Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp452197imm; Mon, 2 Jul 2018 14:51:17 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc0wFym3Wp+n6akb5uKP1FVElm3vmnC/NJs7g5q8Z+z4sgT+uKU1bc0KsA9D02roFNDq2Eu X-Received: by 2002:a62:c991:: with SMTP id l17-v6mr14189861pfk.10.1530568277816; Mon, 02 Jul 2018 14:51:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530568277; cv=none; d=google.com; s=arc-20160816; b=X405eKsPsqxtwOSPZCz0/8Jxwe80UNJ0VxO/ZpcT8f+aELiz2J9oFwsFKlO7VvKAI6 R/6hp2I4UiPU0F+ysDwdpVRWaijnXSvRQ0iO4eun3LrB198HgfrLyxfpqIWnxhVnCvBi o7ENDfA03LSHpcqIFDefnajmEVCsj0Kd7kMuvh+GBkTPcxqOST9I5wt0xggBcvwOPFAQ N/po6hWpuprADVdNA3l9e+msvj08Kw7+LBuKYWzzyP5sOAuDwCw9VR5MSATcZubX9u3O IHJza6jmJcgen64jHqKNiylr+HDJYOFo69fAVNUOsoV5WbWT12l4MWxUf0b6I4RG37Vn IzOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=cNtzpMnfBRjdhczbeJw43TOZUK9hYvRZt+mnAsZA7Fw=; b=k/GultPkQOKuvZmm+PHpRYTu4XXxd8obhvzvW2gVVAZoOgg2JgZtLrat9h11N0/vVO vahExPPSz3DnjWdJpGsjzgcXTEngJT/TawlgIIYRkHpnmLZFlP3jXSlWADOBPw7rUPIc Auf5SXHmrLVaJrVVvKf20W1cigiO1v3P4ldZx830MXIZL2Fah8WVADc65x0BWQdlcR3P sergfsXXdCfkfyTdm3sUtuwjGehpXfnr/BY/5UGLjYtInQ4Qj7NwWHjbUb/jS+RYEDuQ OB8iB8lZAPbpSzEFyg1mE8vCws8i1J9XDXwVnOxSTMbAuisXNJkpXojjuVwXogZhrZ++ y+fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="e+U/q/sk"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n5-v6si10740600pgq.167.2018.07.02.14.51.03; Mon, 02 Jul 2018 14:51:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="e+U/q/sk"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932219AbeGBVtD (ORCPT + 99 others); Mon, 2 Jul 2018 17:49:03 -0400 Received: from mail-vk0-f67.google.com ([209.85.213.67]:46124 "EHLO mail-vk0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932178AbeGBVtB (ORCPT ); Mon, 2 Jul 2018 17:49:01 -0400 Received: by mail-vk0-f67.google.com with SMTP id b14-v6so4338946vke.13 for ; Mon, 02 Jul 2018 14:49:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cNtzpMnfBRjdhczbeJw43TOZUK9hYvRZt+mnAsZA7Fw=; b=e+U/q/skESd3rLJ6Gowv4C3tnribQJCJh3MJyJwzxQVHzx3Lia9a0kaHcag0xD2JFa sqkBGZ2iZvazMn8P+quz0e1PIDb01IHQNDZ3qftS8Qse0+nMDMWaYZIQjdiLkSlLsH3x QEn8FjKDOXocWtUUuUEz4dBQggCDXhWaU0eRQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cNtzpMnfBRjdhczbeJw43TOZUK9hYvRZt+mnAsZA7Fw=; b=SCwgwjp71VX6ZC2dvwkRU5foQxjdS35fx9SL9w3t/nkox1xkZkhDP+PxgGRF4cca70 3trM3akW0cvOtqgXyrADkXLeb5w8Eb95HJdbey80nFqYtYTZ8j0/vIiARgFuB67Pmf2k 9ehDxNYptfTS2oaaUbmDX72GCSlki3xrKYkt7XTJYz4z3XBY8Iaxu5XqFSyc5yVlrRV2 Q2sEdmNySIRZfG3wyDcWkvV6W2B+2geIGckeIyGvOPgM2ZUZaAOjYYbwYriIoxN4NJ6z TDyCu5ZZ2WlK9MXXIiow8APXi5gkSZjBu4dfGOvRvz6JzaEqfm0wKd0DQsl85CmN65oF ajvA== X-Gm-Message-State: APt69E21vRY9wXFd3TCNQ5HUA49Mbg458oYgZQlmasRr/sk6WqQnH1HZ WZZEfarAHBL8H6mXl4rO/8jB7IMvC49N08DcKpd4TQ== X-Received: by 2002:a1f:ee85:: with SMTP id m127-v6mr15855233vkh.46.1530568140137; Mon, 02 Jul 2018 14:49:00 -0700 (PDT) MIME-Version: 1.0 References: <20180413161601.109431-1-djkurtz@chromium.org> <6e46904a-d721-d583-8ab5-82cb07df7934@amd.com> In-Reply-To: <6e46904a-d721-d583-8ab5-82cb07df7934@amd.com> From: Daniel Kurtz Date: Mon, 2 Jul 2018 15:48:48 -0600 Message-ID: Subject: Re: [PATCH] drm/amdgpu/acp: Fix slab-out-of-bounds in mfd_add_device in acp_hw_init To: alexander.deucher@amd.com Cc: christian.koenig@amd.com, Akshu Agrawal , David Airlie , Vijendar.Mukunda@amd.com, jclinton@chromium.org, amd-gfx@lists.freedesktop.org, dri-devel , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Alex, On Sun, Apr 15, 2018 at 9:48 PM Agrawal, Akshu wrote: > > > > On 4/13/2018 9:45 PM, Daniel Kurtz wrote: > > Commit 51f7415039d4 ("drm/amd/amdgpu: creating two I2S instances for > > stoney/cz") added support for the "BT_I2S" ACP i2s channel. As part of > > this change, one additional acp resource was added, but the "num_resource" > > count was accidentally incremented by 2. > > > > This incorrect count eventually causes mfd_add_device() to try to access > > an invalid memory address (the location of non-existent resource 5. > > > > This fault was detected by running a KASAN enabled kernel, which produced > > the following splat at boot: > > > > [ 6.612987] ================================================================== > > [ 6.613509] BUG: KASAN: slab-out-of-bounds in mfd_add_device+0x4bc/0x7a7 > > [ 6.613509] Read of size 8 at addr ffff880107d4dc58 by task swapper/0/1 > > [ 6.613509] > > [ 6.613509] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.14.33 #349 > > [ 6.613509] Hardware name: Google Grunt/Grunt, BIOS Google_Grunt.10543.0.2018_04_03_1812 04/02/2018 > > [ 6.613509] Call Trace: > > [ 6.613509] dump_stack+0x4d/0x63 > > [ 6.613509] print_address_description+0x80/0x2d6 > > [ 6.613509] ? mfd_add_device+0x4bc/0x7a7 > > [ 6.613509] kasan_report+0x255/0x295 > > [ 6.613509] mfd_add_device+0x4bc/0x7a7 > > [ 6.613509] ? kasan_kmalloc+0x99/0xa8 > > [ 6.613509] ? mfd_add_devices+0x58/0xe4 > > [ 6.613509] ? __kmalloc+0x154/0x178 > > [ 6.613509] mfd_add_devices+0xa5/0xe4 > > [ 6.613509] acp_hw_init+0x92e/0xc4a > > [ 6.613509] amdgpu_device_init+0x1dfb/0x22a2 > > [ 6.613509] ? kmalloc_order+0x53/0x5d > > [ 6.613509] ? kmalloc_order_trace+0x23/0xb3 > > [ 6.613509] amdgpu_driver_load_kms+0xce/0x267 > > [ 6.613509] drm_dev_register+0x169/0x2fb > > [ 6.613509] amdgpu_pci_probe+0x217/0x242 > > [ 6.613509] pci_device_probe+0x101/0x18e > > [ 6.613509] driver_probe_device+0x1dd/0x419 > > [ 6.613509] ? ___might_sleep+0x80/0x1b6 > > [ 6.613509] __driver_attach+0x9f/0xc9 > > [ 6.613509] ? driver_probe_device+0x419/0x419 > > [ 6.613509] bus_for_each_dev+0xbc/0xe1 > > [ 6.613509] bus_add_driver+0x189/0x2c0 > > [ 6.613509] driver_register+0x108/0x156 > > [ 6.613509] ? ttm_init+0x67/0x67 > > [ 6.613509] do_one_initcall+0xb2/0x161 > > [ 6.613509] kernel_init_freeable+0x25a/0x308 > > [ 6.613509] ? rest_init+0xcc/0xcc > > [ 6.613509] kernel_init+0x11/0x10d > > [ 6.613509] ? rest_init+0xcc/0xcc > > [ 6.613509] ret_from_fork+0x22/0x40 > > [ 6.613509] > > [ 6.613509] Allocated by task 1: > > [ 6.613509] save_stack+0x46/0xce > > [ 6.613509] kasan_kmalloc+0x99/0xa8 > > [ 6.613509] kmem_cache_alloc_trace+0x11a/0x13e > > [ 6.613509] acp_hw_init+0x210/0xc4a > > [ 6.613509] amdgpu_device_init+0x1dfb/0x22a2 > > [ 6.613509] amdgpu_driver_load_kms+0xce/0x267 > > [ 6.613509] drm_dev_register+0x169/0x2fb > > [ 6.613509] amdgpu_pci_probe+0x217/0x242 > > [ 6.613509] pci_device_probe+0x101/0x18e > > [ 6.613509] driver_probe_device+0x1dd/0x419 > > [ 6.613509] __driver_attach+0x9f/0xc9 > > [ 6.613509] bus_for_each_dev+0xbc/0xe1 > > [ 6.613509] bus_add_driver+0x189/0x2c0 > > [ 6.613509] driver_register+0x108/0x156 > > [ 6.613509] do_one_initcall+0xb2/0x161 > > [ 6.613509] kernel_init_freeable+0x25a/0x308 > > [ 6.613509] kernel_init+0x11/0x10d > > [ 6.613509] ret_from_fork+0x22/0x40 > > [ 6.613509] > > [ 6.613509] Freed by task 0: > > [ 6.613509] (stack is not available) > > [ 6.613509] > > [ 6.613509] The buggy address belongs to the object at ffff880107d4db08 > > [ 6.613509] which belongs to the cache kmalloc-512 of size 512 > > [ 6.613509] The buggy address is located 336 bytes inside of > > [ 6.613509] 512-byte region [ffff880107d4db08, ffff880107d4dd08) > > [ 6.613509] The buggy address belongs to the page: > > [ 6.613509] page:ffffea00041f5300 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 > > [ 6.613509] flags: 0x8000000000008100(slab|head) > > [ 6.613509] raw: 8000000000008100 0000000000000000 0000000000000000 0000000100120012 > > [ 6.613509] raw: ffffea0004208520 ffff88010b001680 ffff88010b002cc0 0000000000000000 > > [ 6.613509] page dumped because: kasan: bad access detected > > [ 6.613509] > > [ 6.613509] Memory state around the buggy address: > > [ 6.613509] ffff880107d4db00: fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 6.613509] ffff880107d4db80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 6.613509] >ffff880107d4dc00: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc > > [ 6.613509] ^ > > [ 6.613509] ffff880107d4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 6.613509] ffff880107d4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 6.613509] ================================================================== > > > > Fixes: 51f7415039d4 ("drm/amd/amdgpu: creating two I2S instances for stoney/cz") > > Signed-off-by: Daniel Kurtz > Acked-by: Akshu Agrawal Was this patch ever picked up? I can't find it in agd5f/linux. Thanks, -Dan