Hi Herbert, On Wed, 11 Dec 2019 at 15:20, Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> wrote: > > On Wed, Dec 11, 2019 at 03:07:53PM +0530, Anand Moon wrote: > > > > name : ecb(aes) > > driver : ecb-aes-gxl > > module : kernel > > priority : 400 > > refcnt : 1 > > selftest : passed > > internal : no > > type : skcipher > > async : yes > > blocksize : 16 > > min keysize : 16 > > max keysize : 32 > > ivsize : 0 > > chunksize : 16 > > walksize : 16 > > > > name : cbc(aes) > > driver : cbc-aes-gxl > > module : kernel > > priority : 400 > > refcnt : 1 > > selftest : passed > > internal : no > > type : skcipher > > async : yes > > blocksize : 16 > > min keysize : 16 > > max keysize : 32 > > ivsize : 16 > > chunksize : 16 > > walksize : 16 > > Oh so you did actually get them loaded. You need to run tcrypt with > mode=500 instead of 200 to test the async ciphers. Does that work? > > Thanks, > -- > Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> > Home Page: http://gondor.apana.org.au/~herbert/ > PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt I get kernel panic, I will try to look into this much closely. [alarm@alarm ~]$ sudo modprobe tcrypt sec=1 mode=500 [sudo] password for alarm: [ 754.382673] tcrypt: [ 754.382673] testing speed of async ecb(aes) (ecb-aes-gxl) encryption [ 754.385583] tcrypt: test 0 (128 bit key, 16 byte blocks): [ 754.385774] SError Interrupt on CPU1, code 0xbf000000 -- SError [ 754.385776] CPU: 1 PID: 121 Comm: da832000.crypto Not tainted 5.5.0-rc1-00012-g6794862a16ef-dirty #3 [ 754.385778] Hardware name: Hardkernel ODROID-C2 (DT) [ 754.385779] pstate: 60000005 (nZCv daif -PAN -UAO) [ 754.385781] pc : wait_for_completion_interruptible_timeout+0x20/0x120 [ 754.385782] lr : meson_handle_cipher_request+0x344/0x700 [ 754.385783] sp : ffff800011e9bca0 [ 754.385784] x29: ffff800011e9bca0 x28: 0000000000000040 [ 754.385787] x27: 0000000000000010 x26: 0000000000000000 [ 754.385789] x25: 0000000000000000 x24: 0000000005300080 [ 754.385792] x23: 0000000000000002 x22: ffff00006d08aa00 [ 754.385795] x21: ffff00007f68c4d0 x20: ffff00007f68c4c8 [ 754.385797] x19: 000000000000007d x18: 00000000000000ab [ 754.385800] x17: 000000000000006c x16: 000000000000001b [ 754.385802] x15: 000000000000000c x14: 0000000000000010 [ 754.385805] x13: 0000000000000000 x12: 0000000000000000 [ 754.385808] x11: 0000000000000001 x10: ffff8000119d7e80 [ 754.385810] x9 : 0000000000000000 x8 : ffff800011add000 [ 754.385813] x7 : 0000000000000000 x6 : 0000000000000000 [ 754.385815] x5 : 0000000000000000 x4 : 0000000080800010 [ 754.385818] x3 : ffff800011acd000 x2 : 000000006d093002 [ 754.385820] x1 : 000000000000007d x0 : ffff00007f68c4c8 [ 754.385824] Kernel panic - not syncing: Asynchronous SError Interrupt [ 754.385825] CPU: 1 PID: 121 Comm: da832000.crypto Not tainted 5.5.0-rc1-00012-g6794862a16ef-dirty #3 [ 754.385827] Hardware name: Hardkernel ODROID-C2 (DT) [ 754.385828] Call trace: [ 754.385829] dump_backtrace+0x0/0x188 [ 754.385830] show_stack+0x14/0x20 [ 754.385831] dump_stack+0xb4/0xfc [ 754.385832] panic+0x158/0x320 [ 754.385833] nmi_panic+0x84/0x88 [ 754.385834] arm64_serror_panic+0x74/0x80 [ 754.385835] do_serror+0x80/0x138 [ 754.385836] el1_error+0x84/0x100 [ 754.385838] wait_for_completion_interruptible_timeout+0x20/0x120 [ 754.385839] meson_handle_cipher_request+0x344/0x700 [ 754.385840] crypto_pump_work+0x10c/0x228 [ 754.385841] kthread_worker_fn+0xa8/0x188 [ 754.385842] kthread+0xf0/0x120 [ 754.385843] ret_from_fork+0x10/0x18 [ 754.385862] SMP: stopping secondary CPUs [ 754.385863] Kernel Offset: disabled [ 754.385864] CPU features: 0x00002,24002004 [ 754.385865] Memory Limit: none -Anand