Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1729957ybk; Thu, 21 May 2020 13:54:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzG+TPorgUZhPx02Y98PzlKpqQr21gQDCxizec2xiI+OzLYv+TWP6AsAe22iokbAkHODaiu X-Received: by 2002:a17:907:6f7:: with SMTP id yh23mr5152999ejb.517.1590094489670; Thu, 21 May 2020 13:54:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590094489; cv=none; d=google.com; s=arc-20160816; b=MygJSmYJOcoDpDw5rh4w4bx09hIY9lSQbTo/YXzXF4vE8J76lAZAMv8dnf304zwyWM 3LSk3O+izJoYZ/nEO+ID4eIfTsnxTWsg3Av3cwsdVyC2X8+5Cm+RYz+1vWMMzT/o7ZRO NYRdg10YBKFgxMg71P05eal/GbrK22dKWbBUFrjV21XCRPApYlztJMYk+e3dQ8Ss1sc+ GVm+M6eAUlIAzd/xdwpAxWMW8EIMpQ9MmK7ss7U/Oc9m/giZSapGuyx+bxIufFzG43L0 msR8CjWBjapCu8RdILrR4PTQ/Fz6imzPeDxJWAogWqLfX+O3FGhcfJ/cI3Bx6PQGFBW3 tRQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IJjBIhKX5mthcMZl8llTKy2QfbD51X/DTM9bCvWPzMM=; b=V0uo03FAwYgMj3QH3DXyb1IWNncfNAM7R3DHWQMhfkfsq8IBZ9y+D2ogtaFqCsmgIW 0iknfpchiDKpfhewqighMizrjx9q2w1PzN3wxW8ECS+wdmqu9EcB827V/NtKihQyxstL YNulpa/3ezqX3BmVe+THj0yoXJrWI5E1I9ACu03VW33GSBPKJARt+Vqz9wBRnkVEG9iH oH8lP3NbYntV9JJ8OohTVKAPqK7qkWBMvDjCdqIbrTltXSb8GLuhC+wffRlIqpEH4Rsp CK4HREL7jLqiVgPFhp2JO0d/d4/yT/cfaOt4mD/yMAXeevUyHXVxVg2RlK7wg6TayKQ/ 8t2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=jYaSrwly; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k13si3367845edv.394.2020.05.21.13.54.26; Thu, 21 May 2020 13:54:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=jYaSrwly; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730206AbgEUUyK (ORCPT + 99 others); Thu, 21 May 2020 16:54:10 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:37210 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728778AbgEUUyK (ORCPT ); Thu, 21 May 2020 16:54:10 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKpbuB131302; Thu, 21 May 2020 20:53:55 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=corp-2020-01-29; bh=IJjBIhKX5mthcMZl8llTKy2QfbD51X/DTM9bCvWPzMM=; b=jYaSrwlyphLmtVnf2fQK3ySD1LVDmcCoPsARkxgbyWNEDFuyzsLxxCsoRaFto6UkvRpZ VGzOd1kDEmCKTiNuLRj3FTsBHKO6m2FQK1W4eNto7OwbwaoPeFQLPaRdeYWuLfFCct3s Qd5QY64E5K47iSY0s4Lq0CZt7jE6e6qzuATC42PzQdioPgMPNvxPj3AUwTpHGCJLi/Y3 9YR9xcC3sb1VvQrRSlPkLc2suIY0Q4IsRS7qer5mW5M96nfgt+SR2ldt+U8Upe3ocnO7 xGS8T8Q6XvR+cX2b3tHBN07GYZMCfIiSlsEQh6cCZ+NjbbEGtOG3IxBUuis1/hBwYCAs yg== Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79]) by userp2120.oracle.com with ESMTP id 31501rh771-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 21 May 2020 20:53:55 +0000 Received: from pps.filterd (userp3020.oracle.com [127.0.0.1]) by userp3020.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 04LKnGO6029766; Thu, 21 May 2020 20:51:54 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userp3020.oracle.com with ESMTP id 31502349nj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 May 2020 20:51:54 +0000 Received: from abhmp0016.oracle.com (abhmp0016.oracle.com [141.146.116.22]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 04LKprIw024495; Thu, 21 May 2020 20:51:53 GMT Received: from localhost.localdomain (/98.229.125.203) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 21 May 2020 13:51:53 -0700 From: Daniel Jordan To: Greg Kroah-Hartman , Sasha Levin Cc: Ben Hutchings , Herbert Xu , Mathias Krause , Peter Zijlstra , Steffen Klassert , stable@vger.kernel.org, linux-crypto@vger.kernel.org, Daniel Jordan Subject: [stable-4.4 4/5] padata: initialize pd->cpu with effective cpumask Date: Thu, 21 May 2020 16:51:44 -0400 Message-Id: <20200521205145.1953392-4-daniel.m.jordan@oracle.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200521205145.1953392-1-daniel.m.jordan@oracle.com> References: <20200521205145.1953392-1-daniel.m.jordan@oracle.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 bulkscore=0 suspectscore=0 phishscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210154 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9628 signatures=668686 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 lowpriorityscore=0 spamscore=0 mlxlogscore=999 clxscore=1015 priorityscore=1501 cotscore=-2147483648 impostorscore=0 bulkscore=0 adultscore=0 malwarescore=0 phishscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005210155 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org [ Upstream commit ec9c7d19336ee98ecba8de80128aa405c45feebb ] Exercising CPU hotplug on a 5.2 kernel with recent padata fixes from cryptodev-2.6.git in an 8-CPU kvm guest... # modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 # echo 0 > /sys/devices/system/cpu/cpu1/online # echo c > /sys/kernel/pcrypt/pencrypt/parallel_cpumask # modprobe tcrypt mode=215 ...caused the following crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 2 PID: 134 Comm: kworker/2:2 Not tainted 5.2.0-padata-base+ #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0- Workqueue: pencrypt padata_parallel_worker RIP: 0010:padata_reorder+0xcb/0x180 ... Call Trace: padata_do_serial+0x57/0x60 pcrypt_aead_enc+0x3a/0x50 [pcrypt] padata_parallel_worker+0x9b/0xe0 process_one_work+0x1b5/0x3f0 worker_thread+0x4a/0x3c0 ... In padata_alloc_pd, pd->cpu is set using the user-supplied cpumask instead of the effective cpumask, and in this case cpumask_first picked an offline CPU. The offline CPU's reorder->list.next is NULL in padata_reorder because the list wasn't initialized in padata_init_pqueues, which only operates on CPUs in the effective mask. Fix by using the effective mask in padata_alloc_pd. Fixes: 6fc4dbcf0276 ("padata: Replace delayed timer with immediate workqueue in padata_reorder") Signed-off-by: Daniel Jordan Cc: Herbert Xu Cc: Steffen Klassert Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Daniel Jordan --- kernel/padata.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/padata.c b/kernel/padata.c index e5966eedfa36..43b72f5dfe07 100644 --- a/kernel/padata.c +++ b/kernel/padata.c @@ -449,7 +449,7 @@ static struct parallel_data *padata_alloc_pd(struct padata_instance *pinst, atomic_set(&pd->refcnt, 1); pd->pinst = pinst; spin_lock_init(&pd->lock); - pd->cpu = cpumask_first(pcpumask); + pd->cpu = cpumask_first(pd->cpumask.pcpu); INIT_WORK(&pd->reorder_work, invoke_padata_reorder); return pd; -- 2.26.2