Re: [PATCHv1 0/3] Enable crypto module on Amlogic GXBB SoC platform
From: Anand Moon
Date: Wed Dec 11 2019 - 05:34:12 EST
Hi Herbert,
On Wed, 11 Dec 2019 at 15:20, Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> wrote:
>
> On Wed, Dec 11, 2019 at 03:07:53PM +0530, Anand Moon wrote:
> >
> > name : ecb(aes)
> > driver : ecb-aes-gxl
> > module : kernel
> > priority : 400
> > refcnt : 1
> > selftest : passed
> > internal : no
> > type : skcipher
> > async : yes
> > blocksize : 16
> > min keysize : 16
> > max keysize : 32
> > ivsize : 0
> > chunksize : 16
> > walksize : 16
> >
> > name : cbc(aes)
> > driver : cbc-aes-gxl
> > module : kernel
> > priority : 400
> > refcnt : 1
> > selftest : passed
> > internal : no
> > type : skcipher
> > async : yes
> > blocksize : 16
> > min keysize : 16
> > max keysize : 32
> > ivsize : 16
> > chunksize : 16
> > walksize : 16
>
> Oh so you did actually get them loaded. You need to run tcrypt with
> mode=500 instead of 200 to test the async ciphers. Does that work?
>
> Thanks,
> --
> Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
> Home Page: http://gondor.apana.org.au/~herbert/
> PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
I get kernel panic, I will try to look into this much closely.
[alarm@alarm ~]$ sudo modprobe tcrypt sec=1 mode=500
[sudo] password for alarm:
[ 754.382673] tcrypt:
[ 754.382673] testing speed of async ecb(aes) (ecb-aes-gxl) encryption
[ 754.385583] tcrypt: test 0 (128 bit key, 16 byte blocks):
[ 754.385774] SError Interrupt on CPU1, code 0xbf000000 -- SError
[ 754.385776] CPU: 1 PID: 121 Comm: da832000.crypto Not tainted
5.5.0-rc1-00012-g6794862a16ef-dirty #3
[ 754.385778] Hardware name: Hardkernel ODROID-C2 (DT)
[ 754.385779] pstate: 60000005 (nZCv daif -PAN -UAO)
[ 754.385781] pc : wait_for_completion_interruptible_timeout+0x20/0x120
[ 754.385782] lr : meson_handle_cipher_request+0x344/0x700
[ 754.385783] sp : ffff800011e9bca0
[ 754.385784] x29: ffff800011e9bca0 x28: 0000000000000040
[ 754.385787] x27: 0000000000000010 x26: 0000000000000000
[ 754.385789] x25: 0000000000000000 x24: 0000000005300080
[ 754.385792] x23: 0000000000000002 x22: ffff00006d08aa00
[ 754.385795] x21: ffff00007f68c4d0 x20: ffff00007f68c4c8
[ 754.385797] x19: 000000000000007d x18: 00000000000000ab
[ 754.385800] x17: 000000000000006c x16: 000000000000001b
[ 754.385802] x15: 000000000000000c x14: 0000000000000010
[ 754.385805] x13: 0000000000000000 x12: 0000000000000000
[ 754.385808] x11: 0000000000000001 x10: ffff8000119d7e80
[ 754.385810] x9 : 0000000000000000 x8 : ffff800011add000
[ 754.385813] x7 : 0000000000000000 x6 : 0000000000000000
[ 754.385815] x5 : 0000000000000000 x4 : 0000000080800010
[ 754.385818] x3 : ffff800011acd000 x2 : 000000006d093002
[ 754.385820] x1 : 000000000000007d x0 : ffff00007f68c4c8
[ 754.385824] Kernel panic - not syncing: Asynchronous SError Interrupt
[ 754.385825] CPU: 1 PID: 121 Comm: da832000.crypto Not tainted
5.5.0-rc1-00012-g6794862a16ef-dirty #3
[ 754.385827] Hardware name: Hardkernel ODROID-C2 (DT)
[ 754.385828] Call trace:
[ 754.385829] dump_backtrace+0x0/0x188
[ 754.385830] show_stack+0x14/0x20
[ 754.385831] dump_stack+0xb4/0xfc
[ 754.385832] panic+0x158/0x320
[ 754.385833] nmi_panic+0x84/0x88
[ 754.385834] arm64_serror_panic+0x74/0x80
[ 754.385835] do_serror+0x80/0x138
[ 754.385836] el1_error+0x84/0x100
[ 754.385838] wait_for_completion_interruptible_timeout+0x20/0x120
[ 754.385839] meson_handle_cipher_request+0x344/0x700
[ 754.385840] crypto_pump_work+0x10c/0x228
[ 754.385841] kthread_worker_fn+0xa8/0x188
[ 754.385842] kthread+0xf0/0x120
[ 754.385843] ret_from_fork+0x10/0x18
[ 754.385862] SMP: stopping secondary CPUs
[ 754.385863] Kernel Offset: disabled
[ 754.385864] CPU features: 0x00002,24002004
[ 754.385865] Memory Limit: none
-Anand