x30 [cifs]
  [   18.471397]  [<ffffffffa035197f>] cifs_setup_session+0x6f/0x1e0 [cifs]
  [   18.471417]  [<ffffffffa0351e03>] cifs_get_smb_ses+0x313/0x4a0 [cifs]
  [   18.471436]  [<ffffffffa0352039>] cifs_mount+0xa9/0x5f0 [cifs]
  [   18.471453]  [<ffffffffa033f961>] ? cifs_do_mount+0x91/0x280 [cifs]
  [   18.471471]  [<ffffffffa033f985>] cifs_do_mount+0xb5/0x280 [cifs]
  [   18.471489]  [<ffffffff8117bad3>] mount_fs+0x43/0x1b0
  [   18.471504]  [<ffffffff8119637a>] vfs_kern_mount+0x6a/0xc0
  [   18.471521]  [<ffffffff81197884>] do_kern_mount+0x54/0x110
  [   18.471536]  [<ffffffff811993e4>] do_mount+0x1a4/0x260
  [   18.471552]  [<ffffffff811998c0>] sys_mount+0x90/0xe0
  [   18.471568]  [<ffffffff81663442>] system_call_fastpath+0x16/0x1b
- [   18.471583] Code: 55 48 89 e5 53 48 83 ec 08 0f 1f 44 00 00 48 89 fb 48 c7 
c7 40 3a c6 81 e8 b3 d3 37 00 48 8b 13 48 8b 43 08 48 c7 c7 40 3a c6 81 <48> 89 
42 08 48 89 10 48 b8 00 01 10 00 00 00 ad de 48 ba 00 02 
+ [   18.471583] Code: 55 48 89 e5 53 48 83 ec 08 0f 1f 44 00 00 48 89 fb 48 c7 
c7 40 3a c6 81 e8 b3 d3 37 00 48 8b 13 48 8b 43 08 48 c7 c7 40 3a c6 81 <48> 89 
42 08 48 89 10 48 b8 00 01 10 00 00 00 ad de 48 ba 00 02
  [   18.471727] RIP  [<ffffffff812dcd1b>] crypto_larval_kill+0x2b/0x90
  [   18.471745]  RSP <ffff880114417988>
  [   18.532660] ---[ end trace fff9eff2aae1eac8 ]---
  
  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: cifs-utils 2:5.1-1ubuntu1
  ProcVersionSignature: Ubuntu 3.2.0-32.51-generic 3.2.30
  Uname: Linux 3.2.0-32-generic x86_64
  ApportVersion: 2.0.1-0ubuntu13
  Architecture: amd64
  Date: Tue Oct 23 10:36:30 2012
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Release amd64 
(20120425)
  ProcEnviron:
-  LANGUAGE=en_GB:en
-  TERM=xterm
-  PATH=(custom, user)
-  LANG=en_GB.UTF-8
-  SHELL=/bin/bash
+  LANGUAGE=en_GB:en
+  TERM=xterm
+  PATH=(custom, user)
+  LANG=en_GB.UTF-8
+  SHELL=/bin/bash
  SourcePackage: cifs-utils
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1070256

Title:
  mount.cifs occasionally causes GPF error/kernel panic when mounting at
  boot [crypto_larval_kill+0x2b/0x90]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1070256/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to