Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp29553pxu; Tue, 1 Dec 2020 05:30:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJxs9KfF2jbfM03ZkkoiWd7LRUjj5+GcDS4EJpXvpqywomdKBnNLHqNf9WJzMoF5AK18VD6a X-Received: by 2002:a17:906:a181:: with SMTP id s1mr3026779ejy.335.1606829412675; Tue, 01 Dec 2020 05:30:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606829412; cv=none; d=google.com; s=arc-20160816; b=x7ak8AIKm9PD+V60YGDsUXjSc+GBnkQTsQsVxKsTGNyN0o+I3jMkdZlLuPI3O9JoTa fpn9wHPQPzjveZV4f0kH1iyxxKeAB70qhmKWbQlYkD6xZvM1yNbszwtOBOh134GI3gpw rPSn4j2fL/pYhP9cE2BIpF71wMXtOXf7LQHiI+vzGeYM0N0dyUMg+7rteomK/72zGght vSRTs+nWVUlve2Cu8ZMgI7sgNXESPydCmmFHyeypaev8FxZZEdqWOM3MyiNPRFx52SaC mTKtEsDvPEdLOanwXUGirRPlHMVcoTqe23TvoVmtNwbg2n0s8cYxN5SI67ZRBTTWfD9h nJ7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:dkim-signature:dkim-signature:from; bh=1YJRW59Yy59fUBwrYfLxtsF+fz7y5/bsfKwLhEMMwLw=; b=l2X5ghlYCgi6phnqMA+ErmvRL7dCR8LcC9n7oddgSl9h0sPz4Wn/kaS9KgXH6C1dD3 9bPnHfFfiF+z3JJHIoWdQiwmtqOBJUw0qcIhjwnPSuJh3xpWrPpe0oylFbOOF0g06r5o FoYifmGbPvBx1w2i4CSsQzsJxx1BG/4f9qLmoPe4l+Wei53Bw2Wx1Zl4Wqf1OB2XEdjX Iz3ui2n5NC+DbHp7D0ndtbsYx19CCWa79UWqZRlfNTcUjtSeC9K+ksWXAq0bqAysoxVj GtIjNJXZDa9nAsZ/Q0SnQ24KLBQg1WDj4GZt1OipS6Cdz+V5DRX0/5ZsSQuroYYogemn AhDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=QkkZneQ8; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=gn3xJ3yi; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a7si1166966edy.150.2020.12.01.05.29.41; Tue, 01 Dec 2020 05:30:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=QkkZneQ8; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=gn3xJ3yi; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391127AbgLAN3h (ORCPT + 99 others); Tue, 1 Dec 2020 08:29:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391125AbgLAN3h (ORCPT ); Tue, 1 Dec 2020 08:29:37 -0500 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 58919C0613CF; Tue, 1 Dec 2020 05:28:56 -0800 (PST) From: Thomas Gleixner DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1606829334; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=1YJRW59Yy59fUBwrYfLxtsF+fz7y5/bsfKwLhEMMwLw=; b=QkkZneQ8xwGX3u1ADdvLDl+jTbrRiew2RoZhQfnP2RV/XPHCyLM8IJ5uHBUgtGBK9TnYx5 4FaQ5XFpkNhDyG5N0g9d6ydepGNxMm5LiCQN0i9wWLBBTlFZfjVDbVm2XiqLj4sbn7soPl yWtKy92JfyaCsxW6ttUQChMf5IPEVOj4NMuiQw2CNMNtjLG9oeKbngCwB/ZMLuFRqqHsuc hjhfXHSICJHvHEf+YVlJ7Cxi84xCcuDd9QfmAaOXHVTF3XOHEIHjGMJY3X4x1MJiYs7mpd tk+8dB6WRxyJ2JG5DgAa03+cr3KVC5pIfGr0X+iZ6lUXOCImgYa7zC3aG8Ncag== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1606829334; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=1YJRW59Yy59fUBwrYfLxtsF+fz7y5/bsfKwLhEMMwLw=; b=gn3xJ3yiG4kyabDU1Ak6NGZPA+InzSnHjXocPnttQulDD8/gasYGRPjBl6VaUQtbSpZGkq iSAPphxGbQTt/mAA== To: Corentin Labbe , herbert@gondor.apana.org.au, mripard@kernel.org, wens@csie.org Cc: linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: crypto: sun4i-ss: error with kmap In-Reply-To: <20201201130102.GA23461@Red> References: <20201201130102.GA23461@Red> Date: Tue, 01 Dec 2020 14:28:54 +0100 Message-ID: <87ft4phcyx.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Dec 01 2020 at 14:01, Corentin Labbe wrote: > +[ 213.050152] ------------[ cut here ]------------ > +[ 213.050207] WARNING: CPU: 0 PID: 18430 at mm/highmem.c:581 kunmap_local_indexed+0x194/0x1d4 > +[ 213.050214] Modules linked in: sm4_generic authenc vmac xcbc hmac streebog_generic sm3_generic sha3_generic crct10dif_generic crct10dif_common seed rmd320 rmd256 rmd160 rmd128 cts lzo lzo_compress salsa20_generic camellia_generic fcrypt pcbc tgr192 anubis wp512 khazad tea michael_mic arc4 cast6_generic cast5_generic cast_common deflate zlib_deflate sha512_generic cfb ofb serpent_generic lrw twofish_generic twofish_common blowfish_generic blowfish_common md4 > +[ 213.050410] CPU: 0 PID: 18430 Comm: cryptsetup Not tainted 5.10.0-rc5-next-20201130-00059-gf7ecf0611042-dirty #242 > +[ 213.050416] Hardware name: Allwinner sun7i (A20) Family > +[ 213.050448] [] (unwind_backtrace) from [] (show_stack+0x10/0x14) > +[ 213.050465] [] (show_stack) from [] (dump_stack+0x98/0xac) > +[ 213.050479] [] (dump_stack) from [] (__warn+0xc0/0xd8) > +[ 213.050491] [] (__warn) from [] (warn_slowpath_fmt+0x64/0xc0) > +[ 213.050505] [] (warn_slowpath_fmt) from [] (kunmap_local_indexed+0x194/0x1d4) > +[ 213.050525] [] (kunmap_local_indexed) from [] (sg_miter_stop+0xb4/0x164) > +[ 213.050541] [] (sg_miter_stop) from [] (sg_miter_next+0xc/0xe4) > +[ 213.050560] [] (sg_miter_next) from [] (sun4i_ss_opti_poll+0x278/0x40c) > +[ 213.050575] [] (sun4i_ss_opti_poll) from [] (sun4i_ss_cipher_poll+0x4f4/0x5e4) > +[ 213.050590] [] (sun4i_ss_cipher_poll) from [] (crypto_skcipher_encrypt+0x38/0x5c) > +[ 213.050604] [] (crypto_skcipher_encrypt) from [] (xts_encrypt+0x8c/0xd4) > +[ 213.050617] [] (xts_encrypt) from [] (crypto_skcipher_encrypt+0x38/0x5c) > +[ 213.050631] [] (crypto_skcipher_encrypt) from [] (skcipher_recvmsg+0x364/0x43c) > +[ 213.050646] [] (skcipher_recvmsg) from [] (sock_read_iter+0xa8/0xf8) > +[ 213.050663] [] (sock_read_iter) from [] (vfs_read+0x2b8/0x2d8) > +[ 213.050676] [] (vfs_read) from [] (ksys_read+0xb0/0xe4) > +[ 213.050688] [] (ksys_read) from [] (ret_fast_syscall+0x0/0x58) > +[ 213.050695] Exception stack(0xc4d13fa8 to 0xc4d13ff0) > +[ 213.050707] 3fa0: 00000006 b6f084d0 00000006 b47ff000 00010000 00000000 > +[ 213.050718] 3fc0: 00000006 b6f084d0 00010000 00000003 00000030 beb6e9bc 00000010 beb6e9fc > +[ 213.050727] 3fe0: b6e3609c beb6e958 b6cc8504 b6cc851c > +[ 213.050735] ---[ end trace 915906e6b0e8a55d ]--- Hmm. No registers there. Can you apply the patch below so we can see the address? Thanks, tglx --- diff --git a/mm/highmem.c b/mm/highmem.c index b49364a306b8..240fc6e5bfb4 100644 --- a/mm/highmem.c +++ b/mm/highmem.c @@ -571,8 +571,10 @@ void kunmap_local_indexed(void *vaddr) * PAGE_OFFSET. Warn for all other addresses which are in * the user space part of the virtual address space. */ - if (!kmap_high_unmap_local(addr)) + if (!kmap_high_unmap_local(addr)) { + pr_err("kunmap_local: vaddr %lx\n", (unsigned long) vaddr); WARN_ON_ONCE(addr < PAGE_OFFSET); + } return; }