Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1727011ybk; Thu, 21 May 2020 13:49:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwbYkEBmytWopBhUB4Iinyq7kaZ/G7hMMOQR+iJWLM9QLO8ikQ3Yth1DmrHwIzGb0SA3EZz X-Received: by 2002:a17:906:651:: with SMTP id t17mr5478787ejb.394.1590094141073; Thu, 21 May 2020 13:49:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590094141; cv=none; d=google.com; s=arc-20160816; b=m7GDN3+LV5e02IiRSmNTvRsgOR7PLr6/qkNWvDRod0dLlMTXFBqtwFBIVhYEGRe/hB 2vaveWazlaoQAmvyX5kA+6R68KwNka/BoyFd0r3s7PcA7nsNBLRFFFZaGN6mD11tfA8D QxrdGBtgE04w1naA/6s5UmPNsJktAzb5FuQuI/UepqHqAHdS0vsU6A5wAAii6k5TXCY6 8Jzc8m260uQ2QJGMwmpMS1bwjY3LV9BkOtN2rwU+LuJJxXcb3H3kXF5FRizRskdF6Ck9 ldGkpyGzutZ5wIURqiw6pjkfy5RWfEApnmBmlyewZfLkle+oru4vH6zxLX2iT71/JAiU MOCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=CF6OJe7RZ0iClgY/Wfc9jssg1+Q4GlwmBjUzdYqjt78=; b=TqnBqHlPq2NY2CdPTcmMfX0Qprh1uYIGsVykLHtlsRIaIv8Wb+dEsYVwGpeYmFaqky /RM2/ikdCkhHdG+jdY3Oh1aLB1rmYY3wnINE2fUQ9n5kFt2gTcvRo6hL3FnbnTxUDX7i V2KmuL5tIYRcU5ZWUGHAijV52vysNtGMXsnbmaa9YpaUkWxiqDM8Y290EuHSd1++Fusy xF5wTJtx7VeN4sH8Hwo6K/q7AQ3ABJXC9XzplRe9usN0zL3vtoBffZDxkfuYoJwAmnI6 pjNLRaP6VmDr4kjnBTvfs+M5Q+IBcYhNhT6EJzS/sqw3OI0SLNMJtBqSIEQz/tClPPOD 0ADA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=GZFHsNYl; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t14si1484582edy.576.2020.05.21.13.48.37; Thu, 21 May 2020 13:49:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=GZFHsNYl; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729693AbgEUUrS (ORCPT + 99 others); Thu, 21 May 2020 16:47:18 -0400 Received: from aserp2120.oracle.com ([141.146.126.78]:48608 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726858AbgEUUrS (ORCPT ); Thu, 21 May 2020 16:47:18 -0400 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKfpfp113288; Thu, 21 May 2020 20:47:07 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=corp-2020-01-29; bh=CF6OJe7RZ0iClgY/Wfc9jssg1+Q4GlwmBjUzdYqjt78=; b=GZFHsNYlIssNKG14BkO40S6CX4BiJexQKNec/4QjG4DlEcKQmork/ywiUASMWteYBj53 B+ESkCNzLSkVqoENR/w7ahCY22OM7hMchKJNwA8/H0o3K3hQ8CFZBiis4/zhF7ZU6oC+ h0TyZMSHrSDVYn/QtffmLy+m8gRiMoCJzemCQkmAfLi2ZjneyBCjYvMHO/bcEb7hdiRx gMl9sdHscols6x3Xr6Nf1HmDusGAwUnWNOtpvQqp1SPwebogmAmlHOuin+eBpckUuiKx QQ+q+74m5tPzbwPPqze+UQsghEVcLEaS9ijEpQQkT5H5RHD3XXTXrtK77ZKeZt57Ix8P vQ== Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80]) by aserp2120.oracle.com with ESMTP id 31284map0g-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 21 May 2020 20:47:07 +0000 Received: from pps.filterd (userp3030.oracle.com [127.0.0.1]) by userp3030.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKiXxb046437; Thu, 21 May 2020 20:47:06 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userp3030.oracle.com with ESMTP id 314gm9wtg7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 May 2020 20:47:06 +0000 Received: from abhmp0020.oracle.com (abhmp0020.oracle.com [141.146.116.26]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 04LKl52F022361; Thu, 21 May 2020 20:47:05 GMT Received: from localhost.localdomain (/98.229.125.203) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 21 May 2020 13:47:04 -0700 From: Daniel Jordan To: Greg Kroah-Hartman , Sasha Levin Cc: Ben Hutchings , Herbert Xu , Mathias Krause , Steffen Klassert , stable@vger.kernel.org, linux-crypto@vger.kernel.org, Daniel Jordan Subject: [stable-4.14 3/4] padata: initialize pd->cpu with effective cpumask Date: Thu, 21 May 2020 16:46:57 -0400 Message-Id: <20200521204658.1952777-3-daniel.m.jordan@oracle.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200521204658.1952777-1-daniel.m.jordan@oracle.com> References: <20200521204658.1952777-1-daniel.m.jordan@oracle.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxlogscore=999 adultscore=0 phishscore=0 mlxscore=0 spamscore=0 suspectscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210154 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxscore=0 cotscore=-2147483648 impostorscore=0 malwarescore=0 mlxlogscore=999 lowpriorityscore=0 phishscore=0 spamscore=0 bulkscore=0 adultscore=0 priorityscore=1501 clxscore=1011 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210153 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org [ Upstream commit ec9c7d19336ee98ecba8de80128aa405c45feebb ] Exercising CPU hotplug on a 5.2 kernel with recent padata fixes from cryptodev-2.6.git in an 8-CPU kvm guest... # modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 # echo 0 > /sys/devices/system/cpu/cpu1/online # echo c > /sys/kernel/pcrypt/pencrypt/parallel_cpumask # modprobe tcrypt mode=215 ...caused the following crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 2 PID: 134 Comm: kworker/2:2 Not tainted 5.2.0-padata-base+ #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0- Workqueue: pencrypt padata_parallel_worker RIP: 0010:padata_reorder+0xcb/0x180 ... Call Trace: padata_do_serial+0x57/0x60 pcrypt_aead_enc+0x3a/0x50 [pcrypt] padata_parallel_worker+0x9b/0xe0 process_one_work+0x1b5/0x3f0 worker_thread+0x4a/0x3c0 ... In padata_alloc_pd, pd->cpu is set using the user-supplied cpumask instead of the effective cpumask, and in this case cpumask_first picked an offline CPU. The offline CPU's reorder->list.next is NULL in padata_reorder because the list wasn't initialized in padata_init_pqueues, which only operates on CPUs in the effective mask. Fix by using the effective mask in padata_alloc_pd. Fixes: 6fc4dbcf0276 ("padata: Replace delayed timer with immediate workqueue in padata_reorder") Signed-off-by: Daniel Jordan Cc: Herbert Xu Cc: Steffen Klassert Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Daniel Jordan --- kernel/padata.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/padata.c b/kernel/padata.c index 66d96ed62286..6d0cdee9d321 100644 --- a/kernel/padata.c +++ b/kernel/padata.c @@ -450,7 +450,7 @@ static struct parallel_data *padata_alloc_pd(struct padata_instance *pinst, atomic_set(&pd->refcnt, 1); pd->pinst = pinst; spin_lock_init(&pd->lock); - pd->cpu = cpumask_first(pcpumask); + pd->cpu = cpumask_first(pd->cpumask.pcpu); INIT_WORK(&pd->reorder_work, invoke_padata_reorder); return pd; -- 2.26.2