Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp933409ybl; Fri, 10 Jan 2020 09:08:21 -0800 (PST) X-Google-Smtp-Source: APXvYqxs/SIb+W1woi6DO0dQ2EXZqz2PbXLqKAYB2/s6yxDBJxTWPZuVAWbl/u6PFi3BCYhDdmXs X-Received: by 2002:a9d:7d85:: with SMTP id j5mr3495145otn.86.1578676101530; Fri, 10 Jan 2020 09:08:21 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1578676101; cv=pass; d=google.com; s=arc-20160816; b=j2TI2Y8i7Ca81MW44n1QpWT4PgMK6kNQY1UtFCFDpP2yw+RGrc1lEpCoUCpVQRzKk8 N0Csy52nu1vr85uZUmT0eSwTP8XMkkVQntOTsFceiwA94pq3k6mhTZ2wVgfeWmGcnaeA GAPbgWuseuKEjKjqgbZc/+cZ/c2IWxFhEQqix2oplSirNJjja1cdd4FjxcxeH0VNh7qj 6dx0ZJe1gLsMk6t32oYZblnpj0/q6V52CP9CpExk15AUxC16brVLhZmrZ9+XcpvX5bJw sb+G72r2xDBSXgZLR5kBp6Bc1aQSiZ/NHolwBP5LxYbfMzYuNHYMeinQhvzuhYQWJamA om3A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=5XCKWg3dcDR4KVwX+2iFNDusQvpM4sTBg4yhzaaVqvw=; b=p0XdNI6ymYsAuF4kkQbDzW3w1mx0fvi6nF8C+ZqdVbgVPZOJGnB/L+0odsWww3qazJ P/nDoRCSdvVwTe2F6/MxKkwuwaxDYofE68mAQqhHaFBqehLZJMG90Zp5lAj5L42gihIt vvi64J7NFMmeiUzW1tQjRz0gaE/IXQHZLYSoFxZLAzBuXMLXOzdSN2jxYiLGFy7lFB/N fFOd86vznWc6R4m9NXsBHEgGWmPlpDf8cVu+jDzW6WEDFZiqg0rWDtA3gc82nW1A5S/M yK8QJJlWcc4fgrxce/O7aHr8L8rSpQ2XJPMED4tdQ0oEC8DOPZeheTp9R2PyhpI7pMgV 5Rag== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@xilinx.onmicrosoft.com header.s=selector2-xilinx-onmicrosoft-com header.b=tXfzPTPZ; arc=pass (i=1 spf=pass spfdomain=xilinx.com dkim=pass dkdomain=xilinx.com dmarc=pass fromdomain=xilinx.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c26si1685438otf.288.2020.01.10.09.08.09; Fri, 10 Jan 2020 09:08:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@xilinx.onmicrosoft.com header.s=selector2-xilinx-onmicrosoft-com header.b=tXfzPTPZ; arc=pass (i=1 spf=pass spfdomain=xilinx.com dkim=pass dkdomain=xilinx.com dmarc=pass fromdomain=xilinx.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726698AbgAJRFu (ORCPT + 99 others); Fri, 10 Jan 2020 12:05:50 -0500 Received: from mail-mw2nam10on2072.outbound.protection.outlook.com ([40.107.94.72]:54667 "EHLO NAM10-MW2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726066AbgAJRFt (ORCPT ); Fri, 10 Jan 2020 12:05:49 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jgaJYFPaG9F0o8iPb1nlK7MqeGHnRmfKcxOPnIEzslE9auysZENmMhmK5bBRIYGMVX4GfOlCNp33KMA5zksMLazBXzUW24t5K2wdoPsLu4VFKlwQEbjvg2/GQGksDUPsiu1YVk4Rjd4cri3A3sCoT+AZIJA9ovRnbar3xwjudo8hpoTsISVEH8DPeCxqny4Xh8cf5MhoiPCr6rstL0JvMvxNYcM+SPHBXALXuJoJ90BTEjX3e3nmEBQXfjMj87cEewbHW0teJi19igXUDuT/+rIfINc/HcmJGCq1jbT55OTRsRTEJVqkS73wNlH7LAsV6JfrD4BKldjNvKvdT60OVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5XCKWg3dcDR4KVwX+2iFNDusQvpM4sTBg4yhzaaVqvw=; b=PRr5bPBucnvpN3Ttqc91xfjEZAggPTLtVCK5qNQf0Kl3OPbJpdcmmARfayQPrOaQDB4UC7sjsoUNMSpqqk13mlGzbYqWB/1FX58GYQ9aICU585xUsJ7WWulY5qT8T6uPVEziqAD7U7bcXS0AhBmjjpCnK7ppxigOI9tTi4qnS8H8yTuCscb4U4dzBu3t4rFjwTLVw4PsxN+uxwQQ7PRHKo+NiyB2xxs3OUa3OIfI40ug/gYiDRvzKGUsld04ztaAGDGHpeS1hhZySo4n6TR8Ozk8qzznjxvk9G2MJY89cc1WtiPH6mexGR+CFEOrRtMfOfr42bFV4H5DEpY2t887Ug== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=xilinx.com; dmarc=pass action=none header.from=xilinx.com; dkim=pass header.d=xilinx.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5XCKWg3dcDR4KVwX+2iFNDusQvpM4sTBg4yhzaaVqvw=; b=tXfzPTPZ8iwUNFBb2cQAxXpJQYDNJwmQpPN2GHVe0kY565ETg/iRpfiy1NirA3310Ga799IXlIAxndVfOoPf6gXEJikPQ+HJcSdTW/q7IsVJse4I0rv8BUhiR63F+ETfJhJspmMtFQnhaZ8DVBJ0OG0kjGIT7ptoqmgeUBYsvbo= Received: from CH2PR02MB7000.namprd02.prod.outlook.com (20.180.9.216) by CH2PR02MB6262.namprd02.prod.outlook.com (52.132.229.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.9; Fri, 10 Jan 2020 17:05:46 +0000 Received: from CH2PR02MB7000.namprd02.prod.outlook.com ([fe80::969:436f:b4b8:4899]) by CH2PR02MB7000.namprd02.prod.outlook.com ([fe80::969:436f:b4b8:4899%7]) with mapi id 15.20.2623.013; Fri, 10 Jan 2020 17:05:45 +0000 From: Radhey Shyam Pandey To: Andre Przywara CC: "David S . Miller" , Michal Simek , Robert Hancock , "netdev@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "linux-kernel@vger.kernel.org" Subject: RE: [PATCH 03/14] net: axienet: Fix DMA descriptor cleanup path Thread-Topic: [PATCH 03/14] net: axienet: Fix DMA descriptor cleanup path Thread-Index: AQHVx6y2ShwELFcgQk2RmkO2ceD3dafj/VgAgAAMtgCAABRgIA== Date: Fri, 10 Jan 2020 17:05:45 +0000 Message-ID: References: <20200110115415.75683-1-andre.przywara@arm.com> <20200110115415.75683-4-andre.przywara@arm.com> <20200110154328.6676215f@donnerap.cambridge.arm.com> In-Reply-To: <20200110154328.6676215f@donnerap.cambridge.arm.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=radheys@xilinx.com; x-originating-ip: [183.83.136.244] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 75330d87-fa9c-4a58-e887-08d795ef556c x-ms-traffictypediagnostic: CH2PR02MB6262:|CH2PR02MB6262: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-forefront-prvs: 02788FF38E x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(4636009)(39850400004)(346002)(376002)(396003)(366004)(136003)(43544003)(189003)(199004)(13464003)(7696005)(53546011)(33656002)(8936002)(54906003)(86362001)(186003)(26005)(52536014)(71200400001)(5660300002)(316002)(2906002)(76116006)(478600001)(9686003)(66476007)(66446008)(6506007)(66556008)(64756008)(6916009)(55016002)(66946007)(81156014)(4326008)(81166006)(8676002);DIR:OUT;SFP:1101;SCL:1;SRVR:CH2PR02MB6262;H:CH2PR02MB7000.namprd02.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: xilinx.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: xilinx.com X-MS-Exchange-CrossTenant-Network-Message-Id: 75330d87-fa9c-4a58-e887-08d795ef556c X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jan 2020 17:05:45.8321 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 657af505-d5df-48d0-8300-c31994686c5c X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Wp4d/hBbG1EXbJfSlgUlGbJNl52ELWGC35CTCMm7IbKYSc0PtcZ3kBbzRsq9spHiYUmO4Ip7fKrcioGDUZKDLw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR02MB6262 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > -----Original Message----- > From: Andre Przywara > Sent: Friday, January 10, 2020 9:13 PM > To: Radhey Shyam Pandey > Cc: David S . Miller ; Michal Simek > ; Robert Hancock ; > netdev@vger.kernel.org; linux-arm-kernel@lists.infradead.org; linux- > kernel@vger.kernel.org > Subject: Re: [PATCH 03/14] net: axienet: Fix DMA descriptor cleanup path >=20 > On Fri, 10 Jan 2020 15:14:46 +0000 > Radhey Shyam Pandey wrote: >=20 > Hi Radhey, >=20 > thanks for having a look! >=20 > > > -----Original Message----- > > > From: Andre Przywara > > > Sent: Friday, January 10, 2020 5:24 PM > > > To: David S . Miller ; Radhey Shyam Pandey > > > > > > Cc: Michal Simek ; Robert Hancock > > > ; netdev@vger.kernel.org; linux-arm- > > > kernel@lists.infradead.org; linux-kernel@vger.kernel.org > > > Subject: [PATCH 03/14] net: axienet: Fix DMA descriptor cleanup path > > > > > > When axienet_dma_bd_init() bails out during the initialisation proces= s, > > > it might do so with parts of the structure already allocated and > > > initialised, while other parts have not been touched yet. Before > > > returning in this case, we call axienet_dma_bd_release(), which does = not > > > take care of this corner case. > > > This is most obvious by the first loop happily dereferencing > > > lp->rx_bd_v, which we actually check to be non NULL *afterwards*. > > > > > > Make sure we only unmap or free already allocated structures, by: > > > - directly returning with -ENOMEM if nothing has been allocated at al= l > > > - checking for lp->rx_bd_v to be non-NULL *before* using it > > > - only unmapping allocated DMA RX regions > > > > > > This avoids NULL pointer dereferences when initialisation fails. > > > > > > Signed-off-by: Andre Przywara > > > --- > > > .../net/ethernet/xilinx/xilinx_axienet_main.c | 43 ++++++++++++-----= -- > > > 1 file changed, 28 insertions(+), 15 deletions(-) > > > > > > diff --git a/drivers/net/ethernet/xilinx/xilinx_axienet_main.c > > > b/drivers/net/ethernet/xilinx/xilinx_axienet_main.c > > > index 97482cf093ce..7e90044cf2d9 100644 > > > --- a/drivers/net/ethernet/xilinx/xilinx_axienet_main.c > > > +++ b/drivers/net/ethernet/xilinx/xilinx_axienet_main.c > > > @@ -160,24 +160,37 @@ static void axienet_dma_bd_release(struct > > > net_device *ndev) > > > int i; > > > struct axienet_local *lp =3D netdev_priv(ndev); > > > > > > + /* If we end up here, tx_bd_v must have been DMA allocated. */ > > > + dma_free_coherent(ndev->dev.parent, > > > + sizeof(*lp->tx_bd_v) * lp->tx_bd_num, > > > + lp->tx_bd_v, > > > + lp->tx_bd_p); > > > + > > > + if (!lp->rx_bd_v) > > > + return; > > > + > > > for (i =3D 0; i < lp->rx_bd_num; i++) { > > > - dma_unmap_single(ndev->dev.parent, lp->rx_bd_v[i].phys, > > > - lp->max_frm_size, DMA_FROM_DEVICE); > > > + /* A NULL skb means this descriptor has not been initialised > > > + * at all. > > > + */ > > > + if (!lp->rx_bd_v[i].skb) > > > + break; > > > + > > > dev_kfree_skb(lp->rx_bd_v[i].skb); > > > - } > > > > > > - if (lp->rx_bd_v) { > > > - dma_free_coherent(ndev->dev.parent, > > > - sizeof(*lp->rx_bd_v) * lp->rx_bd_num, > > > - lp->rx_bd_v, > > > - lp->rx_bd_p); > > > - } > > > - if (lp->tx_bd_v) { > > > - dma_free_coherent(ndev->dev.parent, > > > - sizeof(*lp->tx_bd_v) * lp->tx_bd_num, > > > - lp->tx_bd_v, > > > - lp->tx_bd_p); > > > + /* For each descriptor, we programmed cntrl with the (non- > > > zero) > > > + * descriptor size, after it had been successfully allocated. > > > + * So a non-zero value in there means we need to unmap it. > > > + */ > > > > > + if (lp->rx_bd_v[i].cntrl) > > > > I think it should ok to unmap w/o any check? >=20 > Do you mean because .phys would be 0 if not initialised? AFAIK 0 can be a > valid DMA address, so there is no special check for that, and unmapping > DMA address 0 will probably go wrong at some point. So it's unlike > kfree(NULL). I mean if skb allocation is successful in _dma_bd_init then in release path we can assume .phys is always a valid address and skip rx_bd_v[i].cntrl check.=20 >=20 > Cheers, > Andre. >=20 >=20 > > > + dma_unmap_single(ndev->dev.parent, lp- > > > >rx_bd_v[i].phys, > > > + lp->max_frm_size, > > > DMA_FROM_DEVICE); > > > } > > > + > > > + dma_free_coherent(ndev->dev.parent, > > > + sizeof(*lp->rx_bd_v) * lp->rx_bd_num, > > > + lp->rx_bd_v, > > > + lp->rx_bd_p); > > > } > > > > > > /** > > > @@ -207,7 +220,7 @@ static int axienet_dma_bd_init(struct net_device > > > *ndev) > > > sizeof(*lp->tx_bd_v) * lp- > > > >tx_bd_num, > > > &lp->tx_bd_p, GFP_KERNEL); > > > if (!lp->tx_bd_v) > > > - goto out; > > > + return -ENOMEM; > > > > > > lp->rx_bd_v =3D dma_alloc_coherent(ndev->dev.parent, > > > sizeof(*lp->rx_bd_v) * lp- > > > >rx_bd_num, > > > -- > > > 2.17.1 > >