Received: by 10.192.165.156 with SMTP id m28csp1005248imm; Wed, 18 Apr 2018 02:14:37 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+NsGNp9NDAfa2rPBZukPHT1SS58HjK/BS7KMlHvY5olCw4/Gs8iwWy5nh/nD1sTOVF8Bku X-Received: by 2002:a17:902:86:: with SMTP id a6-v6mr1344474pla.298.1524042877650; Wed, 18 Apr 2018 02:14:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524042877; cv=none; d=google.com; s=arc-20160816; b=0iHm7PXSSxqU0szvBcFvQr8JdLg94C3OzrCJBnIb1Muxu4I0ohyMsID08QADxEd4In S0IwDTjdQFYyJa0SDDesBOY+sn57NVjh0vVGdle5p4IZpxrk1hwYFnp3GSx6/iDvFXiu f10E2/Wsm31ierbp7+EIzT1R8cl14+/sBjp0baXte0GN5v2v0JDxxTL/54c01aCsA2Fe o6kbBzfkPRcMzFZKMW10in30taF6dKru8x1sGuwJ9aaCgKgDMP66ogLKeiPkwv5bwMLG EadM94m6nv+Jb92oaHg2C/5fxFOJESPvLTbiiRpVsRPzE4w6oEyB6zYASD/hWCUSQxIq MiNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=U3IDZ0HKYPOecnLJRpq7pedAPH1gvXrt+jTOyE+AOno=; b=FB7at2plElzso9GKBfCZJAPvCn5wpe3dQv9wcKIsjbRn3tZMQYejbNkzCiWTxEGYrP uQrYMzk/hbckosSbptCrdbl4gaMUqRtpBxcUeSVq6tZfYvzOxqmo+kNCvSdNa/KTFvbz uSbMA4n2/6Rs4bme+X0ezAGbJaNNFXLKiV9hGZuRPxJB2tiWcWyjoIbOyAaUWyLyQOYW yfaMH6frNAQ/CXj9S/keEFsm9B4EFOg9dy0vtIFh7bYhqWR9GguGMCkNHpuJrlntFkUl K5ziDY/sT5k+/brzbt51Fcx4Mg339QBsg1qsFA27K9SYhCQkyekSj3xSPUYQZbeMiPfj oTbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cogentembedded-com.20150623.gappssmtp.com header.s=20150623 header.b=WRiEYyxS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z2-v6si831515plo.489.2018.04.18.02.14.22; Wed, 18 Apr 2018 02:14:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@cogentembedded-com.20150623.gappssmtp.com header.s=20150623 header.b=WRiEYyxS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753197AbeDRJNQ (ORCPT + 99 others); Wed, 18 Apr 2018 05:13:16 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:38404 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752749AbeDRJNO (ORCPT ); Wed, 18 Apr 2018 05:13:14 -0400 Received: by mail-lf0-f68.google.com with SMTP id z130-v6so1541783lff.5 for ; Wed, 18 Apr 2018 02:13:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cogentembedded-com.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=U3IDZ0HKYPOecnLJRpq7pedAPH1gvXrt+jTOyE+AOno=; b=WRiEYyxSwD6CKr4q4tV8bACYCRGcvMqANw+UO+Ff0RHlQh1zOPy8V+unKldmoiKwN5 i4ZUQSPClBSRYRnyKbA74y4zN7C0Oey2/CAD0F++6bjsvmuROv0NhJXLkFx4fbukKpNt 3iWWmF8Q0sMaNj9c0K3RyKli0f/aqaCAqGpt0Nvfe7W1tKVMBwL8CYpgnnVTBeF7J/Kv HMAzEYV9xt1mOljjM6WrYvkCwa+nJVU+HHd99X2rtOYK2bNJtPC7SVpFel+gFPKAQKnu jUythG594o5HS+DJpSbjpiY7QzCF6a+kV5uzQZ8lqbNtmFSenSYziJUd+EKZFTdmgPWY RuUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=U3IDZ0HKYPOecnLJRpq7pedAPH1gvXrt+jTOyE+AOno=; b=aa9b1Sx9BIzbc0fszsJi9wcmjGW5qN528HOIFljhZq4Xr7rrREXwL4QDz4F7SRc95q Qu5yctXjJ+OqCVdqGfZTsxey5Ab/YLrYnHz3TPowNw7JxrR96lCg0OdLQjlXvHYFedVj jr92buDh/VnJXXrzQq7QXWj1yq8vOUk5vdlFPBe3ZO6gMnc95qto13TWHMmfMWE3jHWO /eUcOi/d/SsgUnrwIOtav+aOemSYFmV4n45qyZNRiuUlKvmHMyXFQjbjohYUMj4evZb4 adsmMrfABhR2aV5nZGamCItRizlBxo3bzU9XBRhHdig8HuZ/dYRbYUsD7zccvuEiI5nK fdwA== X-Gm-Message-State: ALQs6tBzpNNTxV5U/YCgtDFOnpKjHu/msPoRneebQYZ2PINCrPfY+RHo x2hdv8LDpIPM6eX+6J0jDkT+NgwRcbE= X-Received: by 2002:a19:9909:: with SMTP id b9-v6mr997307lfe.31.1524042792301; Wed, 18 Apr 2018 02:13:12 -0700 (PDT) Received: from [192.168.0.127] ([31.173.86.50]) by smtp.gmail.com with ESMTPSA id m127-v6sm170517lfm.79.2018.04.18.02.13.10 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 Apr 2018 02:13:11 -0700 (PDT) Subject: Re: [PATCH] sh: mm: Fix unprotected access to struct device To: Jacopo Mondi , ysato@users.sourceforge.jp, dalias@libc.org, thomas.petazzoni@free-electrons.com, robin.murphy@arm.com Cc: geert@linux-m68k.org, linux-renesas-soc@vger.kernel.org, linux-sh@vger.kernel.org, linux-kernel@vger.kernel.org References: <1523972123-5700-1-git-send-email-jacopo+renesas@jmondi.org> From: Sergei Shtylyov Message-ID: <75621aa6-1fe9-2049-fc70-fd6d542c7307@cogentembedded.com> Date: Wed, 18 Apr 2018 12:13:10 +0300 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <1523972123-5700-1-git-send-email-jacopo+renesas@jmondi.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello! On 4/17/2018 4:35 PM, Jacopo Mondi wrote: > With commit ce88313069c36eef80f21fd7 ("arch/sh: make the DMA mapping > operations observe dev->dma_pfn_offset") the generic DMA allocation > function on which the SH 'dma_alloc_coherent()' function relies on, > access the 'dma_pfn_offset' field of struct device. > > Unfortunately the 'dma_generic_alloc_coherent()' function is called from > several places with a NULL struct device argument, halting the CPU > during the boot process. > > This patch fixes the issue protecting access to dev->dma_pfn_offset, > with a trivial check for validity. It also passes a valid 'struct device' > in the 'platform_resource_setup_memory' function which is the main user > of 'dma_alloc_coherent()', and inserting a WARN_ON() check to make future > (and existing) bogus users of this function they're should provide a valid > 'struct device' whenever possible. > > Fixes: ce88313069c36eef80f21fd7 ("arch/sh: make the DMA mapping operations observe dev->dma_pfn_offset") > Signed-off-by: Jacopo Mondi > --- > arch/sh/mm/consistent.c | 15 ++++++++++++--- > 1 file changed, 12 insertions(+), 3 deletions(-) > > diff --git a/arch/sh/mm/consistent.c b/arch/sh/mm/consistent.c > index 8ce9869..b257155 100644 > --- a/arch/sh/mm/consistent.c > +++ b/arch/sh/mm/consistent.c [...] > @@ -69,9 +73,14 @@ void dma_generic_free_coherent(struct device *dev, size_t size, > unsigned long attrs) > { > int order = get_order(size); > - unsigned long pfn = (dma_handle >> PAGE_SHIFT) + dev->dma_pfn_offset; > + unsigned long pfn = (dma_handle >> PAGE_SHIFT); Parens no longer needed... [...] MBR, Sergei