Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Tue, May 26, 2015 at 09:57:51AM +0200, Stephan Mueller wrote: > > Ok. Would you look into that one or shall I do that? I'll reenable it immediately after the patch to convert it to the new interface is merged. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Dienstag, 26. Mai 2015, 15:36:05 schrieb Herbert Xu: Hi Herbert, > >In order to allow this to be done I'm going to disable the AEAD >user-space interface in 4.1 so that we have time to fix it properly >for 4.2. Ok. Would you look into that one or shall I do that? Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Tue, May 26, 2015 at 08:44:29AM +0200, Stephan Mueller wrote: > > Confirmed. I see no more issues on the AF_ALG side. OK it works but there is a more serious issue. In particular, the user-space interface only provides spaces for the AD in the source and not in the destination. That means if we need to modify the AD (e.g., to rearrange headers for IPsec) then we'd have to copy it. So what I'd like to do is to make the recvmsg also provide space for the AD. That way we can always copy the AD into that space and modify it if necessary. In order to allow this to be done I'm going to disable the AEAD user-space interface in 4.1 so that we have time to fix it properly for 4.2. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Dienstag, 26. Mai 2015, 14:24:33 schrieb Herbert Xu: Hi Herbert, > On Mon, May 25, 2015 at 07:53:41PM +0800, Herbert Xu wrote: > > On Mon, May 25, 2015 at 01:50:55PM +0200, Stephan Mueller wrote: > > > When you have my code local, simply execute libkcapi/test/kcapi -y twice > > > or > > > three times. That triggered the crash. > > > > Aha that's what I was missing. I'll look into the crash. > > OK I forgot to initialise the SG list. This patch fixes it for me. Confirmed. I see no more issues on the AF_ALG side. -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Mon, May 25, 2015 at 07:53:41PM +0800, Herbert Xu wrote: > On Mon, May 25, 2015 at 01:50:55PM +0200, Stephan Mueller wrote: > > > > When you have my code local, simply execute libkcapi/test/kcapi -y twice or > > three times. That triggered the crash. > > Aha that's what I was missing. I'll look into the crash. OK I forgot to initialise the SG list. This patch fixes it for me. diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c index 1d08483..35556a6 100644 --- a/crypto/algif_aead.c +++ b/crypto/algif_aead.c @@ -454,6 +454,7 @@ static int aead_recvmsg(struct socket *sock, struct msghdr *msg, size_t ignored, if (usedpages < outlen) goto unlock; + sg_init_table(dstbuf, ALG_MAX_PAGES + 1); sg_mark_end(sgl->sg + sgl->cur); assoclen = ctx->aead_assoclen; /* -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Mon, May 25, 2015 at 01:50:55PM +0200, Stephan Mueller wrote: > > When you have my code local, simply execute libkcapi/test/kcapi -y twice or > three times. That triggered the crash. Aha that's what I was missing. I'll look into the crash. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Montag, 25. Mai 2015, 18:20:21 schrieb Herbert Xu: Hi Herbert, > On Sun, May 24, 2015 at 12:52:02PM +0200, Stephan Mueller wrote: > > [ 29.653113] BUG: unable to handle kernel NULL pointer dereference at > > 000c > > Weird. I tried running your test but it appears to pass. The only > failures were the nonsense strings and everything else says pased. To simply verify that all passes is to check for the return code: the return code tells you the number of failures --- the value of 0 indicates that all pass. And I see a simple test problem: I added a debug "return" that I forgot to remove in the test.sh. Thus, the large test is not executed with test.sh. When you have my code local, simply execute libkcapi/test/kcapi -y twice or three times. That triggered the crash. > > It certainly didn't crash for me. > > Considering that I just killed cryptoff in my local tree, it is > entirely possible that the patches that you are running are no > longer the same as mine. > > So let me merge the cryptoff patches and then I'll repost the > algif_aead patch and ask you to retest. > > Thanks, -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Sun, May 24, 2015 at 12:52:02PM +0200, Stephan Mueller wrote: > > [ 29.653113] BUG: unable to handle kernel NULL pointer dereference at > 000c Weird. I tried running your test but it appears to pass. The only failures were the nonsense strings and everything else says pased. It certainly didn't crash for me. Considering that I just killed cryptoff in my local tree, it is entirely possible that the patches that you are running are no longer the same as mine. So let me merge the cryptoff patches and then I'll repost the algif_aead patch and ask you to retest. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Sonntag, 24. Mai 2015, 11:34:20 schrieb Herbert Xu: Hi Herbert, > On Sat, May 23, 2015 at 08:04:19PM +0200, Stephan Mueller wrote: > > Am Freitag, 22. Mai 2015, 16:31:04 schrieb Herbert Xu: > > > > Hi Herbert, > > > > > This patch makes use of the new AEAD interface which uses a single > > > SG list instead of separate lists for the AD and plain text. > > > > After applying your additional patch, the "normal" AEAD operation works. > > > > But with long messages (16 filled pages), I get the following. To test, > > simply use [1], cd libkcapi/test, compile and execute ./kcapi -y > > Thanks for testing! > > Does this patch help? Yes and no. Executing the test with 16 pages once passes. Executing it again (same test, same vectors) causes: [ 29.653113] BUG: unable to handle kernel NULL pointer dereference at 000c [ 29.653118] IP: [] scatterwalk_ffwd+0x28/0xd0 [ 29.653123] PGD 7b775067 PUD 7b699067 PMD 0 [ 29.653125] Oops: [#1] SMP [ 29.653128] Modules linked in: crypto_user ccm algif_aead af_alg nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_mangle iptable_security iptable_raw crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel aes_x86_64 glue_helper ablk_helper virtio_balloon microcode joydev pcspkr serio_raw i2c_piix4 acpi_cpufreq virtio_net virtio_blk qxl drm_kms_helper ttm drm virtio_pci virtio_ring virtio [ 29.653151] CPU: 1 PID: 1759 Comm: kcapi Not tainted 4.0.0+ #220 [ 29.653153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.7.5-20140709_153950- 04/01/2014 [ 29.653154] task: 88007b798880 ti: 88007a434000 task.ti: 88007a434000 [ 29.653156] RIP: 0010:[] [] scatterwalk_ffwd+0x28/0xd0 [ 29.653158] RSP: 0018:88007a437a98 EFLAGS: 00010202 [ 29.653160] RAX: RBX: 6fe0 RCX: ea0001eef580 [ 29.653161] RDX: 1000 RSI: 88007a437b38 RDI: 88007a437c18 [ 29.653162] RBP: 88007a437aa8 R08: R09: 88007a437cf8 [ 29.653163] R10: R11: R12: 88007b1fed90 [ 29.653164] R13: 88007c0d7ac0 R14: 88007b1fed50 R15: 88007b1fc000 [ 29.653165] FS: 7fb3d7ace700() GS:88007fd0() knlGS: [ 29.653167] CS: 0010 DS: ES: CR0: 80050033 [ 29.653168] CR2: 000c CR3: 7b779000 CR4: 000407e0 [ 29.653171] Stack: [ 29.653172] 88007b1fecf0 a02a0380 88007a437ad8 812b7b40 [ 29.653175] 88007b1fecb0 88007a437cf8 8800798bf400 [ 29.653177] 88007a437ae8 812b7c0d 88007a437d88 a029a246 [ 29.653179] Call Trace: [ 29.653182] [] ? crypto_ccm_decrypt+0x350/0x350 [ccm] [ 29.653185] [] old_crypt+0x50/0xe0 [ 29.653187] [] old_encrypt+0x1d/0x20 [ 29.653189] [] aead_recvmsg+0x6f6/0x860 [algif_aead] [ 29.653192] [] ? __alloc_pages_nodemask+0x1a2/0x9d0 [ 29.653195] [] ? _raw_spin_unlock_bh+0x1a/0x20 [ 29.653197] [] ? aead_sendmsg+0x429/0x4c0 [algif_aead] [ 29.653201] [] sock_recvmsg+0x38/0x50 [ 29.653203] [] sock_read_iter+0x88/0xd0 [ 29.653205] [] __vfs_read+0x90/0xc0 [ 29.653207] [] vfs_read+0x8a/0x140 [ 29.653209] [] SyS_read+0x46/0xb0 [ 29.653210] [] system_call_fastpath+0x12/0x71 [ 29.653211] Code: 0f 1f 00 66 66 66 66 90 55 85 d2 48 89 f0 48 89 e5 41 54 53 89 d3 74 28 8b 56 0c 49 89 fc 39 d3 73 10 eb 27 0f 1f 80 00 00 00 00 <8b> 50 0c 39 da 77 19 29 d3 48 89 c7 e8 87 a9 05 00 85 db 75 eb [ 29.653233] RIP [] scatterwalk_ffwd+0x28/0xd0 [ 29.653235] RSP [ 29.653236] CR2: 000c [ 29.653238] ---[ end trace b579ecce490b2e88 ]--- -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Sat, May 23, 2015 at 08:04:19PM +0200, Stephan Mueller wrote: > Am Freitag, 22. Mai 2015, 16:31:04 schrieb Herbert Xu: > > Hi Herbert, > > > This patch makes use of the new AEAD interface which uses a single > > SG list instead of separate lists for the AD and plain text. > > After applying your additional patch, the "normal" AEAD operation works. > > But with long messages (16 filled pages), I get the following. To test, > simply > use [1], cd libkcapi/test, compile and execute ./kcapi -y Thanks for testing! Does this patch help? diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c index a483a6f..1d08483 100644 --- a/crypto/algif_aead.c +++ b/crypto/algif_aead.c @@ -494,11 +494,11 @@ static int aead_recvmsg(struct socket *sock, struct msghdr *msg, size_t ignored, else if (outlen) /* AD size is non-zero */ scatterwalk_crypto_chain( - dst, ctx->rsgl[0].sg, + dst + i - 1, ctx->rsgl[0].sg, sg_page(ctx->rsgl[0].sg) == sg_page(dst + i - 1) && ctx->rsgl[0].sg[0].offset == dst[i - 1].offset + dst[i - 1].length, - i + 1); + 2); else /* AD only */ sg_mark_end(dst + i); Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Samstag, 23. Mai 2015, 05:58:18 schrieb Herbert Xu: Hi Herbert, > On Fri, May 22, 2015 at 11:04:39PM +0200, Stephan Mueller wrote: > > Note, gcm(aes) looks good. Only rfc4106(gcm(aes)) causes the crash. > > Actually it looks like the culprit hasn't been merged yet so I'll > just respin the series. > > Anyway, this patch should fix your crash: That fixes the rfc4106(gcm(aes)) issue. Thanks. -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Freitag, 22. Mai 2015, 16:31:04 schrieb Herbert Xu: Hi Herbert, > This patch makes use of the new AEAD interface which uses a single > SG list instead of separate lists for the AD and plain text. After applying your additional patch, the "normal" AEAD operation works. But with long messages (16 filled pages), I get the following. To test, simply use [1], cd libkcapi/test, compile and execute ./kcapi -y [ 59.441841] BUG: unable to handle kernel NULL pointer dereference at 000c [ 59.441853] IP: [] scatterwalk_ffwd+0x28/0xd0 [ 59.441866] PGD 78ad6067 PUD 799f5067 PMD 0 [ 59.441874] Oops: [#1] SMP [ 59.441880] Modules linked in: ansi_cprng drbg algif_rng ccm gcm algif_aead algif_skcipher sha512_ssse3 sha512_generic mcryptd sha1_ssse3 sha1_generic crypto_user des3_ede_x86_64 des_generic cmac algif_hash af_alg nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_mangle iptable_security iptable_raw crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel aes_x86_64 glue_helper ablk_helper microcode joydev pcspkr serio_raw virtio_balloon i2c_piix4 acpi_cpufreq virtio_net qxl virtio_blk drm_kms_helper [ 59.441958] ttm drm virtio_pci virtio_ring virtio [ 59.441970] CPU: 1 PID: 2338 Comm: kcapi Not tainted 4.0.0+ #220 [ 59.441975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.7.5-20140709_153950- 04/01/2014 [ 59.441995] task: 88007aa1e600 ti: 880035998000 task.ti: 880035998000 [ 59.441999] RIP: 0010:[] [] scatterwalk_ffwd+0x28/0xd0 [ 59.442007] RSP: 0018:88003599ba98 EFLAGS: 00010202 [ 59.442007] RAX: RBX: 6fe0 RCX: ea0001eaa500 [ 59.442007] RDX: 1000 RSI: 88003599bb38 RDI: 88003599bc18 [ 59.442007] RBP: 88003599baa8 R08: 88003599bcf8 R09: [ 59.442007] R10: R11: 1000 R12: 88007b802d90 [ 59.442007] R13: 88007b3f3c40 R14: 88007b802d50 R15: 88007b80 [ 59.442007] FS: 7f6cf9da6700() GS:88007fd0() knlGS: [ 59.442007] CS: 0010 DS: ES: CR0: 80050033 [ 59.442007] CR2: 000c CR3: 799a6000 CR4: 000407e0 [ 59.442007] Stack: [ 59.442007] 88007b802cf0 a02f6380 88003599bad8 812b7b40 [ 59.442007] 88007b802cb0 88007b88 88007aa04000 [ 59.442007] 88003599bae8 812b7c0d 88003599bd88 a02e5252 [ 59.442007] Call Trace: [ 59.442007] [] ? crypto_ccm_decrypt+0x350/0x350 [ccm] [ 59.442007] [] old_crypt+0x50/0xe0 [ 59.442007] [] old_encrypt+0x1d/0x20 [ 59.442007] [] aead_recvmsg+0x702/0x862 [algif_aead] [ 59.442007] [] ? __alloc_pages_nodemask+0x1a2/0x9d0 [ 59.442007] [] ? _raw_spin_unlock_bh+0x1a/0x20 [ 59.442007] [] ? aead_sendmsg+0x429/0x4c0 [algif_aead] [ 59.442007] [] sock_recvmsg+0x38/0x50 [ 59.442007] [] sock_read_iter+0x88/0xd0 [ 59.442007] [] __vfs_read+0x90/0xc0 [ 59.442007] [] vfs_read+0x8a/0x140 [ 59.442007] [] SyS_read+0x46/0xb0 [ 59.442007] [] system_call_fastpath+0x12/0x71 [ 59.442007] Code: 0f 1f 00 66 66 66 66 90 55 85 d2 48 89 f0 48 89 e5 41 54 53 89 d3 74 28 8b 56 0c 49 89 fc 39 d3 73 10 eb 27 0f 1f 80 00 00 00 00 <8b> 50 0c 39 da 77 19 29 d3 48 89 c7 e8 87 a9 05 00 85 db 75 eb [ 59.442007] RIP [] scatterwalk_ffwd+0x28/0xd0 [ 59.442007] RSP [ 59.442007] CR2: 000c [ 59.442368] ---[ end trace 09389ca31f370515 ]--- -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
On Fri, May 22, 2015 at 11:04:39PM +0200, Stephan Mueller wrote: > > Note, gcm(aes) looks good. Only rfc4106(gcm(aes)) causes the crash. Actually it looks like the culprit hasn't been merged yet so I'll just respin the series. Anyway, this patch should fix your crash: diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c index b3dded4..b15d797 100644 --- a/crypto/ablkcipher.c +++ b/crypto/ablkcipher.c @@ -586,6 +586,13 @@ static int crypto_givcipher_default(struct crypto_alg *alg, u32 type, u32 mask) if (!tmpl) goto kill_larval; + if (tmpl->create) { + err = tmpl->create(tmpl, tb); + if (err) + goto put_tmpl; + goto ok; + } + inst = tmpl->alloc(tb); err = PTR_ERR(inst); if (IS_ERR(inst)) @@ -597,6 +604,7 @@ static int crypto_givcipher_default(struct crypto_alg *alg, u32 type, u32 mask) goto put_tmpl; } +ok: /* Redo the lookup to use the instance we just registered. */ err = -EAGAIN; diff --git a/crypto/aead.c b/crypto/aead.c index 8b26613..070e4b9 100644 --- a/crypto/aead.c +++ b/crypto/aead.c @@ -570,6 +570,13 @@ static int crypto_nivaead_default(struct crypto_alg *alg, u32 type, u32 mask) if (!tmpl) goto kill_larval; + if (tmpl->create) { + err = tmpl->create(tmpl, tb); + if (err) + goto put_tmpl; + goto ok; + } + inst = tmpl->alloc(tb); err = PTR_ERR(inst); if (IS_ERR(inst)) @@ -581,6 +588,7 @@ static int crypto_nivaead_default(struct crypto_alg *alg, u32 type, u32 mask) goto put_tmpl; } +ok: /* Redo the lookup to use the instance we just registered. */ err = -EAGAIN; -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Freitag, 22. Mai 2015, 22:59:34 schrieb Stephan Mueller: Hi Stephan, > Am Freitag, 22. Mai 2015, 16:31:04 schrieb Herbert Xu: > > Hi Herbert, > > > This patch makes use of the new AEAD interface which uses a single > > SG list instead of separate lists for the AD and plain text. > > Using an up-to date tree with the full set of patches of this patch set, I > get the following oops. > > It can easily be reproduced by using [1]: go to libkcapi/test/ and compile > with make. Then execute ./test.sh > > [1] http://www.chronox.de/libkcapi.html Note, gcm(aes) looks good. Only rfc4106(gcm(aes)) causes the crash. -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [v2 PATCH 13/13] crypto: algif_aead - Switch to new AEAD interface
Am Freitag, 22. Mai 2015, 16:31:04 schrieb Herbert Xu: Hi Herbert, > This patch makes use of the new AEAD interface which uses a single > SG list instead of separate lists for the AD and plain text. Using an up-to date tree with the full set of patches of this patch set, I get the following oops. It can easily be reproduced by using [1]: go to libkcapi/test/ and compile with make. Then execute ./test.sh [1] http://www.chronox.de/libkcapi.html [ 22.680910] BUG: unable to handle kernel NULL pointer dereference at (null) [ 22.680915] IP: [< (null)>] (null) [ 22.680917] PGD 3c62e067 PUD 3b28e067 PMD 0 [ 22.680919] Oops: 0010 [#1] SMP [ 22.680921] Modules linked in: seqiv ccm gcm crypto_null algif_aead algif_skcipher sha512_ssse3 sha512_generic mcryptd sha1_ssse3 sha1_generic crypto_user des3_ede_x86_64 des_generic algif_hash af_alg nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_mangle iptable_security iptable_raw crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel aes_x86_64 glue_helper ablk_helper joydev microcode virtio_console serio_raw virtio_balloon pcspkr i2c_piix4 acpi_cpufreq qxl drm_kms_helper ttm drm virtio_net [ 22.680948] virtio_blk virtio_pci virtio_ring virtio [ 22.680952] CPU: 1 PID: 1889 Comm: kcapi Not tainted 4.0.0+ #122 [ 22.680954] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 22.680955] task: 88003c08cc80 ti: 88003b30 task.ti: 88003b30 [ 22.680956] RIP: 0010:[<>] [< (null)>] (null) [ 22.680958] RSP: 0018:88003b303ce0 EFLAGS: 00010282 [ 22.680959] RAX: a02f5080 RBX: a0138b20 RCX: 0001 [ 22.680960] RDX: 0001 RSI: a02f5368 RDI: 88003b303cf8 [ 22.680961] RBP: 88003b303d88 R08: R09: eaecbd00 [ 22.680962] R10: 810676b4 R11: 88003c275240 R12: 88003b1ff200 [ 22.680963] R13: fffe R14: a02f5080 R15: 0203 [ 22.680965] FS: 7fade1fe8700() GS:88003fd0() knlGS: [ 22.680966] CS: 0010 DS: ES: CR0: 80050033 [ 22.680967] CR2: CR3: 3bdc9000 CR4: 000407e0 [ 22.680971] Stack: [ 22.680973] 812b7e6d 0002000c0003 020f0203 88003b303cec [ 22.680975] 88003b303d14 00010044812b49c4 2d36303134636672 [ 22.680977] 6e7365612d6d6367 0069 [ 22.680979] Call Trace: [ 22.680984] [] ? crypto_nivaead_default+0x14d/0x1a0 [ 22.680986] [] crypto_lookup_aead+0x9a/0xf0 [ 22.680989] [] crypto_alloc_tfm+0x63/0x130 [ 22.680992] [] ? kmem_cache_alloc_trace+0x1f1/0x230 [ 22.680994] [] crypto_alloc_aead+0x19/0x20 [ 22.680996] [] aead_bind+0xe/0x10 [algif_aead] [ 22.680999] [] alg_bind+0x60/0x130 [af_alg] [ 22.681003] [] SYSC_bind+0xb8/0xf0 [ 22.681003] [] ? fd_install+0x25/0x30 [ 22.681003] [] ? SyS_socket+0x90/0xd0 [ 22.681003] [] ? trace_do_page_fault+0x37/0xb0 [ 22.681003] [] SyS_bind+0xe/0x10 [ 22.681003] [] system_call_fastpath+0x12/0x71 [ 22.681003] Code: Bad RIP value. [ 22.681003] RIP [< (null)>] (null) [ 22.681003] RSP [ 22.681003] CR2: [ 22.681053] ---[ end trace c1a8ba963ebab541 ]--- -- Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html