From nobody Tue Dec 31 10:38:15 2024 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YMqF44Zjgz5jFZN for ; Tue, 31 Dec 2024 10:38:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YMqF43RTjz4WQs for ; Tue, 31 Dec 2024 10:38:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1735641496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mN83z7oYlSXszBKlesZs9lP/HrqG0chEjpbxciDg0ug=; b=xJHVtnYjUKKFlWdm0Eyf0t39jsMSshu2d7UWOQ7e4dgzFisKZhw9rS2CyyFY2lrcKJtQ1J 2yYZDx5+CtqcaHEzzz4ZDrxFWPiAMDS4v4md2NpyPEbOc/riKTgZoULNRMLQDNxG1mL/Dc QfG5CEHy/JpxlV/Z0rn8y+vXDGsn1J5ZsMEgOMS27gxBmm4dPzCNViMOM5zYT2YFT6+LX0 r2fz+BGG5ydzxuVgsC+Cxqk2K+NRLeNFdkWaO2g56FTzOrrb0bnNRgTgU1XNadkio/iAn8 0wkXltEm0ONwwEetYnvGYxBGkUtJMpFLByxWRrKhY6EhlkTiuShRvrGHPLBGJg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1735641496; a=rsa-sha256; cv=none; b=XNwj2wkkF5G145QJ8wDmcxEdQidx0FoNkpR3hYQSmskRlZa0WEaDrnvMwNHGjWqJIQ886i Ghuwp01jKj9GfmwhmMwpDInMf5y6RRuK7aL0Shi+tGPp9O+cj8acoTRQnSer54waaIEkuf BB1g7Jwmda7ENwk7+76G16vuukdR3ze5hY4iWDN5JZVavmyvNBYMHDHatnx51OB5TDDbrD diOMfW349vnFq7ORjXj9UuBHVeX8O2OkdEeUF+DLLg7UUv7C96Jtw7OaMrazXsP9n2gHbe krM+qoNiK0hyeXlyB9X/EZcJE1zLfukf2i6W6KdTJ+9DeHR3W7Tpnm8hQIyGJw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YMqF42xd6zc9V for ; Tue, 31 Dec 2024 10:38:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BVAcGLi002378 for ; Tue, 31 Dec 2024 10:38:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BVAcGMY002377 for net@FreeBSD.org; Tue, 31 Dec 2024 10:38:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 280037] KTLS with Intel QAT may trigger kernel panics Date: Tue, 31 Dec 2024 10:38:15 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.2-RELEASE X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: 3226388001@jcom.home.ne.jp X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: version Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280037 ss3bsd <3226388001@jcom.home.ne.jp> changed: What |Removed |Added ---------------------------------------------------------------------------- Version|14.1-RELEASE |14.2-RELEASE --- Comment #14 from ss3bsd <3226388001@jcom.home.ne.jp> --- Another (reproducible) panic while high TX load is found. Something (such as infinite loop) is happening in this path? *** /* * Caller marked the request to be processed immediately; dispatch = it * directly to the driver unless the driver is currently blocked, in * which case it is queued for deferred dispatch. */ cap =3D crp->crp_session->cap; if (!atomic_load_int(&cap->cc_qblocked)) { result =3D crypto_invoke(cap, crp, hint); if (result !=3D ERESTART) return (result); /* * The driver ran out of resources, put the request on the * queue. */ } ** -- Now on FreeBSD 14.2 (kgdb) backtrace #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:405 #2 0xffffffff809908e7 in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:523 #3 0xffffffff80990dbe in vpanic (fmt=3D0xffffffff8100a112 "double fault", ap=3Dap@entry=3D0xfffffe003a415e40) at /usr/src/sys/kern/kern_shutdown.c:967 #4 0xffffffff80990c13 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:891 #5 0xffffffff80e87f6e in dblfault_handler (frame=3D) at /usr/src/sys/amd64/amd64/trap.c:1012 #6 #7 0xffffffff80e49460 in bounce_bus_dmamap_load_buffer (dmat=3D0xfffff801ceb14700, map=3D0xffffffff81a27d90 , buf=3D0xfffff807af688ad8, buflen=3D5, pmap=3D0xffffffff817514d0 , flags=3D1, segs=3D0x0, segp=3D0xfffffe014e2c90d4) at /usr/src/sys/x86/x86/busdma_bounce.c:741 #8 0xffffffff809d4699 in _bus_dmamap_load_buffer (dmat=3D0xfffff801ceb1470= 0, map=3D0x0, buf=3D0xfffff807af688ad8, buflen=3D18446744071589494160, flags= =3D1, segs=3D0x0, segp=3D0xfffffe014e2c90d4, pmap=3D) at /usr/src/sys/x86/include/bus_dma.h:166 #9 _bus_dmamap_load_mbuf_epg (dmat=3Ddmat@entry=3D0xfffff801ceb14700, map=3Dmap@entry=3D0x0, m=3D0xfffff807af688a00, segs=3Dsegs@entry=3D0x0, nsegs=3Dnsegs@entry=3D0xfffffe014e2c90d4, flags=3D1) at /usr/src/sys/kern/subr_bus_dma.c:176 #10 0xffffffff809d4431 in _bus_dmamap_load_single_mbuf (dmat=3D0xfffff801ceb14700, map=3D0x0, m=3D0xfffff807af688ad8, segs=3D0x0, nsegs=3D0xfffffe014e2c90d4, flags=3D1) at /usr/src/sys/kern/subr_bus_dma.c:220 #11 bus_dmamap_load_crp_buffer (dmat=3D0xfffff801ceb14700, map=3D0x0, cb=3D= , callback=3D0xffffffff83000840 , callback_arg=3D0xfffffe014e2c9138, flags=3D1) at /usr/src/sys/kern/subr_bus_dma.c:554 #12 0xffffffff82fff7ad in qat_ocf_process () from /boot/kernel/qat.ko #13 0xffffffff80c99700 in crypto_dispatch_one (crp=3D0xfffff807a8af10b8, hi= nt=3D0) at /usr/src/sys/opencrypto/crypto.c:1432 #14 crypto_dispatch (crp=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/crypto.c:1448 #15 0xffffffff80ca1cf7 in ktls_ocf_dispatch_async_cb (crp=3D0xfffff801ceb14= 700) at /usr/src/sys/opencrypto/ktls_ocf.c:246 #16 0xffffffff82fff801 in qat_ocf_process () from /boot/kernel/qat.ko #17 0xffffffff80c99700 in crypto_dispatch_one (crp=3D0xfffff807a8af10b8, hi= nt=3D0) at /usr/src/sys/opencrypto/crypto.c:1432 #18 crypto_dispatch (crp=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/crypto.c:1448 #19 0xffffffff80ca1cf7 in ktls_ocf_dispatch_async_cb (crp=3D0xfffff801ceb14= 700) at /usr/src/sys/opencrypto/ktls_ocf.c:246 #20 0xffffffff82fff801 in qat_ocf_process () from /boot/kernel/qat.ko #21 0xffffffff80c99700 in crypto_dispatch_one (crp=3D0xfffff807a8af10b8, hi= nt=3D0) at /usr/src/sys/opencrypto/crypto.c:1432 #22 crypto_dispatch (crp=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/crypto.c:1448 : omit : #245 0xffffffff80c99700 in crypto_dispatch_one (crp=3D0xfffff807a8af10b8, h= int=3D0) at /usr/src/sys/opencrypto/crypto.c:1432 #246 crypto_dispatch (crp=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/crypto.c:1448 #247 0xffffffff80ca1cf7 in ktls_ocf_dispatch_async_cb (crp=3D0xfffff801ceb1= 4700) at /usr/src/sys/opencrypto/ktls_ocf.c:246 #248 0xffffffff82fff801 in qat_ocf_process () from /boot/kernel/qat.ko #249 0xffffffff80c99700 in crypto_dispatch_one (crp=3Dcrp@entry=3D0xfffff807a8af10b8, hint=3D0) at /usr/src/sys/opencrypto/crypto.c:1432 #250 crypto_dispatch (crp=3Dcrp@entry=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/crypto.c:1448 #251 0xffffffff80ca16bd in ktls_ocf_dispatch_async (state=3D0xfffff801ceaf8= 420, crp=3D0xfffff807a8af10b8) at /usr/src/sys/opencrypto/ktls_ocf.c:268 #252 ktls_ocf_tls13_aead_encrypt (state=3D0xfffff801ceaf8420, tls=3D0xfffff805c1fec108, m=3D0xfffffe014c5687c0, outiov=3D0xfffff801ceaf80= 00, outiovcnt=3D0) at /usr/src/sys/opencrypto/ktls_ocf.c:856 #253 0xffffffff80a2807e in ktls_encrypt_async (wq=3Dwq@entry=3D0xfffff804cc= 22c680, top=3Dtop@entry=3D0xfffff807af688a00) at /usr/src/sys/kern/uipc_ktls.c:3108 #254 0xffffffff80a27a36 in ktls_work_thread (ctx=3Dctx@entry=3D0xfffff804cc= 22c680) at /usr/src/sys/kern/uipc_ktls.c:3254 #255 0xffffffff8094a75f in fork_exit (callout=3D0xffffffff80a26a50 , arg=3D0xfffff804cc22c680, frame=3D0xfffffe014e2ccf40) at /usr/src/sys/kern/kern_fork.c:1164 #256 --=20 You are receiving this mail because: You are the assignee for the bug.=