Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp361431ybh; Mon, 9 Mar 2020 23:43:26 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvtV5mMQrygmMcnkMpz2N8BzI6muA3fpfMgAlyw6A2nTvEnES2d1lVxuEEViJsQhZ02oEwd X-Received: by 2002:a05:6830:204c:: with SMTP id f12mr15730217otp.356.1583822606162; Mon, 09 Mar 2020 23:43:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583822606; cv=none; d=google.com; s=arc-20160816; b=xJLqWyhU9JV5Ouu4l5Rr5oZqT7O8Zpctf6R7joJAjeQOrmxC5Q2ldR71pufgLZZYDz +yjt0020ay3cTnwpErVdme989tcCHCG++1WdeNW7Dl+zuawne/eOrMXPY1RvWn/YCiD7 vkVKpOGAz3NoniOH1tcBZNI6fybkbKDmfO2sn5eleeys8xd+0Unpq+8Tujj8eCNcj7CB U7FE5nhYP5uscmRgi+K8ra54FoG9Mr4rbSQevrfWvOdMqDosVYIaCJIgRCQEUIfXaCX5 H9bM1/1KSdrArKK2P2kT6plpfPWjwtl+HeDhoJ9hAKkeb/x66/RM/vkNz+jtDlwpUJnI kGag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:cc:to:dkim-signature; bh=KdhPUKNkn+wXV/8UcPe/26DyVPDnaRCA6MEREqQ5/OM=; b=i6gIKCUZtU0eCMYSDywRoXuAWGrWbcMt+Bftk+pWR5NXF/960mVX5h1xIAOE3Za6f/ uwRjMoa53BESDTzT3BF1EGp0B3XGUTM8eJqfjpCKB++gypq0ayD8H6eNtTd5EEo1kgP6 uKFM5XuLj/hVkfCt0w2vOTnwyww9/HlzSmnDDKxNAFqO9s2uOkN/iX4rXbj0t31UsZnk GFlcGbUjmPU4HGHHJ9oS9gTnAj6a5c4QWo5NVoM0sCiutLDCAqzq07Zju3uegxECG/47 PAzaZlXw6P5OD75pGTPPCGi84ClW+X5Qs+h5N8yvWDZZgdaZZDcuGAc1i1go3dgVg/vj aILg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LshjIQdh; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e25si6642674oth.38.2020.03.09.23.43.03; Mon, 09 Mar 2020 23:43:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LshjIQdh; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726195AbgCJGm5 (ORCPT + 99 others); Tue, 10 Mar 2020 02:42:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:45280 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726100AbgCJGm5 (ORCPT ); Tue, 10 Mar 2020 02:42:57 -0400 Received: from [10.44.0.22] (unknown [103.48.210.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B68D124655; Tue, 10 Mar 2020 06:42:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583822576; bh=Dj8K3rSNJUIPQtArbE89vczJwFwz5TIsSyMTjCIOMdE=; h=To:Cc:From:Subject:Date:From; b=LshjIQdhIUJsa/4A6BTdXxvn2pDkMD9Rkh0kzyjOiaHpJ76lKYxPTQzyB1eE6A2c2 qZs9OU6CUSzVwEoBPwWFU81/XVsQMOL2gPINtYISJJQCBIWygkbQ2mC3V1QzWNotQE mPsix1fDBEr9CMPau6fhrzhU+wrBf2PPERkAjuo8= To: Andrey Smirnov Cc: linux-crypto@vger.kernel.org, Iuliana Prodan From: Greg Ungerer Subject: Re: [PATCH] crypto: caam - select DMA address size at runtime Message-ID: Date: Tue, 10 Mar 2020 16:42:52 +1000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Andrey, I am tracking down a caam driver problem, where it is dumping on startup on a Layerscape 1046 based hardware platform. The dump typically looks something like this: ------------[ cut here ]------------ kernel BUG at drivers/crypto/caam/jr.c:218! Internal error: Oops - BUG: 0 [#1] SMP Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.5.0-ac0 #1 Hardware name: Digi AnywhereUSB-8 (DT) pstate: 40000005 (nZcv daif -PAN -UAO) pc : caam_jr_dequeue+0x3f8/0x420 lr : tasklet_action_common.isra.17+0x144/0x180 sp : ffffffc010003df0 x29: ffffffc010003df0 x28: 0000000000000001 x27: 0000000000000000 x26: 0000000000000000 x25: ffffff8020aeba80 x24: 0000000000000000 x23: 0000000000000000 x22: ffffffc010ab4e51 x21: 0000000000000001 x20: ffffffc010ab4000 x19: ffffff8020a2ec10 x18: 0000000000000004 x17: 0000000000000001 x16: 6800f1f100000000 x15: ffffffc010de5000 x14: 0000000000000000 x13: ffffffc010de5000 x12: ffffffc010de5000 x11: 0000000000000000 x10: ffffff8073018080 x9 : 0000000000000028 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffffc010a11140 x5 : ffffffc06b070000 x4 : 0000000000000008 x3 : ffffff8073018080 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: caam_jr_dequeue+0x3f8/0x420 tasklet_action_common.isra.17+0x144/0x180 tasklet_action+0x24/0x30 _stext+0x114/0x228 irq_exit+0x64/0x70 __handle_domain_irq+0x64/0xb8 gic_handle_irq+0x50/0xa0 el1_irq+0xb8/0x140 arch_cpu_idle+0x10/0x18 do_idle+0xf0/0x118 cpu_startup_entry+0x24/0x60 rest_init+0xb0/0xbc arch_call_rest_init+0xc/0x14 start_kernel+0x3d0/0x3fc Code: d3607c21 2a020002 aa010041 17ffff4d (d4210000) ---[ end trace ce2c4c37d2c89a99 ]--- Git bisecting this lead me to commit a1cf573ee95d ("crypto: caam - select DMA address size at runtime") as the culprit. I came across commit by Iuliana, 7278fa25aa0e ("crypto: caam - do not reset pointer size from MCFGR register"). However that doesn't fix this dumping problem for me (it does seem to occur less often though). [NOTE: dump above generated with this change applied]. I initially hit this dump on a linux-5.4, and it also occurs on linux-5.5 for me. Any thoughts? Regards Greg