Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965596AbbLPIIy (ORCPT ); Wed, 16 Dec 2015 03:08:54 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:34264 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965544AbbLPIIv (ORCPT ); Wed, 16 Dec 2015 03:08:51 -0500 Subject: Re: [PATCH v2 0/2] Introduce the bulk IV mode for improving the crypto engine efficiency To: Baolin Wang , axboe@kernel.dk, agk@redhat.com, snitzer@redhat.com, dm-devel@redhat.com References: Cc: neilb@suse.com, dan.j.williams@intel.com, martin.petersen@oracle.com, sagig@mellanox.com, kent.overstreet@gmail.com, keith.busch@intel.com, tj@kernel.org, broonie@kernel.org, arnd@arndb.de, linux-block@vger.kernel.org, linux-raid@vger.kernel.org, linux-kernel@vger.kernel.org From: Milan Broz Message-ID: <56711C0F.8030105@gmail.com> Date: Wed, 16 Dec 2015 09:08:47 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 25279 Lines: 402 On 12/16/2015 04:18 AM, Baolin Wang wrote: > From the dm-crypt performance report, we found it shows low efficiency > with crypto engine for some mode (like ecb or xts mode). Because in dm > crypt, it will map the IO data buffer with scatterlist, and send the > scatterlist of one bio to the encryption engine, if send more scatterlists > with bigger size at one time, that helps the engine palys best performance, > which means a high encryption speed. > > But now the dm-crypt only map one segment (always one sector) of one bio > with one scatterlist to the crypto engine at one time. which is more > time-consuming and ineffective for the crypto engine. Especially for some > modes which don't need different IV for each sector, we can map the whole > bio with multiple scatterlists to improve the engine performance. > > But this optimization is not support some ciphers and IV modes which should > do sector by sector and need different IV for each sector. > > Change since v1: > - Introduce one different IV mode. > - Change the conditions for bulk mode. I tried the patchset on 32bit Intel VM and kernel immediately OOPsed (just tried aes-ecb)... Crash log below. Milan [ 40.989759] BUG: unable to handle kernel NULL pointer dereference at (null) [ 40.990736] IP: [] crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.990800] *pde = 00000000 [ 40.990844] Oops: 0000 [#1] PREEMPT SMP [ 40.990961] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 40.991412] CPU: 2 PID: 6 Comm: kworker/u8:0 Not tainted 4.4.0-rc5+ #44 [ 40.991460] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 40.991531] Workqueue: kcryptd kcryptd_crypt [dm_crypt] [ 40.991587] task: f4c04180 ti: f4c06000 task.ti: f4c06000 [ 40.991629] EIP: 0060:[] EFLAGS: 00010246 CPU: 2 [ 40.991672] EIP is at crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.991725] EAX: 00001000 EBX: 00001000 ECX: f73e85c0 EDX: 00000000 [ 40.991772] ESI: 00000000 EDI: 00001000 EBP: f4c07e28 ESP: f4c07de8 [ 40.991819] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 [ 40.991862] CR0: 8005003b CR2: 00000000 CR3: 018c1000 CR4: 001406d0 [ 40.991949] Stack: [ 40.991976] f49967c8 00000000 00000000 00000000 00000000 01000058 00000000 f73e85c0 [ 40.992173] 00000000 f4baf170 00001000 f4ba7290 00000000 f4baf030 f4baf170 f4baf0c0 [ 40.992387] f4c07e60 f8710e8a f4baf170 f4c07e4c f4baf170 f4baf114 f4baf160 f8713fe8 [ 40.992599] Call Trace: [ 40.992647] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 40.992715] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 40.992781] [] process_one_work+0x153/0x420 [ 40.992842] [] ? process_one_work+0x100/0x420 [ 40.992905] [] worker_thread+0x37/0x470 [ 40.992964] [] ? process_one_work+0x420/0x420 [ 40.993026] [] kthread+0x96/0xb0 [ 40.993083] [] ret_from_kernel_thread+0x21/0x38 [ 40.993146] [] ? kthread_worker_fn+0xf0/0xf0 [ 40.993207] Code: c2 01 31 f6 85 db 75 d1 89 55 e0 85 ff 0f 85 41 ff ff ff 8b 55 d8 8d 65 f4 89 d0 5b 5e 5f 5d c3 90 8d 74 26 00 8b 55 c8 8b 4d dc <8b> 02 89 4d dc 89 45 c8 c1 e8 1a c1 e0 04 8b 80 80 a2 0b c2 83 [ 40.995405] EIP: [] crypt_sg_entry+0x186/0x270 [dm_crypt] SS:ESP 0068:f4c07de8 [ 40.995604] CR2: 0000000000000000 [ 40.995703] ---[ end trace d78b89aae913dc1f ]--- [ 40.995825] ------------[ cut here ]------------ [ 40.995930] WARNING: CPU: 2 PID: 6 at kernel/softirq.c:150 __local_bh_enable_ip+0x88/0xd0() [ 40.996118] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul [ 40.996352] BUG: unable to handle kernel NULL pointer dereference at (null) [ 40.996354] IP: [] crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.996357] *pde = 00000000 [ 40.996359] Oops: 0000 [#2] PREEMPT SMP [ 40.996361] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 40.996368] CPU: 3 PID: 53 Comm: kworker/u8:1 Tainted: G D 4.4.0-rc5+ #44 [ 40.996369] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 40.996371] Workqueue: kcryptd kcryptd_crypt [dm_crypt] [ 40.996372] task: f489c0c0 ti: f489e000 task.ti: f489e000 [ 40.996373] EIP: 0060:[] EFLAGS: 00010246 CPU: 3 [ 40.996375] EIP is at crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.996375] EAX: 00001000 EBX: 00001000 ECX: f71e3a20 EDX: 00000000 [ 40.996376] ESI: 00000000 EDI: 00010000 EBP: f489fe28 ESP: f489fde8 [ 40.996377] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 [ 40.996377] CR0: 8005003b CR2: 00000000 CR3: 33c26000 CR4: 001406d0 [ 40.996410] Stack: [ 40.996411] f49967c8 00000000 00000000 00000000 00000000 01000058 00000000 f71e3a20 [ 40.996413] 00000000 f4bed370 00001000 f4b2e7c0 00000000 f4bed230 f4bed370 f4bed2c0 [ 40.996415] f489fe60 f8710e8a f4bed370 f489fe4c f4bed370 f4bed314 f4bed360 f8713fe8 [ 40.996418] Call Trace: [ 40.996421] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 40.996423] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 40.996426] [] process_one_work+0x153/0x420 [ 40.996428] [] ? process_one_work+0x100/0x420 [ 40.996430] [] worker_thread+0x37/0x470 [ 40.996432] [] ? process_one_work+0x420/0x420 [ 40.996433] [] kthread+0x96/0xb0 [ 40.996436] [] ret_from_kernel_thread+0x21/0x38 [ 40.996438] [] ? kthread_worker_fn+0xf0/0xf0 [ 40.996439] Code: c2 01 31 f6 85 db 75 d1 89 55 e0 85 ff 0f 85 41 ff ff ff 8b 55 d8 8d 65 f4 89 d0 5b 5e 5f 5d c3 90 8d 74 26 00 8b 55 c8 8b 4d dc <8b> 02 89 4d dc 89 45 c8 c1 e8 1a c1 e0 04 8b 80 80 a2 0b c2 83 [ 40.996453] EIP: [] crypt_sg_entry+0x186/0x270 [dm_crypt] SS:ESP 0068:f489fde8 [ 40.996455] CR2: 0000000000000000 [ 40.996456] ---[ end trace d78b89aae913dc20 ]--- [ 40.996459] ------------[ cut here ]------------ [ 40.996461] WARNING: CPU: 3 PID: 53 at kernel/softirq.c:150 __local_bh_enable_ip+0x88/0xd0() [ 40.996461] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 40.996465] CPU: 3 PID: 53 Comm: kworker/u8:1 Tainted: G D 4.4.0-rc5+ #44 [ 40.996466] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 40.996469] 00000000 00000000 f489fc64 c12a98f2 00000000 f489fc7c c1042757 c10455a8 [ 40.996471] 00000201 c10bf91e f489c0c0 f489fc8c c10427ff 00000009 00000000 f489fc9c [ 40.996473] c10455a8 c16d07e0 c16d0660 f489fca8 c14e49ca f489c0c0 f489fcbc c10bf91e [ 40.996475] Call Trace: [ 40.996477] [] dump_stack+0x4b/0x79 [ 40.996479] [] warn_slowpath_common+0x67/0xa0 [ 40.996480] [] ? __local_bh_enable_ip+0x88/0xd0 [ 40.996482] [] ? cgroup_exit+0x4e/0xc0 [ 40.996484] [] warn_slowpath_null+0xf/0x20 [ 40.996486] [] __local_bh_enable_ip+0x88/0xd0 [ 40.996488] [] _raw_spin_unlock_bh+0x2a/0x30 [ 40.996490] [] cgroup_exit+0x4e/0xc0 [ 40.996491] [] do_exit+0x224/0x920 [ 40.996494] [] ? kmsg_dump+0x105/0x180 [ 40.996496] [] oops_end+0x61/0x90 [ 40.996498] [] no_context+0xf5/0x210 [ 40.996500] [] __bad_area_nosemaphore+0x9c/0x150 [ 40.996501] [] bad_area_nosemaphore+0xd/0x10 [ 40.996502] [] __do_page_fault+0x6f/0x4a0 [ 40.996504] [] ? try_to_wake_up+0x182/0x340 [ 40.996505] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996507] [] do_page_fault+0xb/0x10 [ 40.996508] [] error_code+0x5f/0x64 [ 40.996509] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996510] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.996511] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 40.996512] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 40.996514] [] process_one_work+0x153/0x420 [ 40.996515] [] ? process_one_work+0x100/0x420 [ 40.996516] [] worker_thread+0x37/0x470 [ 40.996517] [] ? process_one_work+0x420/0x420 [ 40.996518] [] kthread+0x96/0xb0 [ 40.996519] [] ret_from_kernel_thread+0x21/0x38 [ 40.996520] [] ? kthread_worker_fn+0xf0/0xf0 [ 40.996521] ---[ end trace d78b89aae913dc21 ]--- [ 40.996547] BUG: unable to handle kernel paging request at ffffffc8 [ 40.996548] IP: [] kthread_data+0xa/0x10 [ 40.996551] *pde = 018c3067 *pte = 00000000 [ 40.996552] Oops: 0000 [#3] PREEMPT SMP [ 40.996554] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 40.996560] CPU: 3 PID: 53 Comm: kworker/u8:1 Tainted: G D W 4.4.0-rc5+ #44 [ 40.996560] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 40.996564] task: f489c0c0 ti: f489e000 task.ti: f489e000 [ 40.996565] EIP: 0060:[] EFLAGS: 00010002 CPU: 3 [ 40.996566] EIP is at kthread_data+0xa/0x10 [ 40.996567] EAX: 00000000 EBX: 00000003 ECX: 18a6743d EDX: 00000003 [ 40.996567] ESI: f489c0c0 EDI: c18b6e00 EBP: f489fc80 ESP: f489fc78 [ 40.996568] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 [ 40.996568] CR0: 8005003b CR2: 00000014 CR3: 33c26000 CR4: 001406d0 [ 40.996594] Stack: [ 40.996595] c1057e5b f489c478 f489fcb0 c14e0083 00000003 f5fb6e10 f5fb6e00 c129283a [ 40.996597] 00000000 f5fb6e00 f489c0c0 f48a0000 f489f9b8 f489fce0 f489fcbc c14e0612 [ 40.996598] f489c0c0 f489fcf4 c1043a2e f489c3cc f57e8040 00000001 00000002 f489c3cc [ 40.996600] Call Trace: [ 40.996602] [] ? wq_worker_sleeping+0xb/0x90 [ 40.996603] [] __schedule+0x6a3/0xad0 [ 40.996605] [] ? put_io_context_active+0xaa/0xd0 [ 40.996607] [] schedule+0x32/0x80 [ 40.996609] [] do_exit+0x5de/0x920 [ 40.996610] [] oops_end+0x61/0x90 [ 40.996612] [] no_context+0xf5/0x210 [ 40.996614] [] __bad_area_nosemaphore+0x9c/0x150 [ 40.996616] [] bad_area_nosemaphore+0xd/0x10 [ 40.996617] [] __do_page_fault+0x6f/0x4a0 [ 40.996619] [] ? try_to_wake_up+0x182/0x340 [ 40.996621] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996622] [] do_page_fault+0xb/0x10 [ 40.996623] [] error_code+0x5f/0x64 [ 40.996625] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996627] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.996629] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 40.996630] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 40.996631] [] process_one_work+0x153/0x420 [ 40.996632] [] ? process_one_work+0x100/0x420 [ 40.996633] [] worker_thread+0x37/0x470 [ 40.996634] [] ? process_one_work+0x420/0x420 [ 40.996635] [] kthread+0x96/0xb0 [ 40.996636] [] ret_from_kernel_thread+0x21/0x38 [ 40.996637] [] ? kthread_worker_fn+0xf0/0xf0 [ 40.996638] Code: 00 3b 5f 34 74 0f 89 f8 e8 04 83 48 00 83 c4 78 5b 5e 5f 5d c3 8b 4f 28 eb bf 8d b4 26 00 00 00 00 55 8b 80 64 03 00 00 89 e5 5d <8b> 40 c8 c3 66 90 55 b9 04 00 00 00 89 e5 83 ec 04 8b 90 64 03 [ 40.996652] EIP: [] kthread_data+0xa/0x10 SS:ESP 0068:f489fc78 [ 40.996654] CR2: 00000000ffffffc8 [ 40.996655] ---[ end trace d78b89aae913dc22 ]--- [ 40.996655] Fixing recursive fault but reboot is needed! [ 40.996656] BUG: scheduling while atomic: kworker/u8:1/53/0x00000003 [ 40.996657] INFO: lockdep is turned off. [ 40.996657] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 40.996660] irq event stamp: 11388 [ 40.996661] hardirqs last enabled at (11387): [] _raw_spin_unlock_irq+0x22/0x50 [ 40.996662] hardirqs last disabled at (11388): [] _raw_spin_lock_irq+0xd/0x60 [ 40.996664] softirqs last enabled at (11314): [] wb_wakeup_delayed+0x4c/0x60 [ 40.996666] softirqs last disabled at (11310): [] wb_wakeup_delayed+0x26/0x60 [ 40.996667] Preemption disabled at:[] oops_end+0x61/0x90 [ 40.996668] [ 40.996669] CPU: 3 PID: 53 Comm: kworker/u8:1 Tainted: G D W 4.4.0-rc5+ #44 [ 40.996670] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 40.996674] 00000000 00000000 f489fb00 c12a98f2 f489c0c0 f489fb0c c106059f f48a0000 [ 40.996677] f489fb3c c14e0168 00000003 00000009 f5fb6e00 f489fb40 00000000 f5fb6e00 [ 40.996680] f489c0c0 f48a0000 00000009 f489c0c0 f489fb48 c14e0612 f489c0c0 f489fb84 [ 40.996683] Call Trace: [ 40.996685] [] dump_stack+0x4b/0x79 [ 40.996687] [] __schedule_bug+0x5f/0xb0 [ 40.996688] [] __schedule+0x788/0xad0 [ 40.996690] [] schedule+0x32/0x80 [ 40.996691] [] do_exit+0x72b/0x920 [ 40.996692] [] ? kmsg_dump+0x105/0x180 [ 40.996693] [] oops_end+0x61/0x90 [ 40.996694] [] no_context+0xf5/0x210 [ 40.996695] [] __bad_area_nosemaphore+0x9c/0x150 [ 40.996697] [] ? update_curr+0x9a/0x130 [ 40.996698] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996699] [] bad_area_nosemaphore+0xd/0x10 [ 40.996700] [] __do_page_fault+0x6f/0x4a0 [ 40.996701] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996702] [] do_page_fault+0xb/0x10 [ 40.996703] [] error_code+0x5f/0x64 [ 40.996704] [] ? ttwu_stat+0x5b/0x200 [ 40.996705] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996706] [] ? kthread_data+0xa/0x10 [ 40.996707] [] ? wq_worker_sleeping+0xb/0x90 [ 40.996708] [] __schedule+0x6a3/0xad0 [ 40.996709] [] ? put_io_context_active+0xaa/0xd0 [ 40.996710] [] schedule+0x32/0x80 [ 40.996711] [] do_exit+0x5de/0x920 [ 40.996712] [] oops_end+0x61/0x90 [ 40.996713] [] no_context+0xf5/0x210 [ 40.996715] [] __bad_area_nosemaphore+0x9c/0x150 [ 40.996716] [] bad_area_nosemaphore+0xd/0x10 [ 40.996717] [] __do_page_fault+0x6f/0x4a0 [ 40.996718] [] ? try_to_wake_up+0x182/0x340 [ 40.996719] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996720] [] do_page_fault+0xb/0x10 [ 40.996721] [] error_code+0x5f/0x64 [ 40.996722] [] ? __do_page_fault+0x4a0/0x4a0 [ 40.996723] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 40.996724] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 40.996726] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 40.996727] [] process_one_work+0x153/0x420 [ 40.996728] [] ? process_one_work+0x100/0x420 [ 40.996729] [] worker_thread+0x37/0x470 [ 40.996730] [] ? process_one_work+0x420/0x420 [ 40.996731] [] kthread+0x96/0xb0 [ 40.996733] [] ret_from_kernel_thread+0x21/0x38 [ 40.996735] [] ? kthread_worker_fn+0xf0/0xf0 [ 41.023333] crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 41.023559] CPU: 2 PID: 6 Comm: kworker/u8:0 Tainted: G D W 4.4.0-rc5+ #44 [ 41.023649] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 41.023757] 00000000 00000000 f4c07c64 c12a98f2 00000000 f4c07c7c c1042757 c10455a8 [ 41.023963] 00000201 c10bf91e f4c04180 f4c07c8c c10427ff 00000009 00000000 f4c07c9c [ 41.024168] c10455a8 c16d07e0 c16d0660 f4c07ca8 c14e49ca f4c04180 f4c07cbc c10bf91e [ 41.024373] Call Trace: [ 41.024421] [] dump_stack+0x4b/0x79 [ 41.024477] [] warn_slowpath_common+0x67/0xa0 [ 41.024537] [] ? __local_bh_enable_ip+0x88/0xd0 [ 41.024599] [] ? cgroup_exit+0x4e/0xc0 [ 41.024655] [] warn_slowpath_null+0xf/0x20 [ 41.024714] [] __local_bh_enable_ip+0x88/0xd0 [ 41.024775] [] _raw_spin_unlock_bh+0x2a/0x30 [ 41.024834] [] cgroup_exit+0x4e/0xc0 [ 41.024890] [] do_exit+0x224/0x920 [ 41.024945] [] ? kmsg_dump+0x105/0x180 [ 41.025002] [] oops_end+0x61/0x90 [ 41.025057] [] no_context+0xf5/0x210 [ 41.025113] [] __bad_area_nosemaphore+0x9c/0x150 [ 41.025176] [] ? __module_text_address+0xb/0x60 [ 41.025236] [] bad_area_nosemaphore+0xd/0x10 [ 41.025295] [] __do_page_fault+0x6f/0x4a0 [ 41.025353] [] ? print_context_stack+0x4e/0xb0 [ 41.025412] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.025471] [] do_page_fault+0xb/0x10 [ 41.025527] [] error_code+0x5f/0x64 [ 41.025582] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.025642] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 41.025705] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 41.025768] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 41.025831] [] process_one_work+0x153/0x420 [ 41.026756] [] ? process_one_work+0x100/0x420 [ 41.026816] [] worker_thread+0x37/0x470 [ 41.026873] [] ? process_one_work+0x420/0x420 [ 41.026932] [] kthread+0x96/0xb0 [ 41.026987] [] ret_from_kernel_thread+0x21/0x38 [ 41.027047] [] ? kthread_worker_fn+0xf0/0xf0 [ 41.027106] ---[ end trace d78b89aae913dc23 ]--- [ 41.027229] BUG: unable to handle kernel paging request at ffffffc8 [ 41.027349] IP: [] kthread_data+0xa/0x10 [ 41.027455] *pde = 018c3067 *pte = 00000000 [ 41.027568] Oops: 0000 [#4] PREEMPT SMP [ 41.027755] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 41.029586] CPU: 2 PID: 6 Comm: kworker/u8:0 Tainted: G D W 4.4.0-rc5+ #44 [ 41.029826] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 41.030943] task: f4c04180 ti: f4c06000 task.ti: f4c06000 [ 41.031137] EIP: 0060:[] EFLAGS: 00010002 CPU: 2 [ 41.031341] EIP is at kthread_data+0xa/0x10 [ 41.031536] EAX: 00000000 EBX: 00000002 ECX: 18c2e78b EDX: 00000002 [ 41.031687] ESI: f4c04180 EDI: c18b6e00 EBP: f4c07c80 ESP: f4c07c78 [ 41.031802] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 [ 41.031955] CR0: 8005003b CR2: 00000014 CR3: 018c1000 CR4: 001406d0 [ 41.032207] Stack: [ 41.032410] c1057e5b f4c04538 f4c07cb0 c14e0083 00000002 f5e65e10 f5e65e00 c129283a [ 41.032772] 00000000 f5e65e00 f4c04180 f4c08000 f4c079b8 f4c07ce0 f4c07cbc c14e0612 [ 41.035807] f4c04180 f4c07cf4 c1043a2e f4c0448c f57e8040 00000001 00000002 f4c0448c [ 41.037146] Call Trace: [ 41.037353] [] ? wq_worker_sleeping+0xb/0x90 [ 41.037556] [] __schedule+0x6a3/0xad0 [ 41.037759] [] ? put_io_context_active+0xaa/0xd0 [ 41.038744] [] schedule+0x32/0x80 [ 41.038883] [] do_exit+0x5de/0x920 [ 41.039067] [] oops_end+0x61/0x90 [ 41.039263] [] no_context+0xf5/0x210 [ 41.039455] [] __bad_area_nosemaphore+0x9c/0x150 [ 41.039655] [] ? __module_text_address+0xb/0x60 [ 41.039850] [] bad_area_nosemaphore+0xd/0x10 [ 41.040025] [] __do_page_fault+0x6f/0x4a0 [ 41.040222] [] ? print_context_stack+0x4e/0xb0 [ 41.040373] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.040543] [] do_page_fault+0xb/0x10 [ 41.040765] [] error_code+0x5f/0x64 [ 41.040984] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.041210] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 41.041435] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 41.041650] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 41.042746] [] process_one_work+0x153/0x420 [ 41.042928] [] ? process_one_work+0x100/0x420 [ 41.043123] [] worker_thread+0x37/0x470 [ 41.043337] [] ? process_one_work+0x420/0x420 [ 41.043450] [] kthread+0x96/0xb0 [ 41.043529] [] ret_from_kernel_thread+0x21/0x38 [ 41.043653] [] ? kthread_worker_fn+0xf0/0xf0 [ 41.043831] Code: 00 3b 5f 34 74 0f 89 f8 e8 04 83 48 00 83 c4 78 5b 5e 5f 5d c3 8b 4f 28 eb bf 8d b4 26 00 00 00 00 55 8b 80 64 03 00 00 89 e5 5d <8b> 40 c8 c3 66 90 55 b9 04 00 00 00 89 e5 83 ec 04 8b 90 64 03 [ 41.055486] EIP: [] kthread_data+0xa/0x10 SS:ESP 0068:f4c07c78 [ 41.055692] CR2: 00000000ffffffc8 [ 41.055803] ---[ end trace d78b89aae913dc24 ]--- [ 41.055917] Fixing recursive fault but reboot is needed! [ 41.056038] BUG: scheduling while atomic: kworker/u8:0/6/0x00000003 [ 41.056162] INFO: lockdep is turned off. [ 41.056353] Modules linked in: dm_crypt loop rpcsec_gss_krb5 dm_mod crc32_pclmul crc32c_intel ata_piix aesni_intel aes_i586 lrw ablk_helper cryptd [ 41.056783] irq event stamp: 17002 [ 41.056833] hardirqs last enabled at (17001): [] __raw_spin_lock_init+0x16/0x50 [ 41.056944] hardirqs last disabled at (17002): [] error_code+0x5b/0x64 [ 41.057103] softirqs last enabled at (16962): [] cgroup_post_fork+0x68/0xd0 [ 41.057335] softirqs last disabled at (16960): [] cgroup_post_fork+0x22/0xd0 [ 41.057522] Preemption disabled at:[] oops_end+0x61/0x90 [ 41.057719] [ 41.057819] CPU: 2 PID: 6 Comm: kworker/u8:0 Tainted: G D W 4.4.0-rc5+ #44 [ 41.058887] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 [ 41.059066] 00000000 00000000 f4c07b00 c12a98f2 f4c04180 f4c07b0c c106059f f4c08000 [ 41.059774] f4c07b3c c14e0168 00000002 00000009 f5e65e00 f4c07b40 00000000 f5e65e00 [ 41.060519] f4c04180 f4c08000 00000009 f4c04180 f4c07b48 c14e0612 f4c04180 f4c07b84 [ 41.060728] Call Trace: [ 41.060776] [] dump_stack+0x4b/0x79 [ 41.060833] [] __schedule_bug+0x5f/0xb0 [ 41.060891] [] __schedule+0x788/0xad0 [ 41.060979] [] schedule+0x32/0x80 [ 41.061067] [] do_exit+0x72b/0x920 [ 41.061148] [] ? kmsg_dump+0x105/0x180 [ 41.061250] [] oops_end+0x61/0x90 [ 41.061306] [] no_context+0xf5/0x210 [ 41.061362] [] __bad_area_nosemaphore+0x9c/0x150 [ 41.061425] [] ? update_curr+0x9a/0x130 [ 41.061482] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.061542] [] bad_area_nosemaphore+0xd/0x10 [ 41.061602] [] __do_page_fault+0x6f/0x4a0 [ 41.061661] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.061720] [] do_page_fault+0xb/0x10 [ 41.061789] [] error_code+0x5f/0x64 [ 41.062866] [] ? ttwu_stat+0x5b/0x200 [ 41.063053] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.063247] [] ? kthread_data+0xa/0x10 [ 41.063434] [] ? wq_worker_sleeping+0xb/0x90 [ 41.063625] [] __schedule+0x6a3/0xad0 [ 41.063818] [] ? put_io_context_active+0xaa/0xd0 [ 41.064043] [] schedule+0x32/0x80 [ 41.064762] [] do_exit+0x5de/0x920 [ 41.064944] [] oops_end+0x61/0x90 [ 41.065133] [] no_context+0xf5/0x210 [ 41.065313] [] __bad_area_nosemaphore+0x9c/0x150 [ 41.065505] [] ? __module_text_address+0xb/0x60 [ 41.065692] [] bad_area_nosemaphore+0xd/0x10 [ 41.066731] [] __do_page_fault+0x6f/0x4a0 [ 41.066848] [] ? print_context_stack+0x4e/0xb0 [ 41.067012] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.067231] [] do_page_fault+0xb/0x10 [ 41.067500] [] error_code+0x5f/0x64 [ 41.067689] [] ? __do_page_fault+0x4a0/0x4a0 [ 41.067881] [] ? crypt_sg_entry+0x186/0x270 [dm_crypt] [ 41.068069] [] crypt_convert_io+0x7a/0x360 [dm_crypt] [ 41.068259] [] kcryptd_crypt+0x395/0x3da [dm_crypt] [ 41.068417] [] process_one_work+0x153/0x420 [ 41.068534] [] ? process_one_work+0x100/0x420 [ 41.068709] [] worker_thread+0x37/0x470 [ 41.068917] [] ? process_one_work+0x420/0x420 [ 41.069118] [] kthread+0x96/0xb0 [ 41.069307] [] ret_from_kernel_thread+0x21/0x38 [ 41.069434] [] ? kthread_worker_fn+0xf0/0xf0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/