Wind River Support Network

HomeDefectsLIN10-3774
Fixed

LIN10-3774 : Call trace (cryptodev_ioctl+0x247/0x630 [cryptodev]) found during cryptodev testing (cipher-gcm)

Created: Apr 23, 2018    Updated: Dec 3, 2018
Resolved Date: May 20, 2018
Found In Version: 10.17.41.7
Fix Version: 10.17.41.8
Severity: Standard
Applicable for: Wind River Linux LTS 17
Component/s: BSP, Kernel

Description

Call trace (cryptodev_ioctl+0x247/0x630 [cryptodev]) found during cryptodev testing (cipher-gcm)


Problem Description
======================

root@intel-skylake-avx512-64:/# cipher-gcm
BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
IP: scatterwalk_copychunks+0x127/0x150
PGD 8000008f35e05067
P4D 8000008f35e05067
PUD 8f35dfd067
PMD 0 

Oops: 0000 [#1] PREEMPT SMP PTI
Modules linked in: ghash_generic gf128mul gcm cryptodev(O) blowfish_generic blowfish_common intel_rapl skx_edac x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul crct10dif_common aesni_intel aes_x86_64 crypto_simd cryptd glue_helper iTCO_wdt efi_pstore iTCO_vendor_support efivars lpc_ich i2c_i801 wmi acpi_pad acpi_power_meter openvswitch nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack [last unloaded: cryptodev]
CPU: 98 PID: 2939 Comm: cipher-gcm Tainted: G           O    4.12.21-yocto-standard #2
Hardware name: Intel Corporation PURLEY/PURLEY, BIOS PLYDCRB1.86B.0119.R05.1701181843 01/18/2017
task: ffff98f1f6108000 task.stack: ffffacb926280000
RIP: 0010:scatterwalk_copychunks+0x127/0x150
RSP: 0018:ffffacb926283a80 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000cd4 RCX: 0000000000000008
RDX: 0000000000000cd4 RSI: ffff98f1fd962cd4 RDI: ffff9922189428a0
RBP: ffffacb926283ab8 R08: ffff989238c0f800 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000000 R12: ffff99221c2de068
R13: ffffacb926283b70 R14: ffff98f1fd962000 R15: 0000000000000008
FS:  00007f54d9d54740(0000) GS:ffff992239e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 0000008f367a8004 CR4: 00000000007606e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 skcipher_walk_next+0x21a/0x500
 skcipher_walk_done+0x8c/0x200
 ctr_crypt+0x9b/0x1a0 [aesni_intel]
 simd_skcipher_encrypt+0xbd/0xd0 [crypto_simd]  ? simd_skcipher_encrypt+0xbd/0xd0 [crypto_simd]
 crypto_gcm_encrypt+0xc7/0xf0 [gcm]
 cryptodev_cipher_encrypt+0x87/0xf0 [cryptodev]
 crypto_auth_run+0x30c/0xec0 [cryptodev]
 cryptodev_ioctl+0x247/0x630 [cryptodev]
 do_vfs_ioctl+0x9a/0x6f0
 ? _raw_spin_unlock+0x31/0x50
 ? entry_SYSCALL_64_after_hwframe+0x31/0x96
 SyS_ioctl+0x79/0x90
 do_syscall_64+0x6f/0x130
 entry_SYSCALL_64_after_hwframe+0x21/0x96
RIP: 0033:0x3faa6e8b97
RSP: 002b:00007ffed77e2138 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000603140 RCX: 0000003faa6e8b97
RDX: 00007ffed77e2180 RSI: 00000000c048636d RDI: 0000000000000004
RBP: 0000000000000002 R08: 0000000000401920 R09: 0000003faa20f860
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffed77e21d0
R13: 0000000000000003 R14: 0000000000000004 R15: 0000000000000000
Code: cf 41 89 55 08 74 36 49 8b 45 00 49 01 cc 49 29 cf 8b 58 0c 03 58 08 39 da 0f 82 13 ff ff ff 48 89 c7 e8 dd 45 06 00 49 89 45 00 <8b> 50 08 41 89 55 08 8b 58 0c 03 58 08 e9 f5 fe ff ff 48 83 c4
RIP: scatterwalk_copychunks+0x127/0x150 RSP: ffffacb926283a80
CR2: 0000000000000008
---[ end trace 22109945f1dd982b ]---
BUG: sleeping function called from invalid context at /kernel-source//include/linux/percpu-rwsem.h:33
in_atomic(): 1, irqs_disabled(): 1, pid: 2939, name: cipher-gcm
INFO: lockdep is turned off.
irq event stamp: 3700
hardirqs last  enabled at (3699): [<ffffffffa9baf967>] _raw_write_unlock_irqrestore+0x57/0x70
hardirqs last disabled at (3700): [<ffffffffa9c01588>] error_entry+0x98/0x110 softirqs last  enabled at (3526): [<ffffffffa9e00279>] __do_softirq+0x279/0x503 softirqs last disabled at (3505): [<ffffffffa906cd6e>] irq_exit+0xae/0xc0 Preemption disabled at: 
[<ffffffffa9026153>] kernel_fpu_begin+0x13/0x20
CPU: 98 PID: 2939 Comm: cipher-gcm Tainted: G      D    O    4.12.21-yocto-standard #2
Hardware name: Intel Corporation PURLEY/PURLEY, BIOS PLYDCRB1.86B.0119.R05.1701181843 01/18/2017 Call Trace:
 dump_stack+0x70/0x9e
 ___might_sleep+0x163/0x260
 __might_sleep+0x4a/0x80
 exit_signals+0x24/0x2a0
 do_exit+0x9d/0xc70
 ? SyS_ioctl+0x79/0x90
rewind_stack_do_exit+0x17/0x20
RIP: 0033:0x3faa6e8b97
RSP: 002b:00007ffed77e2138 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000603140 RCX: 0000003faa6e8b97
RDX: 00007ffed77e2180 RSI: 00000000c048636d RDI: 0000000000000004
RBP: 0000000000000002 R08: 0000000000401920 R09: 0000003faa20f860
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffed77e21d0
R13: 0000000000000003 R14: 0000000000000004 R15: 0000000000000000
note: cipher-gcm[2939] exited with preempt_count 1

Steps to Reproduce

1. Build a project
/lpg-build/cdc/fast_prod/WRL10_17/WRL10_17_GIT/wrlinux-10/setup.sh --machines intel-skylake-avx512-64 --distros=wrlinux --dl-layers --accept-eula=yes

. ./environment-setup-x86_64-wrlinuxsdk-linux
. ./oe-init-build-env build_test

bitbake-layers add-layer /buildarea1/lliu2/wrl10/testlayer/WRLINUX_10_17_HEAD/wrlinux/wr-testing/kts-dev

echo "WRTEMPLATE_append = \" feature/wr-kts feature/test\"" >> conf/local.conf echo "IMAGE_FSTYPES=\"tar.bz2 ext4\"" >> conf/local.conf echo "IMAGE_ROOTFS_EXTRA_SPACE = \"5242880\"" >> conf/local.conf echo "INITRAMFS_MAXSIZE=\"500000\"" >> conf/local.conf echo "BB_NO_NETWORK=\"0\"" >> conf/local.conf echo "NOHDD=\"1\"" >> conf/local.conf

bitbake wrlinux-image-glibc-std

2.  Load image to the target (Barcode: 25038)

3. Run the command of "cipher-gcm" as below

root@intel-skylake-avx512-64:/ # cipher-gcm

Other Downloads


Live chat
Online