Received: by 2002:a05:7412:1492:b0:e2:908c:2ebd with SMTP id s18csp392999rdh; Wed, 23 Aug 2023 03:14:23 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFAOsRddHVogOVTzBAvoCnkJj4gjUPfxoxFn/MDDRtr7WQjRykTkdKGG/rsDd0iGCoVzgXm X-Received: by 2002:a17:90a:bf0d:b0:26b:49f7:ee10 with SMTP id c13-20020a17090abf0d00b0026b49f7ee10mr8655162pjs.30.1692785662993; Wed, 23 Aug 2023 03:14:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692785662; cv=none; d=google.com; s=arc-20160816; b=C/GWg1GOmE+Q788Brk7NUkAow5T4xZIRQJ3xyI/YeVbaPteD0+MEMD/au3PgLFnucy 0SCXaol3/qyz66N6cz5HLgk8NisIPcW4Z/vay/+eVHCqeEO/Q4P7n0JZshTyam/Tytm+ Zh6Z2Akcdb6xpr2uwP6SrD7i3ov1gpWvs6AT3iMeTw5+XTjOMUixrOXiu9r3mTy4R8az EvA4t+njR9XmfkVr+Y7tJOPIvUQXL8GgXA6ALIQr1v4LncVEiXT/IZKHnLXV1zQu7LJ9 i3CGH4tLiTSfJNZrhrhE6HMktPg5BK3pmY/1hvXXNgpU1dvGDU1wOgEqtw3zVQBdndOz UWOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=24wOY3DS0NE5qOUpaTGffyx5583IpCIYhmHlOjkPkzM=; fh=YGRzFryGUvszDmkZnpDCBFkso2QYAzI6MzFAvZ4HwNA=; b=o+xHjauhnDx8mB3rxmQn8BKt3e1AUAQwzikPelUzWfXA2Q2il+/e9lMOudrFMJEHDt yYF+zfC5c1u9Pa95m2kLZ++f2F/rLdWaDQbJKONCGjySnkwQt3dPAGY4sPq9PSHMaLTb 5Z3pVIfckv9elX+cljpoPxFbyFoiFl9IiiIMIR8MRlVu95Avqng9ZcKBKVnxPGePqmke ac/KsbbWQFSASkIHt3I8ENAiOoPZJswKobSgLo4FS7JZQEz0WDL41fIDz/9rutLJqadt lphhXQuwm/3iuKBWDnmmghlwk95Ai9q9qhv9V0fILTMmtRYcb0kWJPdoybNa2Y2JgGHH Rzuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mv9-20020a17090b198900b0026ce8c61037si12334731pjb.175.2023.08.23.03.14.03; Wed, 23 Aug 2023 03:14:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233339AbjHWHbq (ORCPT + 99 others); Wed, 23 Aug 2023 03:31:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40206 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233331AbjHWHbp (ORCPT ); Wed, 23 Aug 2023 03:31:45 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 68623185 for ; Wed, 23 Aug 2023 00:31:43 -0700 (PDT) Received: from kwepemm600003.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4RVyX41FNXzTmcG; Wed, 23 Aug 2023 15:29:24 +0800 (CST) Received: from hulk-vt.huawei.com (10.67.174.118) by kwepemm600003.china.huawei.com (7.193.23.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Wed, 23 Aug 2023 15:31:39 +0800 From: Lu Jialin To: Steffen Klassert , Daniel Jordan , Herbert Xu , "David S . Miller" CC: Lu Jialin , Guo Zihua , Subject: [PATCH v2] crypto: Fix hungtask for PADATA_RESET Date: Wed, 23 Aug 2023 07:30:47 +0000 Message-ID: <20230823073047.1515137-1-lujialin4@huawei.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.174.118] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To kwepemm600003.china.huawei.com (7.193.23.202) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org We found a hungtask bug in test_aead_vec_cfg as follows: INFO: task cryptomgr_test:391009 blocked for more than 120 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: __switch_to+0x98/0xe0 __schedule+0x6c4/0xf40 schedule+0xd8/0x1b4 schedule_timeout+0x474/0x560 wait_for_common+0x368/0x4e0 wait_for_completion+0x20/0x30 test_aead_vec_cfg+0xab4/0xd50 test_aead+0x144/0x1f0 alg_test_aead+0xd8/0x1e0 alg_test+0x634/0x890 cryptomgr_test+0x40/0x70 kthread+0x1e0/0x220 ret_from_fork+0x10/0x18 Kernel panic - not syncing: hung_task: blocked tasks For padata_do_parallel, when the return err is 0 or -EBUSY, it will call wait_for_completion(&wait->completion) in test_aead_vec_cfg. In normal case, aead_request_complete() will be called in pcrypt_aead_serial and the return err is 0 for padata_do_parallel. But, when pinst->flags is PADATA_RESET, the return err is -EBUSY for padata_do_parallel, and it won't call aead_request_complete(). Therefore, test_aead_vec_cfg will hung at wait_for_completion(&wait->completion), which will cause hungtask. The problem comes as following: (padata_do_parallel) | rcu_read_lock_bh(); | err = -EINVAL; | (padata_replace) | pinst->flags |= PADATA_RESET; err = -EBUSY | if (pinst->flags & PADATA_RESET) | rcu_read_unlock_bh() | return err In order to resolve the problem, we retry at most 5 times when padata_do_parallel return -EBUSY. For more than 5 times, we replace the return err -EBUSY with -EAGAIN, which means parallel_data is changing, and the caller should call it again. v2: introduce padata_try_do_parallel() in pcrypt_aead_encrypt and pcrypt_aead_decrypt to solve the hungtask Signed-off-by: Lu Jialin Signed-off-by: Guo Zihua --- crypto/pcrypt.c | 33 +++++++++++++++++++++++++++------ kernel/padata.c | 2 +- 2 files changed, 28 insertions(+), 7 deletions(-) diff --git a/crypto/pcrypt.c b/crypto/pcrypt.c index 8c1d0ca41213..9d4470482165 100644 --- a/crypto/pcrypt.c +++ b/crypto/pcrypt.c @@ -74,6 +74,31 @@ static void pcrypt_aead_done(void *data, int err) padata_do_serial(padata); } +/* + * We retry at most 5 times when padata_do_parallel return -EBUSY. + * For more than 5 times, we replace the return err -EBUSY with -EAGAIN, + * which means parallel_data is changing, the caller should call it again. + */ +static int padata_try_do_paralell(struct padata_shell *ps, + struct padata_priv *padata, int *cb_cpu) +{ + int err = 0; + int nr_retries = 5; + + while (nr_retries--) { + err = padata_do_parallel(ps, padata, cb_cpu); + if (err != -EBUSY) + break; + } + + if (err == 0) + err = -EINPROGRESS; + else if (err == -EBUSY) + err = -EAGAIN; + + return err; +} + static void pcrypt_aead_enc(struct padata_priv *padata) { struct pcrypt_request *preq = pcrypt_padata_request(padata); @@ -114,9 +139,7 @@ static int pcrypt_aead_encrypt(struct aead_request *req) req->cryptlen, req->iv); aead_request_set_ad(creq, req->assoclen); - err = padata_do_parallel(ictx->psenc, padata, &ctx->cb_cpu); - if (!err) - return -EINPROGRESS; + err = padata_try_do_paralell(ictx->psenc, padata, &ctx->cb_cpu); return err; } @@ -161,9 +184,7 @@ static int pcrypt_aead_decrypt(struct aead_request *req) req->cryptlen, req->iv); aead_request_set_ad(creq, req->assoclen); - err = padata_do_parallel(ictx->psdec, padata, &ctx->cb_cpu); - if (!err) - return -EINPROGRESS; + err = padata_try_do_paralell(ictx->psenc, padata, &ctx->cb_cpu); return err; } diff --git a/kernel/padata.c b/kernel/padata.c index 222d60195de6..81c8183f3176 100644 --- a/kernel/padata.c +++ b/kernel/padata.c @@ -202,7 +202,7 @@ int padata_do_parallel(struct padata_shell *ps, *cb_cpu = cpu; } - err = -EBUSY; + err = -EBUSY; if ((pinst->flags & PADATA_RESET)) goto out; -- 2.34.1