Received: by 10.192.165.156 with SMTP id m28csp1027456imm; Wed, 18 Apr 2018 02:44:20 -0700 (PDT) X-Google-Smtp-Source: AIpwx49DKmL6qwpoUGpctGZ8zaKNuTGOI/t/aFfRcGQYMW3x+Jcul4HOmD4xdJSfSF3mnxugdNFI X-Received: by 10.99.95.79 with SMTP id t76mr1193233pgb.108.1524044660600; Wed, 18 Apr 2018 02:44:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524044660; cv=none; d=google.com; s=arc-20160816; b=oHyaj8W1mU/eng0EgBoUPhd3QfaMS79VrKvUmp5Q5AWWfxggNV55xWZjqtXQHYN+Jf CI3crcDbAnZ/jmGqA4wYunJ+Eu0X01RFuHBMoPp1g1eyrBUPXJ5V8q5qaS+lCZhirG1a G0VGXYJ/NDOLkjWKgez4BqPmBL14lE1C5oU0qPOGpzHgTx8KvpIpAf+4aCKY87jCCu1r GY0YGONINmvmBZI9uBwhhRvOsCpF2ZcIHYRddbjX/3FVCuvUg4l6hnCoP0YauQ1LQ+XW T1rLjeABkW/TOdoTbHIKnJhgLipEzGjPE5Ls0oXWeX4U6A20dEl28S7OhPngkUubIVqw dj4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=WoJex8rPTB0/5DA6iqa4Ne0jPYTl6dzCwvJtgoGep+U=; b=TIe5uEYXnJMjRluDBZZdjyNBsJwt3A8nF7+C556I6F2sdJkI4sEO5V4bopHvxdgMI6 LqHK6jfrTInfYesln3/JB1lA/KfjSCWsTrmShCBAHGtirIVGpjF9fndmJY/oeFdpLWRF ReA/tUV8zwubFMDirj2UH+F4QKCaPSHM/8XDl8Y9IrRA8r0yGEE+jRBzDzkTwhHUowtS ly9ROFNATzL6eowINYhOkF9Wygnv2fLV+KUOKrq8YMuLXycNaHYi66aDFGq0q8WVXwvg hy9zsELONhWurpiSTd6LeNMbXtzU4AizKN2nQSGqs91T6gvYtE6tfWBtsem21DjjxqR9 0uoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z2si712199pgu.655.2018.04.18.02.44.05; Wed, 18 Apr 2018 02:44:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752162AbeDRJnA (ORCPT + 99 others); Wed, 18 Apr 2018 05:43:00 -0400 Received: from relay7-d.mail.gandi.net ([217.70.183.200]:58903 "EHLO relay7-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751305AbeDRJm7 (ORCPT ); Wed, 18 Apr 2018 05:42:59 -0400 X-Originating-IP: 2.224.242.101 Received: from w540.lan (2-224-242-101.ip172.fastwebnet.it [2.224.242.101]) (Authenticated sender: jacopo@jmondi.org) by relay7-d.mail.gandi.net (Postfix) with ESMTPSA id DF85A2001C; Wed, 18 Apr 2018 11:42:52 +0200 (CEST) From: Jacopo Mondi To: ysato@users.sourceforge.jp, dalias@libc.org, thomas.petazzoni@free-electrons.com, robin.murphy@arm.com Cc: Jacopo Mondi , geert@linux-m68k.org, sergei.shtylyov@cogentembedded.com, linux-renesas-soc@vger.kernel.org, linux-sh@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3] sh: mm: Fix unprotected access to struct device Date: Wed, 18 Apr 2018 11:42:35 +0200 Message-Id: <1524044555-20610-1-git-send-email-jacopo+renesas@jmondi.org> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With commit ce88313069c36eef80f21fd7 ("arch/sh: make the DMA mapping operations observe dev->dma_pfn_offset") the generic DMA allocation function on which the SH 'dma_alloc_coherent()' function relies on, accesses the 'dma_pfn_offset' field of struct device. Unfortunately the 'dma_generic_alloc_coherent()' function is called from several places with a NULL struct device argument, halting the CPU during the boot process. This patch fixes the issue by protecting access to dev->dma_pfn_offset, with a trivial check for validity. It also passes a valid 'struct device' in the 'platform_resource_setup_memory()' function which is the main user of 'dma_alloc_coherent()', and inserts a WARN_ON() check to remind to future (and existing) bogus users of this function to provide a valid 'struct device' whenever possible. Fixes: ce88313069c36eef80f21fd7 ("arch/sh: make the DMA mapping operations observe dev->dma_pfn_offset") Signed-off-by: Jacopo Mondi Reviewed-by: Geert Uytterhoeven Reviewed-by: Thomas Petazzoni --- v2 -> v3: - remove (now) useless parenthesis around pfn assignement as suggested by Sergei - Add changelog to the patch, which I forgot in v2 v1 -> v2: - Move WARN_ON() closer to dev validity check as suggested by Geert --- arch/sh/mm/consistent.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/arch/sh/mm/consistent.c b/arch/sh/mm/consistent.c index 8ce9869..f1b4469 100644 --- a/arch/sh/mm/consistent.c +++ b/arch/sh/mm/consistent.c @@ -59,7 +59,9 @@ void *dma_generic_alloc_coherent(struct device *dev, size_t size, split_page(pfn_to_page(virt_to_phys(ret) >> PAGE_SHIFT), order); - *dma_handle = virt_to_phys(ret) - PFN_PHYS(dev->dma_pfn_offset); + *dma_handle = virt_to_phys(ret); + if (!WARN_ON(!dev)) + *dma_handle -= PFN_PHYS(dev->dma_pfn_offset); return ret_nocache; } @@ -69,9 +71,12 @@ void dma_generic_free_coherent(struct device *dev, size_t size, unsigned long attrs) { int order = get_order(size); - unsigned long pfn = (dma_handle >> PAGE_SHIFT) + dev->dma_pfn_offset; + unsigned long pfn = dma_handle >> PAGE_SHIFT; int k; + if (!WARN_ON(!dev)) + pfn += dev->dma_pfn_offset; + for (k = 0; k < (1 << order); k++) __free_pages(pfn_to_page(pfn + k), 0); @@ -143,7 +148,7 @@ int __init platform_resource_setup_memory(struct platform_device *pdev, if (!memsize) return 0; - buf = dma_alloc_coherent(NULL, memsize, &dma_handle, GFP_KERNEL); + buf = dma_alloc_coherent(&pdev->dev, memsize, &dma_handle, GFP_KERNEL); if (!buf) { pr_warning("%s: unable to allocate memory\n", name); return -ENOMEM; -- 2.7.4