Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp48443pxu; Tue, 1 Dec 2020 05:58:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJwPIAX02hMiOoxsR+tI/dYE/+v4uiW7NvX3kSWhF2GJQPUGSypLKRsjbWV08H0nZZK0aBpw X-Received: by 2002:a17:906:b286:: with SMTP id q6mr3049450ejz.259.1606831083517; Tue, 01 Dec 2020 05:58:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606831083; cv=none; d=google.com; s=arc-20160816; b=cHqIkecLIG8gTqN+uVPzQiejAJLoMMuagXF+NdbUWDjEA9KbaCHUnUKOL0IU/rsRjy BKbWGeq0NYPpiqetjH0fT1xJSUCq8xS6/U5ULhkZ0BrTlKElAlc7lr68Y35LtZFvaBgi 4ZNmWPOtvWIscPzsO8x7wquJdHZ1byIP+QKF+JeMea+0E4crU2P/hov0WLSkKl9jxe9D lcNHd1VI2X7qBBSuDmv3dSfcGbJl0M0KZc86RvGde/jzoaxz4/pG+dl9cwZuTz8jlQi+ tRODg1k61VoFYxAY4SpobNvOXFob2WkT353QeRgN+wU11P8lUrE14ydixmJlFF/JhtLx X1mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=61ZF5C7WOPaSSyFKTA3Jd4EkoVpR2O0GmABB6DAtO/M=; b=JbfUxaGQdSCM4Va1LMwOpgWDqpJlyUfolN5kb2rO9irYgOz/Z7oWM9VpxKCDxouP9N xJ3u+EVeQm1nbqjFOiyg7bb3uF6rhi0hx5030f0imv1Ui8gFZwzJieLIkIQSVKUKBzvU MA8U4LFx2h/OOvAQh9yLiRvXbKvR4BUDXHN1Cbskx7+EPytetUm5wtskM/nsKlf0X/HD UBinXaMFLGdfeMoo0r/DU7I+iXGGun5YDg6ROWkr9Vm6YThCrN8io7w7T/87DWSP+V0i lBXsOqAbjHlRdjrt9hbJU6tvsCkD4JBI9WPk7x+7yuxJjS5LVc46ajs5gbC+78EWZEea 7tXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qPXC0hQO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k15si981158ejk.389.2020.12.01.05.57.31; Tue, 01 Dec 2020 05:58:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qPXC0hQO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391417AbgLANxo (ORCPT + 99 others); Tue, 1 Dec 2020 08:53:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40436 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391452AbgLANxm (ORCPT ); Tue, 1 Dec 2020 08:53:42 -0500 Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 43382C0613CF; Tue, 1 Dec 2020 05:52:56 -0800 (PST) Received: by mail-wr1-x441.google.com with SMTP id i2so2746734wrs.4; Tue, 01 Dec 2020 05:52:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=61ZF5C7WOPaSSyFKTA3Jd4EkoVpR2O0GmABB6DAtO/M=; b=qPXC0hQO8OpdRZI104m8FraSMCwSpn+Et3stR+21jZOV9O3VXrd6HW4YZYKFF3+Ks+ aierhs90V6L+OmvFxDeym42bp7bQTW/q+RefaHc+QA7BBbjrhFrYonYBaR5QpVXOVjyW kjJCIP9TJWGtxpmXssFodLlrYfQy6v2Yfb4DTwUThhf0IRP8S64JlEnO6z+9heefTbHF N3y3NiLQPrsPP94v3GukxSOAasSoxPx8crAxnkcliVQwOpN7rwU3TYnVoH4S3RSWGf19 tFfvN5e7+eiD4uruVlKQ+mMviP2h5S+9MGgkYSLnJ0U71Ct52xWVFl1rsAFtr3tE0uq3 xqXw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=61ZF5C7WOPaSSyFKTA3Jd4EkoVpR2O0GmABB6DAtO/M=; b=M8QvL7h6xv705aiJqr4h2ucEgoPY3SuPlI10nSbF5rBOIzKgzNQkXubPR0y62rdeDj lZ/nmnlBjYnzYLJHX9968Bv9HLJFN9CQWKRdQ55mvR+NdFWfyVrzFsHcRHidSog8QWsV LMq1Ak3yAtUOmRf7wgs5lSaOdA3o8X1ZdNNKGq5hlgToF1RDvOzbIqi++vEv0xsIz0ba 2qk1Xl/osZJ9qpnH1xZhg1Bty3vPjGuBJC4ngyJ8SeFySLdkvD0yoDe11FJVuFS5b5Fi P/C3MBVt20BI/QBnikySdB+sttgadgQtoM66WSKOFW6kZTSN3Cw3rdLd/oBYhk5cAoQd EKMw== X-Gm-Message-State: AOAM531r5fYqclILZzZv5jXrL9253tsLw0mtujylU3cfu5UmMVgHtbP5 RRwz0V0Q8Rb/LMZEy6ip/tbs786ctq4= X-Received: by 2002:adf:f602:: with SMTP id t2mr4138518wrp.40.1606830775033; Tue, 01 Dec 2020 05:52:55 -0800 (PST) Received: from Red ([2a01:cb1d:3d5:a100:264b:feff:fe03:2806]) by smtp.googlemail.com with ESMTPSA id l8sm3567987wro.46.2020.12.01.05.52.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 01 Dec 2020 05:52:54 -0800 (PST) Date: Tue, 1 Dec 2020 14:52:52 +0100 From: Corentin Labbe To: Thomas Gleixner Cc: herbert@gondor.apana.org.au, mripard@kernel.org, wens@csie.org, linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: crypto: sun4i-ss: error with kmap Message-ID: <20201201135252.GA9584@Red> References: <20201201130102.GA23461@Red> <87ft4phcyx.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87ft4phcyx.fsf@nanos.tec.linutronix.de> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Dec 01, 2020 at 02:28:54PM +0100, Thomas Gleixner wrote: > On Tue, Dec 01 2020 at 14:01, Corentin Labbe wrote: > > +[ 213.050152] ------------[ cut here ]------------ > > +[ 213.050207] WARNING: CPU: 0 PID: 18430 at mm/highmem.c:581 kunmap_local_indexed+0x194/0x1d4 > > +[ 213.050214] Modules linked in: sm4_generic authenc vmac xcbc hmac streebog_generic sm3_generic sha3_generic crct10dif_generic crct10dif_common seed rmd320 rmd256 rmd160 rmd128 cts lzo lzo_compress salsa20_generic camellia_generic fcrypt pcbc tgr192 anubis wp512 khazad tea michael_mic arc4 cast6_generic cast5_generic cast_common deflate zlib_deflate sha512_generic cfb ofb serpent_generic lrw twofish_generic twofish_common blowfish_generic blowfish_common md4 > > +[ 213.050410] CPU: 0 PID: 18430 Comm: cryptsetup Not tainted 5.10.0-rc5-next-20201130-00059-gf7ecf0611042-dirty #242 > > +[ 213.050416] Hardware name: Allwinner sun7i (A20) Family > > +[ 213.050448] [] (unwind_backtrace) from [] (show_stack+0x10/0x14) > > +[ 213.050465] [] (show_stack) from [] (dump_stack+0x98/0xac) > > +[ 213.050479] [] (dump_stack) from [] (__warn+0xc0/0xd8) > > +[ 213.050491] [] (__warn) from [] (warn_slowpath_fmt+0x64/0xc0) > > +[ 213.050505] [] (warn_slowpath_fmt) from [] (kunmap_local_indexed+0x194/0x1d4) > > +[ 213.050525] [] (kunmap_local_indexed) from [] (sg_miter_stop+0xb4/0x164) > > +[ 213.050541] [] (sg_miter_stop) from [] (sg_miter_next+0xc/0xe4) > > +[ 213.050560] [] (sg_miter_next) from [] (sun4i_ss_opti_poll+0x278/0x40c) > > +[ 213.050575] [] (sun4i_ss_opti_poll) from [] (sun4i_ss_cipher_poll+0x4f4/0x5e4) > > +[ 213.050590] [] (sun4i_ss_cipher_poll) from [] (crypto_skcipher_encrypt+0x38/0x5c) > > +[ 213.050604] [] (crypto_skcipher_encrypt) from [] (xts_encrypt+0x8c/0xd4) > > +[ 213.050617] [] (xts_encrypt) from [] (crypto_skcipher_encrypt+0x38/0x5c) > > +[ 213.050631] [] (crypto_skcipher_encrypt) from [] (skcipher_recvmsg+0x364/0x43c) > > +[ 213.050646] [] (skcipher_recvmsg) from [] (sock_read_iter+0xa8/0xf8) > > +[ 213.050663] [] (sock_read_iter) from [] (vfs_read+0x2b8/0x2d8) > > +[ 213.050676] [] (vfs_read) from [] (ksys_read+0xb0/0xe4) > > +[ 213.050688] [] (ksys_read) from [] (ret_fast_syscall+0x0/0x58) > > +[ 213.050695] Exception stack(0xc4d13fa8 to 0xc4d13ff0) > > +[ 213.050707] 3fa0: 00000006 b6f084d0 00000006 b47ff000 00010000 00000000 > > +[ 213.050718] 3fc0: 00000006 b6f084d0 00010000 00000003 00000030 beb6e9bc 00000010 beb6e9fc > > +[ 213.050727] 3fe0: b6e3609c beb6e958 b6cc8504 b6cc851c > > +[ 213.050735] ---[ end trace 915906e6b0e8a55d ]--- > > Hmm. No registers there. Can you apply the patch below so we can see the > address? > > Thanks, > > tglx > --- > diff --git a/mm/highmem.c b/mm/highmem.c > index b49364a306b8..240fc6e5bfb4 100644 > --- a/mm/highmem.c > +++ b/mm/highmem.c > @@ -571,8 +571,10 @@ void kunmap_local_indexed(void *vaddr) > * PAGE_OFFSET. Warn for all other addresses which are in > * the user space part of the virtual address space. > */ > - if (!kmap_high_unmap_local(addr)) > + if (!kmap_high_unmap_local(addr)) { > + pr_err("kunmap_local: vaddr %lx\n", (unsigned long) vaddr); > WARN_ON_ONCE(addr < PAGE_OFFSET); > + } > return; > } > The patch made the board too busy logging and fail to boot until the test. Regards