Re: [PATCH 6.6 000/389] 6.6.76-rc2 review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2/6/25 08:06, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 6.6.76 release.
There are 389 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sat, 08 Feb 2025 15:51:12 +0000.
Anything received after that time might be too late.
[snip]
Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
     crypto: api - Fix boot-up self-test race
[snip]
I mentioned in an email to the stable mailing list earlier this week that the crypto-api-fix-boot-up-self-test-race patch, on my systems, is causing a one-minute freeze followed by a crypto self-test failure. See the log excerpt below for an example. (In that email I erroneously said the affected kernel was 6.6.76-rc1. It was 6.6.75 plus stable-queue patches, but not actually 6.6.76-rc1. Sorry for my mistake.)

I'm still experiencing this with 6.6.76-rc2. As before, reverting "crypto: api - Fix boot-up self-test race" fixes it. I also tried testing 6.6.75 plus this patch, and that reproduces the problem. In case it might have been a compiler issue, I tried upgrading my build system from Debian bookworm to trixie, but the issue reproduces with trixie's gcc 14.2 just as it does with bookworm's gcc 12.2.

I also tested 6.12.13-rc2 and 6.13.2-rc2. Those kernels work fine in my testing and do not reproduce this issue.

To be clear, it's personally not a real problem for me if 6.6.76 is released with this patch included -- if necessary, I can just keep reverting this patch until I get my systems upgraded to 6.12. However, I figure this is still worth reporting, in case it eventually turns out to be something that doesn't only affect me.

Anyway, I'll keep digging to see if I can figure out more. Since essentially the same patch that's breaking 6.6 is working just fine on 6.12 and 6.13, I feel like I should be able to find more clues. (However, I may be busy for the next several days, so I'm not sure how soon I'll be able to make progress.)

Log excerpt:

[    5.928519] ima: No TPM chip found, activating TPM-bypass!
[    5.939514] ima: Allocated hash algorithm: sha256
[    5.948952] ima: No architecture policies found
[    5.958056] evm: Initialising EVM extended attributes:
[    5.968355] evm: security.selinux
[    5.975045] evm: security.SMACK64 (disabled)
[    5.983607] evm: security.SMACK64EXEC (disabled)
[    5.992864] evm: security.SMACK64TRANSMUTE (disabled)
[    6.002986] evm: security.SMACK64MMAP (disabled)
[    6.012242] evm: security.apparmor
[    6.019073] evm: security.ima
[    6.025034] evm: security.capability
[    6.032210] evm: HMAC attrs: 0x1
[   68.455379] DRBG: could not allocate digest TFM handle: hmac(sha512)
[   68.468106] alg: drbg: Failed to reset rng
[   68.476319] alg: drbg: Test 0 failed for drbg_nopr_hmac_sha512
[ 68.488002] alg: self-tests for stdrng using drbg_nopr_hmac_sha512 failed (rc=-22)
[   68.488004] ------------[ cut here ]------------
[ 68.512425] alg: self-tests for stdrng using drbg_nopr_hmac_sha512 failed (rc=-22) [ 68.512443] WARNING: CPU: 0 PID: 76 at crypto/testmgr.c:5936 alg_test+0x49e/0x610
[   68.543729] Modules linked in:
[   68.549864] CPU: 0 PID: 76 Comm: cryptomgr_test Not tainted 6.6.76-rc2 #1
[ 68.563454] Hardware name: Gigabyte Technology Co., Ltd. G41MT-S2PT/G41MT-S2PT, BIOS F2 12/06/2011
[   68.581411] RIP: 0010:alg_test+0x49e/0x610
[ 68.589645] Code: de 48 89 df 89 04 24 e8 70 ed fe ff 44 8b 0c 24 e9 bc fc ff ff 44 89 c9 48 89 ea 4c 89 ee 48 c7 c7 f8 9a ad 8d e8 32 75 b2 ff <0f> 0b 44 8b 0c 24 e9 a1 fe ff ff 8b 05 61 04 c2 01 85 c0 74 56 83
[   68.627206] RSP: 0018:ffffbd1fc02efe10 EFLAGS: 00010286
[ 68.637676] RAX: 0000000000000000 RBX: 00000000ffffffff RCX: c0000000ffffefff [ 68.651977] RDX: 0000000000000000 RSI: 00000000ffffefff RDI: 0000000000000001 [ 68.666258] RBP: ffff981cc09a0200 R08: 0000000000000000 R09: ffffbd1fc02efc98 [ 68.680542] R10: 0000000000000003 R11: ffffffff8dcd1368 R12: 0000000000000058 [ 68.694842] R13: ffff981cc09a0280 R14: 0000000000000058 R15: 0000000000000058 [ 68.709125] FS: 0000000000000000(0000) GS:ffff981df7c00000(0000) knlGS:0000000000000000
[   68.725330] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 68.736857] CR2: 00007f1f895112e0 CR3: 0000000083220000 CR4: 00000000000406f0
[   68.751140] Call Trace:
[   68.756063]  <TASK>
[   68.760293]  ? alg_test+0x49e/0x610
[   68.767296]  ? __warn+0x81/0x130
[   68.773778]  ? alg_test+0x49e/0x610
[   68.780781]  ? report_bug+0x171/0x1a0
[   68.788130]  ? console_unlock+0x78/0x120
[   68.795999]  ? handle_bug+0x58/0x90
[   68.803000]  ? exc_invalid_op+0x17/0x70
[   68.810699]  ? asm_exc_invalid_op+0x1a/0x20
[   68.819103]  ? alg_test+0x49e/0x610
[   68.826108]  ? finish_task_switch.isra.0+0x90/0x2d0
[   68.835882]  ? __schedule+0x3c8/0xb00
[   68.843231]  ? __pfx_cryptomgr_test+0x10/0x10
[   68.851967]  cryptomgr_test+0x24/0x40
[   68.859317]  kthread+0xe5/0x120
[   68.865627]  ? __pfx_kthread+0x10/0x10
[   68.873166]  ret_from_fork+0x31/0x50
[   68.880343]  ? __pfx_kthread+0x10/0x10
[   68.887881]  ret_from_fork_asm+0x1b/0x30
[   68.895753]  </TASK>
[   68.900154] ---[ end trace 0000000000000000 ]---

--
-Barry K. Nathan  <barryn@xxxxxxxxx>




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux