Public bug reported: Our ARM64 servers are tripping a BUG in the 5.4.0-182 kernel when running cert regression testing:
bizzy login: [ 221.090860] kernel BUG at /build/linux-hwe-5.4-OMohr6/linux-hwe-5.4-5.4.0/crypto/algapi.c:431! [ 221.099468] Internal error: Oops - BUG: 0 [#1] SMP [ 221.104250] Modules linked in: aes_ce_blk(+) salsa20_generic pcbc ofb lrw chacha_neon chacha_generic cfb xxhash_generic xcbc wp512 vmac tgr192 sm3_generic rmd320 rmd256 rmd128 nhpoly1305_neon nhpoly1305 poly1305_generic michael_mic md4 streebog_generic sha3_generic rmd160 crc32_generic cmac algif_rng twofish_generic twofish_common tea serpent_generic seed khazad fcrypt cast6_generic cast5_generic cast_common camellia_generic blowfish_generic blowfish_common anubis aes_arm64 algif_skcipher algif_hash sm4_generic ccm aes_ce_ccm des_generic libdes authenc aegis128 algif_aead af_alg nls_iso8859_1 arm_spe_pmu ipmi_ssif joydev binfmt_misc input_leds cdc_ether usbnet ipmi_devintf ipmi_msghandler cppc_cpufreq xgene_hwmon acpi_tad sch_fq_codel ib_iser rdma_cm iw_cm ib_cm iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath [ 221.104294] linear mlx5_ib hid_generic usbhid hid uas usb_storage ast i2c_algo_bit ib_uverbs drm_vram_helper ttm ib_core drm_kms_helper syscopyarea crct10dif_ce ghash_ce sha2_ce sysfillrect sha256_arm64 sysimgblt nvme fb_sys_fops sha1_ce mlx5_core drm nvme_core tls mlxfw aes_neon_blk crypto_simd cryptd aes_ce_cipher [ 221.219601] CPU: 66 PID: 26460 Comm: modprobe Not tainted 5.4.0-182-generic #202~18.04.1-Ubuntu [ 221.228286] Hardware name: WIWYNN Mt.Jade Server System B81.030Z1.0007/Mt.Jade Motherboard, BIOS 1.6.20210526 (SCP: 1.06.20210526) 2021/05/26 [ 221.240963] pstate: 20400009 (nzCv daif +PAN -UAO) [ 221.245756] pc : crypto_unregister_alg+0xe8/0xf0 [ 221.250360] lr : crypto_unregister_alg+0x8c/0xf0 [ 221.254964] sp : ffff800043c2ba90 [ 221.258265] x29: ffff800043c2ba90 x28: 0000000000000100 [ 221.263564] x27: ffffa8525f8fd8a8 x26: 0000000000000001 [ 221.268863] x25: 0000000000000001 x24: ffff369494c70e48 [ 221.274162] x23: ffffa85251c08b10 x22: ffff800043c2bac8 [ 221.279460] x21: ffffa85261875458 x20: ffffa85260b17000 [ 221.284759] x19: ffffa85251c08100 x18: 0000000000000000 [ 221.290057] x17: 0000000000000000 x16: ffffa8525fd2fb40 [ 221.295355] x15: 401755505c001000 x14: 0000000000000000 [ 221.300653] x13: 0000000000000000 x12: 000000000000000b [ 221.305952] x11: 0000000000000010 x10: 0101010101010101 [ 221.311251] x9 : 0000000000000425 x8 : ffffa85251c08110 [ 221.316550] x7 : ffff800043c2ba78 x6 : ffffa85251c08110 [ 221.321848] x5 : ffff800043c2ba68 x4 : ffff800043c2ba78 [ 221.327146] x3 : dead000000000100 x2 : dead000000000122 [ 221.332445] x1 : e159eb2802a92900 x0 : 0000000000000003 [ 221.337745] Call trace: [ 221.340180] crypto_unregister_alg+0xe8/0xf0 [ 221.344439] crypto_unregister_skciphers+0x4c/0x60 [ 221.349222] aes_exit+0x5c/0x98 [aes_ce_blk] [ 221.353481] cpu_feature_match_AES_init+0xb4/0x1000 [aes_ce_blk] [ 221.359480] do_one_initcall+0x54/0x290 [ 221.363308] do_init_module+0x50/0x1fc [ 221.367049] load_module+0x1a48/0x2008 [ 221.370786] __do_sys_finit_module+0x100/0x118 [ 221.375217] __arm64_sys_finit_module+0x28/0x38 [ 221.379735] el0_svc_common.constprop.3+0x80/0x1f8 [ 221.384512] el0_svc_handler+0x34/0xb0 [ 221.388250] el0_svc+0x10/0x180 [ 221.391381] Code: aa1503e0 97ede3df 12800020 17fffff4 (d4210000) [ 221.397465] ---[ end trace 1ac9e656a151d682 ]--- [ 7418.231746] ------------[ cut here ]------------ ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067527 Title: kernel BUG at crypto/algapi.c:431! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2067527/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs