Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1727590ybk; Thu, 21 May 2020 13:50:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxO0iGbI6TDQZ0sOJD97jupg9fGqLzlxHmVMe3UdQT+A9MXRobVOzFP96+k7UwHE8QFT7M3 X-Received: by 2002:a17:906:eda3:: with SMTP id sa3mr5598527ejb.253.1590094207787; Thu, 21 May 2020 13:50:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590094207; cv=none; d=google.com; s=arc-20160816; b=L7xflq1uJNQ4e+N3j4tEj4tAkS7/+hNwZ7j5KGLzLJZaZd2dxiA3AprVhwgBGteC62 PHSGsg43avnP13x1RcTXoPwE4Fc1rBIEoNmvvFF6gRX9xv2OA/2lumSBwfNJoMB8lRHi Sh8w/qJUtHYDLQDXKROk92R1AyEOyst4dIo8yDG+MJp5GoENXqywoMfFOpnIdBMSt5IB FrTlNdFm91G7aKP9aRIScU3/zB5fIUUO3vn/33k+rLI/g/PnAA9/I507GPUiHxpOwr8e Sybb+IbvzL5Anj9wXh8fIqf72JPZkXTRdp5rlvNmVRmhafG3IHsBhy4opgBqQEiEmCBB Cn9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7h6WLFI1HjKVZRF72mgacz+zaPN5KCQpq9Xs5RIRcGU=; b=Zrokr+6DkSOUVlXNkSZnTsZOsVCdGDhfbdpWZz0zDqEAV+V9MXIZNemcQTKtzgQQVq 7b6sdiy/Xan1DQYqmSbKwDQmM7Pqd0jxs/3txqpErjdxrFy/aFInVxf8oQsdf0F+7BxD 7/W2A6ZOt3PDXhV/rJkmFih3gHPkXVkLLF+A0euJ0sLBYYDrVbTWgUQXWTDxZ1NryoUW b7HljlCGn3DRiytOP+fiL2RcCp5eUg09mAp/t6JI28Z/t8bibsZMaiiJz4JAsIrUCXqp dGcGcArcQWwY8IEtvRwVpXUxk1yBiRsfZ/PxejJz7Qi+/A1E0DLiPMvoaB9digd4ahjG 3Pqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=oAHDTJEO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k13si3367845edv.394.2020.05.21.13.49.44; Thu, 21 May 2020 13:50:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=oAHDTJEO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730101AbgEUUtF (ORCPT + 99 others); Thu, 21 May 2020 16:49:05 -0400 Received: from aserp2120.oracle.com ([141.146.126.78]:49824 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729382AbgEUUtD (ORCPT ); Thu, 21 May 2020 16:49:03 -0400 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKlsot118285; Thu, 21 May 2020 20:48:55 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=corp-2020-01-29; bh=7h6WLFI1HjKVZRF72mgacz+zaPN5KCQpq9Xs5RIRcGU=; b=oAHDTJEODV8JD62ps1hL5FOXp3VfGfI4A3UXa2S1FzSmHEzRtFbkI3IESfU86NU92cHK O4iCcM2NDjUapnljvU4GmdU8OVrGSNZBtS0j2wuZ+3HNKTg5LcyzlT404++wqteNSKDY ZucROY4QFvbhYci72a66VGKrvOlfOMlXEG2909mmDkrv4CljX/RCS4heU8P1tZvxvYHY hKaOVtME/tppQPDm3ANLd6drsFOIo7Uj5ebjIPVan+Vp2qVDqMINJ64I3vONeGQSpjOU H7vYdZIl+GiQEiA2z5Xo4LeTRhwbsC0FLi4zCNn09ghpsUBZl8tJDaOzdYINRfjCXYJj SA== Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by aserp2120.oracle.com with ESMTP id 31284map6d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 21 May 2020 20:48:54 +0000 Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKhFbH072802; Thu, 21 May 2020 20:48:54 GMT Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserp3020.oracle.com with ESMTP id 312t3capsq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 May 2020 20:48:54 +0000 Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id 04LKmrjS001042; Thu, 21 May 2020 20:48:54 GMT Received: from localhost.localdomain (/98.229.125.203) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 21 May 2020 13:48:53 -0700 From: Daniel Jordan To: Greg Kroah-Hartman , Sasha Levin Cc: Ben Hutchings , Herbert Xu , Mathias Krause , Steffen Klassert , stable@vger.kernel.org, linux-crypto@vger.kernel.org, Daniel Jordan Subject: [stable-4.9 3/4] padata: initialize pd->cpu with effective cpumask Date: Thu, 21 May 2020 16:48:46 -0400 Message-Id: <20200521204847.1953064-3-daniel.m.jordan@oracle.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200521204847.1953064-1-daniel.m.jordan@oracle.com> References: <20200521204847.1953064-1-daniel.m.jordan@oracle.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 mlxlogscore=999 phishscore=0 mlxscore=0 malwarescore=0 suspectscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210153 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxscore=0 cotscore=-2147483648 impostorscore=0 malwarescore=0 mlxlogscore=999 lowpriorityscore=0 phishscore=0 spamscore=0 bulkscore=0 adultscore=0 priorityscore=1501 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210154 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org [ Upstream commit ec9c7d19336ee98ecba8de80128aa405c45feebb ] Exercising CPU hotplug on a 5.2 kernel with recent padata fixes from cryptodev-2.6.git in an 8-CPU kvm guest... # modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 # echo 0 > /sys/devices/system/cpu/cpu1/online # echo c > /sys/kernel/pcrypt/pencrypt/parallel_cpumask # modprobe tcrypt mode=215 ...caused the following crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 2 PID: 134 Comm: kworker/2:2 Not tainted 5.2.0-padata-base+ #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0- Workqueue: pencrypt padata_parallel_worker RIP: 0010:padata_reorder+0xcb/0x180 ... Call Trace: padata_do_serial+0x57/0x60 pcrypt_aead_enc+0x3a/0x50 [pcrypt] padata_parallel_worker+0x9b/0xe0 process_one_work+0x1b5/0x3f0 worker_thread+0x4a/0x3c0 ... In padata_alloc_pd, pd->cpu is set using the user-supplied cpumask instead of the effective cpumask, and in this case cpumask_first picked an offline CPU. The offline CPU's reorder->list.next is NULL in padata_reorder because the list wasn't initialized in padata_init_pqueues, which only operates on CPUs in the effective mask. Fix by using the effective mask in padata_alloc_pd. Fixes: 6fc4dbcf0276 ("padata: Replace delayed timer with immediate workqueue in padata_reorder") Signed-off-by: Daniel Jordan Cc: Herbert Xu Cc: Steffen Klassert Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Daniel Jordan --- kernel/padata.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/padata.c b/kernel/padata.c index 0b9c39730d6d..1030e6cfc08c 100644 --- a/kernel/padata.c +++ b/kernel/padata.c @@ -450,7 +450,7 @@ static struct parallel_data *padata_alloc_pd(struct padata_instance *pinst, atomic_set(&pd->refcnt, 1); pd->pinst = pinst; spin_lock_init(&pd->lock); - pd->cpu = cpumask_first(pcpumask); + pd->cpu = cpumask_first(pd->cpumask.pcpu); INIT_WORK(&pd->reorder_work, invoke_padata_reorder); return pd; -- 2.26.2