Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7355147yba; Thu, 2 May 2019 08:31:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqyomgmjh8wnm54D906FREhKzLiW0jYfGSrTw9YM+7uraq1JOIvNE0/85GrpdBvGe96rJ0ah X-Received: by 2002:a17:902:8b83:: with SMTP id ay3mr4368001plb.187.1556811062978; Thu, 02 May 2019 08:31:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556811062; cv=none; d=google.com; s=arc-20160816; b=A3mkvX4J9bWET/mahxSC+IfXUJRXADRbYksNtIJXTb+JZibZxYRqfidbD8585ECe7I xQNnzg56KOL2G0aj/VXQul6eoaHeAiRhk1P3V94MEGDVJlY8BBKrap1Mq3qe/WY/bG5v xH1lUpuzla9CtT3UT2293EDJKkWbyCehjBiuHpdAseM50SbPV7Qv9aTpYIUkdiOK0dQn wwv1oToaJVTdaTR1yWsJ5x6HR2Na7ZkIRAfZDFjb02ff6OD3P5wXD4p/65Co5r0yZJ2V jdv1/NykwSytgR2XwbnwtT9R0U8m70kYDrk+QxYDAWqpZCX4VDo8TWoCqC7sRwjyozyQ 8Y3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OEAA3haYPKDIZGAuKaf4wBey+GV2f3OPEuwJzBiEKGI=; b=cHGE4NnCowedeTM95SKszQtnRILrvNsThep7BmVTB65rEg6w7eLCpwUsFilW5sld3a 85n6FnOvS6FmOXpXAJ7fEwzhDbLnwfFPFrfqNPblvTg5ofSAeQy4MbMcilvhnp50pyu4 W79T1+zEWBqT5ULfFrbzIY2Pk35qSHSf3Fer+C1mtB72hXqfQJ7YVcn1kD2CtQ90vBfT n73pu5SjuarnE1jxDeb/PTQQ58VN3Ugg/+kpm5VIj6tccE8VuHycCcUlVNqn+/8wJ4vD BxRGZiNdk4EuP2TEKaJHfovVKrDyrWJoVt7DU5hSEXC6zVUnGSJ72x4WHmT5k6LiDqCX N1jA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XKTlw9Jp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z21si15666732plo.238.2019.05.02.08.30.47; Thu, 02 May 2019 08:31:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XKTlw9Jp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728121AbfEBP2C (ORCPT + 99 others); Thu, 2 May 2019 11:28:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:44978 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727316AbfEBP16 (ORCPT ); Thu, 2 May 2019 11:27:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A96020449; Thu, 2 May 2019 15:27:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810877; bh=oa14tgMjU4N5xaPgdT6hJvgc7xxgECrRjtP6VdmlO+c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XKTlw9JpGHcJMkOCMn/0LiTNOm22rcVr2T5g7mQHwNpcdQZnGGCqh4uQF1NMdrfqo od9DVrSt/JLgMhbvzMnF5hijytixl+c4qMn9olcjHxvt8Q2hyoztBCMWv6yzV1RIUJ mlBLmOSla7ALLWXx0vGqFZ2IXeU+WWPXaLuxcM40= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, raymond pang , Jens Axboe , "Sasha Levin (Microsoft)" Subject: [PATCH 4.19 64/72] libata: fix using DMA buffers on stack Date: Thu, 2 May 2019 17:21:26 +0200 Message-Id: <20190502143338.410258932@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190502143333.437607839@linuxfoundation.org> References: <20190502143333.437607839@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit dd08a8d9a66de4b54575c294a92630299f7e0fe7 ] When CONFIG_VMAP_STACK=y, __pa() returns incorrect physical address for a stack virtual address. Stack DMA buffers must be avoided. Signed-off-by: raymond pang Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin (Microsoft) --- drivers/ata/libata-zpodd.c | 34 ++++++++++++++++++++++++---------- 1 file changed, 24 insertions(+), 10 deletions(-) diff --git a/drivers/ata/libata-zpodd.c b/drivers/ata/libata-zpodd.c index b3ed8f9953a8..173e6f2dd9af 100644 --- a/drivers/ata/libata-zpodd.c +++ b/drivers/ata/libata-zpodd.c @@ -52,38 +52,52 @@ static int eject_tray(struct ata_device *dev) /* Per the spec, only slot type and drawer type ODD can be supported */ static enum odd_mech_type zpodd_get_mech_type(struct ata_device *dev) { - char buf[16]; + char *buf; unsigned int ret; - struct rm_feature_desc *desc = (void *)(buf + 8); + struct rm_feature_desc *desc; struct ata_taskfile tf; static const char cdb[] = { GPCMD_GET_CONFIGURATION, 2, /* only 1 feature descriptor requested */ 0, 3, /* 3, removable medium feature */ 0, 0, 0,/* reserved */ - 0, sizeof(buf), + 0, 16, 0, 0, 0, }; + buf = kzalloc(16, GFP_KERNEL); + if (!buf) + return ODD_MECH_TYPE_UNSUPPORTED; + desc = (void *)(buf + 8); + ata_tf_init(dev, &tf); tf.flags = ATA_TFLAG_ISADDR | ATA_TFLAG_DEVICE; tf.command = ATA_CMD_PACKET; tf.protocol = ATAPI_PROT_PIO; - tf.lbam = sizeof(buf); + tf.lbam = 16; ret = ata_exec_internal(dev, &tf, cdb, DMA_FROM_DEVICE, - buf, sizeof(buf), 0); - if (ret) + buf, 16, 0); + if (ret) { + kfree(buf); return ODD_MECH_TYPE_UNSUPPORTED; + } - if (be16_to_cpu(desc->feature_code) != 3) + if (be16_to_cpu(desc->feature_code) != 3) { + kfree(buf); return ODD_MECH_TYPE_UNSUPPORTED; + } - if (desc->mech_type == 0 && desc->load == 0 && desc->eject == 1) + if (desc->mech_type == 0 && desc->load == 0 && desc->eject == 1) { + kfree(buf); return ODD_MECH_TYPE_SLOT; - else if (desc->mech_type == 1 && desc->load == 0 && desc->eject == 1) + } else if (desc->mech_type == 1 && desc->load == 0 && + desc->eject == 1) { + kfree(buf); return ODD_MECH_TYPE_DRAWER; - else + } else { + kfree(buf); return ODD_MECH_TYPE_UNSUPPORTED; + } } /* Test if ODD is zero power ready by sense code */ -- 2.19.1