Hello all,

I have an issue concerning cryptodev and talitos use. I use kernel 2.6.32-13, 
however I use the talitos version of 2.6.35 backported. I have several times a 
crash like the one below.

Unable to handle kernel paging request for data at address 0x00000000
Faulting instruction address: 0xc0356aa4
Oops: Kernel access of bad area, sig: 11 [#1]
SMP NR_CPUS=2 OCC
Modules linked in: streams_liscompat streams_pipemod streams_nullmod 
streams_connld streams_pipe streams_nsdev streams_mux streams_loop streams_log 
streams_fifo streams_echo streams specfs ecb nf_conntrack_ipv6 ip6table_filter 
ip6_tables xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack 
xt_pkttype iptable_filter ip_tables x_tables httpk drv_vxt drv_tapi avmfritz 
mISDN_isac drv_ifxos bmod_scc tlani_fpga falc_e1 mISDN_l1 cma_card ivm_occm 
falc54_t1 cma_mfc mISDN_core board_control hdlc_scc icgx iomengine lsb obus 
tdmswitch scc_core i2c_dev common_irq ehci_hcd
NIP: c0356aa4 LR: c0359770 CTR: c00105b4
REGS: ef0cdb10 TRAP: 0300   Not tainted  (2.6.32.13)
MSR: 00029000 <EE,ME,CE>  CR: 82440444  XER: 20000000
DEAR: 00000000, ESR: 00000000
TASK = ee8a5300[3428] 'cla' THREAD: ef0cc000 CPU: 1
GPR00: c0359770 ef0cdbc0 ee8a5300 ef8e9a10 00000000 00000001 00000001 00000000 
GPR08: 00000000 00000000 00000000 c0601340 82440442 106edef8 3ff97900 00000080 
GPR16: bf953f34 00000040 00000014 00000018 10842f18 10842de8 10842e90 efb306c0 
GPR24: ee8dd5b8 00000000 00000000 c0601340 00000000 00000001 ef8e9a10 00000001 
NIP [c0356aa4] talitos_map_sg+0x4c/0x158
LR [c0359770] common_nonsnoop_hash.clone.17+0xcc/0x26c
Call Trace:
[ef0cdbc0] [ef8e9a10] 0xef8e9a10 (unreliable)
[ef0cdbf0] [c0359770] common_nonsnoop_hash.clone.17+0xcc/0x26c
[ef0cdc20] [c0359d34] ahash_process_req+0x1d8/0x274
[ef0cdc60] [c01f98b0] crypto_ahash_op+0x2c/0x4c
[ef0cdc70] [c020c48c] cryptodev_hash_final+0x38/0xc0
[ef0cdc80] [c020b72c] crypto_run+0x11c/0x360
[ef0cdcb0] [c020afd4] cryptodev_ioctl+0x3f0/0x62c
[ef0cdec0] [c00d88b8] vfs_ioctl+0x40/0xac
[ef0cdee0] [c00d92a0] do_vfs_ioctl+0x7c/0x3f4
[ef0cdf10] [c00d9658] sys_ioctl+0x40/0x74
[ef0cdf40] [c0010d90] ret_from_syscall+0x0/0x3c
Instruction dump:
90010034 7cbf2b78 7cdd3378 91810010 409e0094 2f830000 419e0110 8363007c 
2f9f0000 409d0030 7f99e378 3b400000 <80790000> 3b5a0001 5463003a 4bd53409 
---[ end trace 4a68eac5dd21520b ]---

I attach the objdump. Having a close look I can see that the scatterlist 
pointer is NULL (req_ctx->psrc = NULL => areq->src = NULL => data coming from 
the user space application, patched openssl).

Do you have any hint concerning that issue?
 
Kind Regards/Με ευχές
Nikolaos Tsakalakis
_______________________________________________
Cryptodev-linux-devel mailing list
Cryptodev-linux-devel@gna.org
https://mail.gna.org/listinfo/cryptodev-linux-devel

Reply via email to