Re: [Ocf-linux-users] Segmentation fault
Brought to you by:
david-m
From: Schuurman, H. <he...@ti...> - 2011-11-04 14:17:12
|
Hi guys, I'm running into an issue with the latest version of OCF. The test environment is a 2.6.37 kernel on an ARM Cortex-A8 with the 2011/07/20 release of OCF, using openssl 1.0.0e for testing. Hardware crypto acceleration is not compiled into the kernel to eliminate any problems from that part of the code. Without loading ocf/cryptodev/cryptosoft, I get the following expected result: root@dm816x-evm:~# /usr/local/ssl/bin/openssl dgst -sha1 -hmac etaonrishdlcupfm cryptotest HMAC-SHA1(cryptotest)= a4c468838e7fb7b59331f77bbd2d82baea489333 However, when I load ocf/cryptodev/cryptosoft, and execute the same command again, I get a segmentation fault. Enabling debug on the cryptosoft driver and executing the same command again yields: root@dm816x-evm:~# modprobe ocf ocf: module license 'BSD' taints kernel. Disabling lock debugging due to kernel taint root@dm816x-evm:~# modprobe cryptodev root@dm816x-evm:~# modprobe cryptosoft swcr_debug=1 cryptosoft_init(bf05ee64) cryptosoft_init:Algorithm 0 not supported cryptosoft_init:Algorithm Type 16 not supported (algorithm 3:'cbc(blowfish)') cryptosoft_init:Algorithm Type 16 not supported (algorithm 4:'cbc(cast5)') cryptosoft_init:Algorithm Type 16 not supported (algorithm 5:'cbc(skipjack)') cryptosoft_init:Algorithm Type 2 not supported (algorithm 8:'hmac(ripemd160)') cryptosoft_init:Algorithm Type 4 not supported (algorithm 9:'md5-kpdk') cryptosoft_init:Algorithm Type 4 not supported (algorithm 10:'sha1-kpdk') cryptosoft_init:Algorithm Type 16 not supported (algorithm 12:'ecb(arc4)') cryptosoft_init:Algorithm Type 2 not supported (algorithm 15:'hmac(digest_null)') cryptosoft_init:Algorithm Type 16 not supported (algorithm 16:'cbc(cipher_null)') cryptosoft_init:Algorithm Type 8 not supported (algorithm 17:'deflate') cryptosoft_init:Algorithm Type 2 not supported (algorithm 19:'hmac(sha384)') cryptosoft_init:Algorithm Type 2 not supported (algorithm 20:'hmac(sha512)') cryptosoft_init:Algorithm Type 16 not supported (algorithm 21:'cbc(camellia)') cryptosoft_init:Algorithm Type 4 not supported (algorithm 23:'sha384') cryptosoft_init:Algorithm Type 4 not supported (algorithm 24:'sha512') cryptosoft_init:Algorithm Type 4 not supported (algorithm 25:'ripemd160') root@dm816x-evm:~# /usr/local/ssl/bin/openssl dgst -sha1 -hmac etaonrishdlcupfm cryptotest swcr_newsession() swcr_newsession crypto_alloc_*blkcipher(cbc(des), 0x0) swcr_newsession cbc(des) cipher is async swcr_newsession key:cri->cri_klen=64,(cri->cri_klen + 7)/8=8 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*blkcipher(cbc(des3_ede), 0x0) swcr_newsession cbc(des3_ede) cipher is async swcr_newsession key:cri->cri_klen=192,(cri->cri_klen + 7)/8=24 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x61 0x62 0x63 0x64 0x65 0x66 0x67 0x68 0x69 0x6a 0x6b 0x6c 0x6d 0x6e 0x6f swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*blkcipher(cbc(aes), 0x0) swcr_newsession cbc(aes) cipher is async swcr_newsession key:cri->cri_klen=128,(cri->cri_klen + 7)/8=16 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x61 0x62 0x63 0x64 0x65 0x66 0x67 swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*blkcipher(cbc(aes), 0x0) swcr_newsession cbc(aes) cipher is async swcr_newsession key:cri->cri_klen=192,(cri->cri_klen + 7)/8=24 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x61 0x62 0x63 0x64 0x65 0x66 0x67 0x68 0x69 0x6a 0x6b 0x6c 0x6d 0x6e 0x6f swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*blkcipher(cbc(aes), 0x0) swcr_newsession cbc(aes) cipher is async swcr_newsession key:cri->cri_klen=256,(cri->cri_klen + 7)/8=32 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x39 0x61 0x62 0x63 0x64 0x65 0x66 0x67 0x68 0x69 0x6a 0x6b 0x6c 0x6d 0x6e 0x6f 0x0 0x0 0x0 0x0 0x63 0x72 0x79 0x70 swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*hash(hmac(md5), 0x0) swcr_newsession hmac(md5) hash is async swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*hash(hmac(sha1), 0x0) swcr_newsession hmac(sha1) hash is async swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*hash(md5, 0x0) swcr_newsession md5 hash is async swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*hash(sha1, 0x0) swcr_newsession sha1 hash is async swcr_freesession() swcr_newsession() swcr_newsession crypto_alloc_*hash(sha1, 0x0) swcr_newsession sha1 hash is async swcr_newsession() swcr_newsession crypto_alloc_*hash(sha1, 0x0) swcr_newsession sha1 hash is async swcr_freesession() swcr_freesession() Segmentation fault root@dm816x-evm:~# Before I go any deeper into debugging, has anyone seen similar issues on other ports? Regards, Herman Schuurman |