Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5732317imm; Tue, 16 Oct 2018 15:23:25 -0700 (PDT) X-Google-Smtp-Source: ACcGV62XwPk48zJ4ZVSRA161Vy8uxL8f+ARfh9uChCPTJ5goNSlBqutULjJj80xwgygLFEW5fj88 X-Received: by 2002:a63:4658:: with SMTP id v24-v6mr22366129pgk.425.1539728604990; Tue, 16 Oct 2018 15:23:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539728604; cv=none; d=google.com; s=arc-20160816; b=oMPWcc+J1hBw6r3zHbiXO6WXHGKrOSKXqsL+Nu6l8WaPUIIxGWz07F2GRqabQPtecK VDpVnDm9skV5mh9CzCLVfLakHqWqbtva2SvkFuDLrDFdOp01P6+7EfBHg5kPjmOLV6d+ PG5Br3BnH2Kd0mca7hF6Mw2jNZPrdx7//D1FtqTkocyCwlPZfKGF61IkzsIRhl+AbO4J 8KnCLzRwIzIX5D7lNiB/zvE+YuWi7zrPGO0Sr6NZtPfJaB0w32Gt2dbqpxaq1TsN61dK FTVC9ZYy8tG6Qb9Vxtnu2OREeqAQ7X5u82Ed+ocItxAuWVqd/lQtPVnVnOXpkPc/V8vS zfdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:to :subject:from:dkim-signature; bh=QOxTch4xnqdFjd71gcKCv4hUS92Qfdh5hgfBefmZCuw=; b=WP0AF19pcI5n8mDxhCMJW5lgde0DBOCJHq0AqDVLiX4B++vXsmRT1qbzH7v9tBXB23 068oZPDFfVdDMkBeHloJk4AgbUveP4p/0ftuCuPZ39OvEPmd1lvhDH1X7SXTWpem7gCg bCYT1nE8DYH3zHTbxxvXE5TeIDVTTpsZBBAuzPDr5nSovHP/RoXVPyKU+jxm1pmULEkY uWQ0QprNjoxHd8EzrSlES9pYSHaNWV8t1ipMlc2gH1kbRkMiR9HpfPCtvL8S787pxVIC gf+VFXiqXXS5BoJ7myj13GkfPW3PgmZJg/8aDA9Q4TQbqQjIyBzKcoSutmClYR3GorYn hMNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=TsPdStxy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u10-v6si15260075plq.1.2018.10.16.15.23.09; Tue, 16 Oct 2018 15:23:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=TsPdStxy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727270AbeJQGNy (ORCPT + 99 others); Wed, 17 Oct 2018 02:13:54 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:35722 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726048AbeJQGNx (ORCPT ); Wed, 17 Oct 2018 02:13:53 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w9GMEcGr190815; Tue, 16 Oct 2018 22:21:19 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : subject : to : cc : message-id : date : mime-version : content-type : content-transfer-encoding; s=corp-2018-07-02; bh=QOxTch4xnqdFjd71gcKCv4hUS92Qfdh5hgfBefmZCuw=; b=TsPdStxywo8OHLQjohwYvRFALMP8PfblDeg+hBYmre7iztmqkAGhn7WNTSBanJKoDWky anAqKLZf38rkDAC7X9/OvUdkWjJX/YBnu7t6VRLGAOh6Xl6bvvR2/vHjspp+oybIeERT 1uSHULGiW0SxX+Sy5dGfDcUNT/I9zOr/jdMt19lWWE8TKJcKRk1v9IApnrzkUmEA74VK hxPEyDPBW8xlWg5K54gymcIq6kf0ZJn7myLazJsNxC+0BHquRM6tR62Akc3ctf4dpR+j G9sOPHzZPVbepRJ9rEK7lSctwW6Lf3Jrly8hkUEuObBuUrRuv+IOX/Y3VWWmxK/kA35L bg== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp2120.oracle.com with ESMTP id 2n39brbfk0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 16 Oct 2018 22:21:18 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w9GMLIsc002180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 16 Oct 2018 22:21:18 GMT Received: from abhmp0001.oracle.com (abhmp0001.oracle.com [141.146.116.7]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w9GMLHlX016632; Tue, 16 Oct 2018 22:21:17 GMT Received: from [10.159.237.45] (/10.159.237.45) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 16 Oct 2018 15:21:17 -0700 From: Joe Jin Subject: [PATCH V2] xen-swiotlb: use actually allocated size on check physical continuous To: Konrad Rzeszutek Wilk , John Sobecki , "DONGLI.ZHANG" , konrad@kernel.org, Christoph Helwig Cc: "xen-devel@lists.xenproject.org" , "linux-kernel@vger.kernel.org" Message-ID: <0453c762-1f8b-079f-5fdf-548e90909318@oracle.com> Date: Tue, 16 Oct 2018 15:21:16 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9048 signatures=668706 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=2 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=922 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1810160186 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org xen_swiotlb_{alloc,free}_coherent() allocate/free memory by order, but passed required size to range_straddles_page_boundary(), when first pages are physical continuous, range_straddles_page_boundary() returned true, then did not exchanged memory with Xen, later on free memory, it tried to exchanged non-contiguous memory with Xen, then kernel panic. Signed-off-by: Joe Jin Cc: Konrad Rzeszutek Wilk Cc: Boris Ostrovsky Cc: Christoph Helwig Cc: Dongli Zhang Cc: John Sobecki --- drivers/xen/swiotlb-xen.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c index a6f9ba85dc4b..aa081f806728 100644 --- a/drivers/xen/swiotlb-xen.c +++ b/drivers/xen/swiotlb-xen.c @@ -303,6 +303,9 @@ xen_swiotlb_alloc_coherent(struct device *hwdev, size_t size, */ flags &= ~(__GFP_DMA | __GFP_HIGHMEM); + /* Convert the size to actually allocated. */ + size = 1UL << (order + XEN_PAGE_SHIFT); + /* On ARM this function returns an ioremap'ped virtual address for * which virt_to_phys doesn't return the corresponding physical * address. In fact on ARM virt_to_phys only works for kernel direct @@ -351,6 +354,9 @@ xen_swiotlb_free_coherent(struct device *hwdev, size_t size, void *vaddr, * physical address */ phys = xen_bus_to_phys(dev_addr); + /* Convert the size to actually allocated. */ + size = 1UL << (order + XEN_PAGE_SHIFT); + if (((dev_addr + size - 1 <= dma_mask)) || range_straddles_page_boundary(phys, size)) xen_destroy_contiguous_region(phys, order); -- 2.15.2 (Apple Git-101.1)