diff options
author | Heiko Stuebner <heiko@sntech.de> | 2015-11-28 07:27:48 -0500 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2015-12-04 09:21:48 -0500 |
commit | ac7c8e6b6dc959d285382c7e9cdfe608205f0c68 (patch) | |
tree | aab53ef57ac6dfc64a10bfc00e64d9c81bfad4ee | |
parent | 1ab87298cb59b649d8d648d25dc15b36ab865f5a (diff) |
crypto: rockchip - fix possible deadlock
Lockdep warns about a possible deadlock resulting from the use of regular
spin_locks:
=================================
[ INFO: inconsistent lock state ]
4.4.0-rc2+ #2724 Not tainted
---------------------------------
inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
ksoftirqd/0/3 [HC0[0]:SC1[1]:HE1:SE0] takes:
(&(&crypto_info->lock)->rlock){+.?...}, at: [<bf14a65c>] rk_crypto_tasklet_cb+0x24/0xb4 [rk_crypto]
{SOFTIRQ-ON-W} state was registered at:
[<c007f4ac>] lock_acquire+0x178/0x218
[<c0759bac>] _raw_spin_lock+0x54/0x64
[<bf14af88>] rk_handle_req+0x7c/0xbc [rk_crypto]
[<bf14b040>] rk_des_ecb_encrypt+0x2c/0x30 [rk_crypto]
[<bf14b05c>] rk_aes_ecb_encrypt+0x18/0x1c [rk_crypto]
[<c028c820>] skcipher_encrypt_ablkcipher+0x64/0x68
[<c0290770>] __test_skcipher+0x2a8/0x8dc
[<c0292e94>] test_skcipher+0x38/0xc4
[<c0292fb0>] alg_test_skcipher+0x90/0xb0
[<c0292158>] alg_test+0x1e8/0x280
[<c028f6f4>] cryptomgr_test+0x34/0x54
[<c004bbe8>] kthread+0xf4/0x10c
[<c0010010>] ret_from_fork+0x14/0x24
irq event stamp: 10672
hardirqs last enabled at (10672): [<c002fac8>] tasklet_action+0x48/0x104
hardirqs last disabled at (10671): [<c002faa0>] tasklet_action+0x20/0x104
softirqs last enabled at (10658): [<c002ef84>] __do_softirq+0x358/0x49c
softirqs last disabled at (10669): [<c002f108>] run_ksoftirqd+0x40/0x80
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&(&crypto_info->lock)->rlock);
<Interrupt>
lock(&(&crypto_info->lock)->rlock);
*** DEADLOCK ***
Fix this by moving to irq-disabling spinlocks.
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r-- | drivers/crypto/rockchip/rk3288_crypto.c | 5 | ||||
-rw-r--r-- | drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 10 |
2 files changed, 9 insertions, 6 deletions
diff --git a/drivers/crypto/rockchip/rk3288_crypto.c b/drivers/crypto/rockchip/rk3288_crypto.c index 6b72f8d2e643..da9c73dce4af 100644 --- a/drivers/crypto/rockchip/rk3288_crypto.c +++ b/drivers/crypto/rockchip/rk3288_crypto.c | |||
@@ -190,12 +190,13 @@ static void rk_crypto_tasklet_cb(unsigned long data) | |||
190 | { | 190 | { |
191 | struct rk_crypto_info *dev = (struct rk_crypto_info *)data; | 191 | struct rk_crypto_info *dev = (struct rk_crypto_info *)data; |
192 | struct crypto_async_request *async_req, *backlog; | 192 | struct crypto_async_request *async_req, *backlog; |
193 | unsigned long flags; | ||
193 | int err = 0; | 194 | int err = 0; |
194 | 195 | ||
195 | spin_lock(&dev->lock); | 196 | spin_lock_irqsave(&dev->lock, flags); |
196 | backlog = crypto_get_backlog(&dev->queue); | 197 | backlog = crypto_get_backlog(&dev->queue); |
197 | async_req = crypto_dequeue_request(&dev->queue); | 198 | async_req = crypto_dequeue_request(&dev->queue); |
198 | spin_unlock(&dev->lock); | 199 | spin_unlock_irqrestore(&dev->lock, flags); |
199 | if (!async_req) { | 200 | if (!async_req) { |
200 | dev_err(dev->dev, "async_req is NULL !!\n"); | 201 | dev_err(dev->dev, "async_req is NULL !!\n"); |
201 | return; | 202 | return; |
diff --git a/drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c b/drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c index 4a8f9def0c8b..d98b681f6c06 100644 --- a/drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c +++ b/drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | |||
@@ -24,6 +24,7 @@ static void rk_crypto_complete(struct rk_crypto_info *dev, int err) | |||
24 | static int rk_handle_req(struct rk_crypto_info *dev, | 24 | static int rk_handle_req(struct rk_crypto_info *dev, |
25 | struct ablkcipher_request *req) | 25 | struct ablkcipher_request *req) |
26 | { | 26 | { |
27 | unsigned long flags; | ||
27 | int err; | 28 | int err; |
28 | 29 | ||
29 | if (!IS_ALIGNED(req->nbytes, dev->align_size)) | 30 | if (!IS_ALIGNED(req->nbytes, dev->align_size)) |
@@ -38,9 +39,9 @@ static int rk_handle_req(struct rk_crypto_info *dev, | |||
38 | dev->aligned = 1; | 39 | dev->aligned = 1; |
39 | dev->ablk_req = req; | 40 | dev->ablk_req = req; |
40 | 41 | ||
41 | spin_lock(&dev->lock); | 42 | spin_lock_irqsave(&dev->lock, flags); |
42 | err = ablkcipher_enqueue_request(&dev->queue, req); | 43 | err = ablkcipher_enqueue_request(&dev->queue, req); |
43 | spin_unlock(&dev->lock); | 44 | spin_unlock_irqrestore(&dev->lock, flags); |
44 | tasklet_schedule(&dev->crypto_tasklet); | 45 | tasklet_schedule(&dev->crypto_tasklet); |
45 | return err; | 46 | return err; |
46 | } | 47 | } |
@@ -267,12 +268,13 @@ static int rk_set_data_start(struct rk_crypto_info *dev) | |||
267 | 268 | ||
268 | static int rk_ablk_start(struct rk_crypto_info *dev) | 269 | static int rk_ablk_start(struct rk_crypto_info *dev) |
269 | { | 270 | { |
271 | unsigned long flags; | ||
270 | int err; | 272 | int err; |
271 | 273 | ||
272 | spin_lock(&dev->lock); | 274 | spin_lock_irqsave(&dev->lock, flags); |
273 | rk_ablk_hw_init(dev); | 275 | rk_ablk_hw_init(dev); |
274 | err = rk_set_data_start(dev); | 276 | err = rk_set_data_start(dev); |
275 | spin_unlock(&dev->lock); | 277 | spin_unlock_irqrestore(&dev->lock, flags); |
276 | return err; | 278 | return err; |
277 | } | 279 | } |
278 | 280 | ||