af_alg06 test from crypto test suite in LTP killed with SIGSEGV on B-AWS ARM64 (timeout on B-AWS AMD64)

Bug #1839830 reported by Po-Hsu Lin
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubuntu-kernel-tests
New
Undecided
Unassigned
linux-aws (Ubuntu)
New
Undecided
Unassigned
Bionic
New
Undecided
Unassigned

Bug Description

<<<test_start>>>
tag=af_alg06 stime=1565610613
cmdline="af_alg06"
contacts=""
analysis=exit
<<<test_output>>>
incrementing stop
tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
af_alg06.c:38: INFO: Setting malformed authenc key. May crash buggy kernels.
tst_test.c:1145: BROK: Test killed by SIGSEGV!

Summary:
passed 0
failed 0
skipped 0
warnings 0
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=2 corefile=no
cutime=0 cstime=23
<<<test_end>>>

 [ 901.222168] LTP: starting af_alg06
 [ 901.391439] Unable to handle kernel paging request at virtual address ffff8003fb000000
 [ 901.393919] Mem abort info:
 [ 901.394750] ESR = 0x96000006
 [ 901.395652] Exception class = DABT (current EL), IL = 32 bits
 [ 901.397475] SET = 0, FnV = 0
 [ 901.398379] EA = 0, S1PTW = 0
 [ 901.399304] Data abort info:
 [ 901.400157] ISV = 0, ISS = 0x00000006
 [ 901.401380] CM = 0, WnR = 0
 [ 901.402263] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000f62813a8
 [ 901.404209] [ffff8003fb000000] *pgd=000000043aff6803, *pud=000000043afef803, *pmd=0000000000000000
 [ 901.407126] Internal error: Oops: 96000006 [#2] SMP
 [ 901.408541] Modules linked in: authenc algif_aead algif_skcipher af_alg nls_iso8859_1 sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear aes_ce_blk aes_ce_cipher crc32_ce crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce ena aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
 [ 901.423122] CPU: 0 PID: 6968 Comm: af_alg06 Tainted: G D 4.15.0-1043-aws #45-Ubuntu
 [ 901.426125] Hardware name: Amazon EC2 a1.medium/, BIOS 1.0 11/1/2018
 [ 901.428277] pstate: a0400005 (NzCv daif +PAN -UAO)
 [ 901.429904] pc : sha2_ce_transform+0x30/0x208 [sha2_ce]
 [ 901.431674] lr : sha256_ce_finup+0x3a8/0x450 [sha2_ce]
 [ 901.433396] sp : ffff00000b9f39b0
 [ 901.434538] x29: ffff00000b9f39b0 x28: ffff80003d3f4b00
 [ 901.436341] x27: ffff000008b32000 x26: 0000000000000020
 [ 901.438137] x25: 0000000003ffffff x24: 0000000000000000
 [ 901.439927] x23: ffff8003f22dd60c x22: 000000000000003d
 [ 901.441728] x21: ffff8003f533f500 x20: ffff00000b9f3b00
 [ 901.443519] x19: ffff00000b9f3b80 x18: 0000ffffea7a68b6
 [ 901.445297] x17: 0000000000000000 x16: 0000000000000000
 [ 901.447090] x15: 000000000000000a x14: 0000000000000036
 [ 901.448856] x13: 2e736c656e72656b x12: 2079676775622068
 [ 901.450622] x11: 0000ffffea7a6b80 x10: 0000ffffea7a6b80
 [ 901.452406] x9 : ffffff80ffffffd8 x8 : ffff000000c2ba60
 [ 901.454165] x7 : 7f7fffffff7f7fff x6 : ffff8003f22dd609
 [ 901.455932] x5 : bb67ae856a09e667 x4 : 0000000000000000
 [ 901.457719] x3 : 00008003f1ec7000 x2 : 0000000003dcb758
 [ 901.459505] x1 : ffff8003faffffcc x0 : ffff00000b9f3b80
 [ 901.461323] Process af_alg06 (pid: 6968, stack limit = 0x0000000057fb62f2)
 [ 901.463606] Call trace:
 [ 901.464470] sha2_ce_transform+0x30/0x208 [sha2_ce]
 [ 901.466129] crypto_shash_finup+0x58/0x80
 [ 901.467502] shash_digest_unaligned+0x60/0x78
 [ 901.468968] crypto_shash_digest+0x60/0x90
 [ 901.470374] hmac_setkey+0x198/0x238
 [ 901.471603] crypto_shash_setkey+0x50/0xf0
 [ 901.473014] shash_async_setkey+0x34/0x48
 [ 901.474387] crypto_ahash_setkey+0x48/0xe0
 [ 901.475774] crypto_authenc_setkey+0x7c/0x138 [authenc]
 [ 901.477558] crypto_aead_setkey+0x4c/0xe8
 [ 901.478935] aead_setkey+0x34/0x50 [algif_aead]
 [ 901.480466] alg_setsockopt+0x154/0x1a0 [af_alg]
 [ 901.482047] SyS_setsockopt+0x9c/0x110
 [ 901.483321] el0_svc_naked+0x30/0x34
 [ 901.484558] Code: f2a01844 f2980584 b9400084 b8646804 (4cdf2830)
 [ 901.486628] ---[ end trace abe58e933100bfd7 ]---

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: linux-image-4.15.0-1043-aws 4.15.0-1043.45
ProcVersionSignature: User Name 4.15.0-1043.45-aws 4.15.18
Uname: Linux 4.15.0-1043-aws aarch64
ApportVersion: 2.20.9-0ubuntu7.6
Architecture: arm64
Date: Mon Aug 12 11:52:43 2019
Ec2AMI: ami-0c579621aaac8bade
Ec2AMIManifest: (unknown)
Ec2AvailabilityZone: us-west-2c
Ec2InstanceType: a1.medium
Ec2Kernel: unavailable
Ec2Ramdisk: unavailable
SourcePackage: linux-aws
UpgradeStatus: No upgrade log present (probably fresh install)

Revision history for this message
Po-Hsu Lin (cypressyew) wrote :
tags: added: aws sru-20190722 ubuntu-ltp
Revision history for this message
Po-Hsu Lin (cypressyew) wrote :
Download full text (3.7 KiB)

For AWS AMD64 node, it's failing with timeout, but traces could be found in syslog as well:
 [ 664.377092] LTP: starting af_alg06
 [ 665.992394] BUG: unable to handle kernel paging request at ffff95632d400000
 [ 665.995555] IP: sha256_transform+0x28/0x1b20
 [ 665.997517] PGD a6b1b067 P4D a6b1b067 PUD a6b1f067 PMD 0
 [ 665.999978] Oops: 0000 [#1] SMP PTI
 [ 666.001628] Modules linked in: authenc algif_aead algif_skcipher af_alg ppdev serio_raw parport_pc parport sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd ena
 [ 666.020251] CPU: 1 PID: 7356 Comm: af_alg06 Not tainted 4.15.0-1044-aws #46-Ubuntu
 [ 666.023589] Hardware name: Amazon EC2 r5.large/, BIOS 1.0 10/16/2017
 [ 666.026484] RIP: 0010:sha256_transform+0x28/0x1b20
 [ 666.028699] RSP: 0018:ffffa352c261baa0 EFLAGS: 00010287
 [ 666.031041] RAX: 0000000000000014 RBX: ffff95632d40002c RCX: 0000000000000000
 [ 666.034199] RDX: 0000000004000000 RSI: ffff95632d3fffec RDI: ffffa352c261bca8
 [ 666.037380] RBP: ffffa352c261bbd0 R08: 00000000cdad2d9e R09: ffffa352c261baa0
 [ 666.040501] R10: 00000000a4e7e2df R11: 0000000038c2cb89 R12: ffff95641a0067ec
 [ 666.043615] R13: ffffa352c261bca8 R14: ffff956316a05a48 R15: ffff95631a0067ec
 [ 666.048119] FS: 00007fc74e90e580(0000) GS:ffff95632d100000(0000) knlGS:0000000000000000
 [ 666.054441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [ 666.058388] CR2: ffff95632d400000 CR3: 0000000418d9e005 CR4: 00000000007606e0
 [ 666.062945] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 [ 666.067616] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 [ 666.072201] PKRU: 55555554
 [ 666.074919] Call Trace:
 [ 666.077542] sha256_generic_block_fn+0x36/0x50
 [ 666.080942] crypto_sha256_finup+0xef/0x170
 [ 666.084224] crypto_shash_finup+0x25/0x30
 [ 666.087481] shash_digest_unaligned+0x47/0x60
 [ 666.090858] crypto_shash_digest+0x2e/0x40
 [ 666.094158] hmac_setkey+0x15a/0x210
 [ 666.097217] ? tty_insert_flip_string_fixed_flag+0x86/0xe0
 [ 666.101062] crypto_shash_setkey+0x35/0xc0
 [ 666.104334] ? pty_write+0x71/0x90
 [ 666.107295] shash_async_setkey+0x15/0x20
 [ 666.110556] crypto_ahash_setkey+0x38/0xb0
 [ 666.113808] crypto_authenc_setkey+0x68/0x100 [authenc]
 [ 666.117539] crypto_aead_setkey+0x35/0xc0
 [ 666.120770] aead_setkey+0x15/0x20 [algif_aead]
 [ 666.124228] alg_setsockopt+0x112/0x140 [af_alg]
 [ 666.127700] SyS_setsockopt+0x86/0xf0
 [ 666.130799] do_syscall_64+0x73/0x130
 [ 666.133878] entry_SYSCALL_64_after_hwframe+0x3d/0xa2
 [ 666.137616] RIP: 0033:0x7fc74e422e6a
 [ 666.140662] RSP: 002b:00007ffced8dad88 EFLAGS: 00000207 ORIG_RAX: 0000000000000036
 [ 666.146771] RAX: ffffffffffffffda RBX: 00007fc74e90e500 RCX: 00007fc74e422e6a
 [ 666.151264] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000006
 [ 666.155761] RBP:...

Read more...

summary: af_alg06 test from crypto test suite in LTP killed with SIGSEGV on B-AWS
- ARM64
+ ARM64 (timeout on B-AWS AMD64)
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.