Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4757600ybl; Tue, 4 Feb 2020 01:16:53 -0800 (PST) X-Google-Smtp-Source: APXvYqz+KrWUTEPx+w7XpNTtnIoKw3uKSIe/aM738mZOBG87/uknWJ9YLRM+W+AhDl5HsSBI/IJO X-Received: by 2002:aca:5f87:: with SMTP id t129mr2876963oib.36.1580807813484; Tue, 04 Feb 2020 01:16:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580807813; cv=none; d=google.com; s=arc-20160816; b=JoXmvCAdhfOQNC/VRoxJBH3XKSVoYtHcJ4UMAcF8WP+k1hbdkkHc6gd7agKz6KE8NX Xogds4QgyZS/lyCPom3OrnP6+MzDm/KURT9TUcWwTgsMmFRpzUgDc7Uq+c50Y3PT2n0S UfbrM6xhLvZn0fxtZCyY+qHGNiohQcnZLVOIXAAmZTfRyzpgC+qKa9oXvyJVgFPQByRI c7Pabd50UEh5qCqtRIpMvQUwlrqHsnBuSpNT2bm+sERJ7gtRbT3WD2+6w1QZiu8NY5gX gYEoEnXeyAJ2XsAjSaFXsiJrEQyKoZKk1vVE/1ocKPrV4gBrlmGJ490YKlVVhd4aSLNv tEgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=XcERBKLD0pNCQ+9nUGC0SljdPFd4QEpox0vzFppf7MM=; b=jsAtubyPruJ6krOetuEDEqwMdyTjnnBMj7tWOkfsZtZl/Son8Q+S/Ib27pvPGuKYE4 eJJARezzXyEO3bKSIgUUqWPe3JhUexwi7jRFTgwcEM6Xha5ROAXGYYizji2glqh02Cfp wl5/cE6r1+b3NiXdEHyeA67OLlW7Tg869kIzdEyJEFLirL6PXyN7+10UlRp6Vpq0n6fH EFQXw6Evi6Y9TbUrSBblxmgA+CXV61WJOA9wphB3a+ZwHmm8t+ROdb9op5qXwN8Simp3 3qC/956gyZXuv0tvlL3XrmR7PTqFMyPeU7VqBpQs/vR1I0glE/bxESzdMvVrQJ/sCT41 3pUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ldm+UPeJ; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w29si13023913oth.313.2020.02.04.01.16.41; Tue, 04 Feb 2020 01:16:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ldm+UPeJ; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726189AbgBDJPd (ORCPT + 99 others); Tue, 4 Feb 2020 04:15:33 -0500 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:31282 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726230AbgBDJPd (ORCPT ); Tue, 4 Feb 2020 04:15:33 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1580807731; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=XcERBKLD0pNCQ+9nUGC0SljdPFd4QEpox0vzFppf7MM=; b=Ldm+UPeJ5uBo/gBwtEcDoiujTlbR3He5AyAvMM+uDXvdrZM3TSDY8rChlIMCFpwDI4NmPi HGwgi+z+awCOY6c7E+mFGBs8dcHPIk8M+zuFZEDxJkf/GeJn6nmLFE2FKxProB38R3z+E3 4qXVT4KDAP7UugxJa8GNCRi1z5LUci8= Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-103-gHa3WTSXPbWYXkB6UROxiw-1; Tue, 04 Feb 2020 04:15:30 -0500 X-MC-Unique: gHa3WTSXPbWYXkB6UROxiw-1 Received: by mail-qt1-f200.google.com with SMTP id c8so11891349qte.22 for ; Tue, 04 Feb 2020 01:15:29 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=XcERBKLD0pNCQ+9nUGC0SljdPFd4QEpox0vzFppf7MM=; b=dCTrQy491PP2EqUucrADC+LVk+ocd/ItpCXmKt3/uOWEb0MkATuj3dxNj1VtEu3M8s yt7crvtIXqgnGetpEB0tCUG1Rda+lH1uHxd3V8kacif2KwQbtC2WFTFFHFwX/vbCM9bC VYM8QlAJ1LSiDxUbwxZAtOkbG4h0aLy5JB00muSGFnEvQHdjcR/ItOmE1xfAVmo7pu/+ /gDbv1/VCi3gkwxf+TzEO82QPne6EoeCko1YiAhnjirZtrfFT1KHzdn9RGt4bh4K4TeT OKqpK1y5CeKxOBiF6w7SPmG7SI3j5QCfdcJGdjfYgQuZO6EqrGnyoGuEwBAr2c15Bl/Z nAeQ== X-Gm-Message-State: APjAAAUfGsDtTEO9U30zDElP4QnDFNGGY79j0xm+wsdbJ/PyREZXGBov iGggpE4d8dCC+dvFUsi9FRSC7CVJkDrgByB7lmUGBhnGHE6jmofE33uy4l+AMxuo3PVpKXP4T8h dESoix5cXsVcaPz7P2HTaYGL/ X-Received: by 2002:a37:9ce:: with SMTP id 197mr27871948qkj.194.1580807728517; Tue, 04 Feb 2020 01:15:28 -0800 (PST) X-Received: by 2002:a37:9ce:: with SMTP id 197mr27871932qkj.194.1580807728267; Tue, 04 Feb 2020 01:15:28 -0800 (PST) Received: from redhat.com (bzq-109-64-11-187.red.bezeqint.net. [109.64.11.187]) by smtp.gmail.com with ESMTPSA id t7sm10703873qkm.136.2020.02.04.01.15.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Feb 2020 01:15:27 -0800 (PST) Date: Tue, 4 Feb 2020 04:15:22 -0500 From: "Michael S. Tsirkin" To: LABBE Corentin Cc: arei.gonglei@huawei.com, jasowang@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, virtualization@lists.linux-foundation.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [CRASH] crypto: virtio: crash when modprobing tcrypt on 5.5-rc7 / next-20200122 Message-ID: <20200204041419-mutt-send-email-mst@kernel.org> References: <20200123101000.GB24255@Red> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200123101000.GB24255@Red> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Jan 23, 2020 at 11:10:00AM +0100, LABBE Corentin wrote: > Hello > > When modprobing tcrypt on qemu 4.1.0 I get a kernel panic on 5.5-rc7 and next-20200122 > qemu is started by: > /usr/bin/qemu-system-x86_64 -cpu host -enable-kvm -nographic -net nic,model=e1000,macaddr=52:54:00:12:34:58 -net tap -m 512 -monitor none -object cryptodev-backend-builtin,id=cryptodev0 -device virtio-crypto-pci,id=crypto0,cryptodev=cryptodev0 -append 'console=ttyS0 root=/dev/ram0 ip=dhcp' -kernel /var/lib/lava/dispatcher/tmp/41332/deployimages-td18675m/kernel/bzImage -initrd /var/lib/lava/dispatcher/tmp/41332/deployimages-td18675m/ramdisk/rootfs.cpio.gz -drive format=qcow2,file=/var/lib/lava/dispatcher/tmp/41332/apply-overlay-guest-icy4k1ol/lava-guest.qcow2,media=disk,if=ide,id=lavatest > > [ 112.771925] general protection fault: 0000 [#1] SMP PTI > [ 112.772686] CPU: 0 PID: 126 Comm: virtio0-engine Not tainted 5.5.0-rc7+ #1 > [ 112.773576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190711_202441-buildvm-armv7-10.arm.fedoraproject.org-2.fc31 04/01/2014 > [ 112.775319] RIP: 0010:sg_next+0x0/0x20 > [ 112.775821] Code: cc cc cc cc cc cc cc cc cc cc c7 47 10 00 00 00 00 89 57 0c 48 89 37 89 4f 08 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 07 02 75 17 48 8b 57 20 48 8d 47 20 48 89 d1 48 83 e1 fc 83 e2 > [ 112.778330] RSP: 0018:ffffa92440237d90 EFLAGS: 00010006 > [ 112.779071] RAX: fefefefe00000000 RBX: 000000000000000a RCX: fefefefe00000000 > [ 112.780081] RDX: 0000000000000001 RSI: ffff9b19da1a2180 RDI: fefefefe00000000 > [ 112.781081] RBP: ffff9b19da1a2198 R08: ffff9b19dfb24ee8 R09: 0000000000000a20 > [ 112.782079] R10: ffff9b19da125010 R11: 0000000000000000 R12: ffff9b19da1a21b8 > [ 112.783079] R13: 0000000000000003 R14: ffff9b19da1a2180 R15: 0000000000000004 > [ 112.784077] FS: 0000000000000000(0000) GS:ffff9b19de400000(0000) knlGS:0000000000000000 > [ 112.785202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 112.786030] CR2: 00007f18a157b050 CR3: 000000001040a004 CR4: 0000000000060ef0 > [ 112.787034] Call Trace: > [ 112.787393] virtqueue_add_sgs+0x4c/0x90 > [ 112.787998] virtio_crypto_skcipher_crypt_req+0x310/0x3e0 > [ 112.788817] crypto_pump_work+0x10c/0x240 > [ 112.789420] ? __kthread_init_worker+0x50/0x50 > [ 112.790082] kthread_worker_fn+0x89/0x180 > [ 112.790690] kthread+0x10e/0x130 > [ 112.791182] ? kthread_park+0x80/0x80 > [ 112.791736] ret_from_fork+0x35/0x40 > [ 112.792282] Modules linked in: cts lzo salsa20_generic camellia_x86_64 camellia_generic fcrypt pcbc tgr192 anubis wp512 khazad tea michael_mic arc4 cast6_generic cast5_generic cast_common deflate sha512_ssse3 sha512_generic cfb ofb serpent_sse2_x86_64 serpent_generic lrw twofish_x86_64_3way twofish_x86_64 crypto_simd cryptd glue_helper twofish_generic twofish_common blowfish_x86_64 blowfish_generic blowfish_common md4 tcrypt(+) > [ 112.797652] ---[ end trace 4a8142d4a08c2518 ]--- > [ 112.798320] RIP: 0010:sg_next+0x0/0x20 > [ 112.798865] Code: cc cc cc cc cc cc cc cc cc cc c7 47 10 00 00 00 00 89 57 0c 48 89 37 89 4f 08 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 07 02 75 17 48 8b 57 20 48 8d 47 20 48 89 d1 48 83 e1 fc 83 e2 > [ 112.801452] RSP: 0018:ffffa92440237d90 EFLAGS: 00010006 > [ 112.802189] RAX: fefefefe00000000 RBX: 000000000000000a RCX: fefefefe00000000 > [ 112.803190] RDX: 0000000000000001 RSI: ffff9b19da1a2180 RDI: fefefefe00000000 > [ 112.804192] RBP: ffff9b19da1a2198 R08: ffff9b19dfb24ee8 R09: 0000000000000a20 > [ 112.805201] R10: ffff9b19da125010 R11: 0000000000000000 R12: ffff9b19da1a21b8 > [ 112.806195] R13: 0000000000000003 R14: ffff9b19da1a2180 R15: 0000000000000004 > [ 112.807222] FS: 0000000000000000(0000) GS:ffff9b19de400000(0000) knlGS:0000000000000000 > [ 112.808352] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 112.809169] CR2: 00007f18a157b050 CR3: 000000001040a004 CR4: 0000000000060ef0 > > I have tested also 5.4.14 > and I got random freeze with: > qemu-system-x86_64: virtio: zero sized buffers are not allowed > > Regards Cc: Gonglei -- MST