Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp148497imm; Tue, 5 Jun 2018 16:55:19 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIc2cueq9L+VasBhjHLB5KFVCHT3d1yQgX46ParjdN1CzaVviwRjkppSA87u0v8mUTmmzgf X-Received: by 2002:a17:902:2c01:: with SMTP id m1-v6mr693016plb.347.1528242919382; Tue, 05 Jun 2018 16:55:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528242919; cv=none; d=google.com; s=arc-20160816; b=IPAcgdAYqExVWT+zKFAZCN1UDNM3u9NQmLc+0Q97nFU1o45Uo81UvosOCM6EKQcVwX 6p6h7LXHheXhIQlhZSkBboVDbdbV54X/jJKY1grPrHXywmqitmG0CcAIM7xRkDQ+yPqw 3eLqE/py8s88F0pe3m5xuhG748oiXJ5zU9/viWMPVnb/tiICGHRGZ5pWkjfxYL94u7Sj 5czHiOt1ER3syL3JyNDttbxkeQVPdWuEXgrQ6Iss/7DBaoRjVbYzD5TRgSr/bIjESHBo QAnEoEpm68+REGLby63Q/doDw2tjV16jukULebNaHm8BtEwWIe3JaS1/Dy4keEYCUXOy QQjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=WwM2tPk08oLNHv+pym/R0PpIvV7WRwFfO9yPSn13JHc=; b=rlZmlsrwd7XYVifunjZEZWYhGl+/lQ/bPw4AHmZVL24CfhwhuKIR+OwxGTjy1xpaEP FkntKNfqjf5CSm6aVeTABNHHo07+5zXUcwU0hd5SREWUyvaRXk8Y39UuGKd7/owWBnS0 6eTB9vRqn98YsBEL7cH9kl9p7mn7ZZW59B/K18veorw6Usv2E4abbiZDng5ms7y1eh4h 1L5Vuu6N5scaaKJdZG4ArzSSQB1w6x4V+zzYQcBRwChOImK7/JU+ENTked+zvmZpPkPH +Z9ze9BByvvTQuvmZN6y9+O0w/oFLAYVYRYfkS+aGrBKvblLYwh8I+fHG+hejSdHWC4e 02cQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XOqx3wAm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 184-v6si18026660pgd.343.2018.06.05.16.55.04; Tue, 05 Jun 2018 16:55:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XOqx3wAm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932196AbeFEXxX (ORCPT + 99 others); Tue, 5 Jun 2018 19:53:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:58494 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932103AbeFEXxT (ORCPT ); Tue, 5 Jun 2018 19:53:19 -0400 Received: from localhost (unknown [69.71.5.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C66382075B; Tue, 5 Jun 2018 23:53:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1528242799; bh=rPDsLH82gdcAuBg5/HwTVG6/0ZnEGebYebigiOVAj6w=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=XOqx3wAm6teo6F2u22v8+v554xmoPlqrx49ka1IN1uiufuuoP5C2NGaM2YV3pYLz4 qRvc/8/3WjFZ2yjOK7XWg6IS4vgN0CJEp82V2NRhabDTQvWsWRQrKChNre/wDXTFIA jVHKagEIkBKrDqU4Fn9TG+c1k4RXWwXO6CbANXdg= Date: Tue, 5 Jun 2018 18:53:03 -0500 From: Bjorn Helgaas To: Yisheng Xie Cc: bhelgaas@google.com, rjw@rjwysocki.net, lenb@kernel.org, guohanjun@huawei.com, jcm@redhat.com, toshi.kani@hpe.com, tanxiaojun@huawei.com, wangzhou1@hisilicon.com, linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 1/2] PCI: Avoid panic when PCI IO resource's size is not page aligned Message-ID: <20180605235303.GE226399@bhelgaas-glaptop.roam.corp.google.com> References: <1527596299-57567-1-git-send-email-xieyisheng1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1527596299-57567-1-git-send-email-xieyisheng1@huawei.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 29, 2018 at 08:18:18PM +0800, Yisheng Xie wrote: > Zhou reported a bug on Hisilicon arm64 D06 platform with 64KB page size: > > [ 2.470908] kernel BUG at lib/ioremap.c:72! > [ 2.475079] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP > [ 2.480551] Modules linked in: > [ 2.483594] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.16.0-rc7-00062-g0b41260-dirty #23 > [ 2.491756] Hardware name: Huawei D06/D06, BIOS Hisilicon D06 UEFI Nemo 2.0 RC0 - B120 03/23/2018 > [ 2.500614] pstate: 80c00009 (Nzcv daif +PAN +UAO) > [ 2.505395] pc : ioremap_page_range+0x268/0x36c > [ 2.509912] lr : pci_remap_iospace+0xe4/0x100 > [...] > [ 2.603733] Call trace: > [ 2.606168] ioremap_page_range+0x268/0x36c > [ 2.610337] pci_remap_iospace+0xe4/0x100 > [ 2.614334] acpi_pci_probe_root_resources+0x1d4/0x214 > [ 2.619460] pci_acpi_root_prepare_resources+0x18/0xa8 > [ 2.624585] acpi_pci_root_create+0x98/0x214 > [ 2.628843] pci_acpi_scan_root+0x124/0x20c > [ 2.633013] acpi_pci_root_add+0x224/0x494 > [ 2.637096] acpi_bus_attach+0xf8/0x200 > [ 2.640918] acpi_bus_attach+0x98/0x200 > [ 2.644740] acpi_bus_attach+0x98/0x200 > [ 2.648562] acpi_bus_scan+0x48/0x9c > [ 2.652125] acpi_scan_init+0x104/0x268 > [ 2.655948] acpi_init+0x308/0x374 > [ 2.659337] do_one_initcall+0x48/0x14c > [ 2.663160] kernel_init_freeable+0x19c/0x250 > [ 2.667504] kernel_init+0x10/0x100 > [ 2.670979] ret_from_fork+0x10/0x18 > > The cause is the size of PCI IO resource is 32KB, which is 4K aligned but > not 64KB aligned, however, ioremap_page_range() request the range as page > aligned or it will trigger a BUG_ON() on ioremap_pte_range() it calls, as > ioremap_pte_range increase the addr by PAGE_SIZE, which makes addr != end > until trigger BUG_ON, if its incoming end is not page aligned. More detail > trace is as following: > > ioremap_page_range > -> ioremap_p4d_range > -> ioremap_p4d_range > -> ioremap_pud_range > -> ioremap_pmd_range > -> ioremap_pte_range > > This patch avoid panic by return -EINVAL if vaddr or resource size is not > page aligned. > > Reported-by: Zhou Wang > Tested-by: Xiaojun Tan > Signed-off-by: Yisheng Xie > --- > v3: > - pci_remap_iospace() sanitize its arguments instead - per Rafael > > v2: > - Let the caller of ioremap_page_range() align the request by PAGE_SIZE - per Toshi > > drivers/pci/pci.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c > index dbfe7c4..0eb0381 100644 > --- a/drivers/pci/pci.c > +++ b/drivers/pci/pci.c > @@ -3544,6 +3544,9 @@ int pci_remap_iospace(const struct resource *res, phys_addr_t phys_addr) > if (res->end > IO_SPACE_LIMIT) > return -EINVAL; > > + if (!PAGE_ALIGNED(vaddr) || !PAGE_ALIGNED(resource_size(res))) > + return -EINVAL; Most other callers of ioremap_page_range() are in the ioremap() path, and they align phys_addr themselves. In some cases that results in a mapping that covers more than necessary. For instance, see the function comment at the x86 version of __ioremap_caller(). Is there any reason we couldn't similarly align vaddr and phys_addr here? The acpi_pci_probe_root_resources() path you mention above basically ignores the errors you're returning. Your patches will avoid the panic, which is an improvement, but I/O port space will not work, and I don't see anything that gives the user a hint about why not. If we could align vaddr and phys_addr (and possibly map more than necessary), I/O port space would still work. > return ioremap_page_range(vaddr, vaddr + resource_size(res), phys_addr, > pgprot_device(PAGE_KERNEL)); > #else > -- > 1.7.12.4 > > -- > To unsubscribe from this list: send the line "unsubscribe linux-acpi" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html