Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp414789ybl; Wed, 29 Jan 2020 02:57:21 -0800 (PST) X-Google-Smtp-Source: APXvYqzSIifqLtGEb4k02mCPqjOfFrASVUqEqS9Nv4mrkLIY6fCKZpQdyGt223T/PQw/Vfz1Sy1h X-Received: by 2002:aca:b343:: with SMTP id c64mr3272589oif.38.1580295441645; Wed, 29 Jan 2020 02:57:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580295441; cv=none; d=google.com; s=arc-20160816; b=kzZ1AvUwMfV+K+VRbpPwljdsBOMsUTtbY4ZF8gubYF4mqD9B8ifzU1CVVEcJixlBL9 5l71TWiQPzZc6467oAPyCysz46laQlG3IkKI/smE9BgeXO5BeevszftAB8TCZ8yJsC/4 qsFJ38m+u6e12Q0BIZH1LOwL5aUvkD8FzJAG8aPGpH5aZmwF0nDI1yZ5rFx5K1yMpMzM azMuUttPHOMp5NNxIzoQbU08wv2STe7pIB9j6ioD43UnqhoHRGx80A2RV6nnCLvG5eNS XiV5iEek+9ffuyVeD0ih+WoYzKDfnaIMZbcq93RqUo/8TZL9wB+AkGnUWcDreEfXTC1o KY4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=Fje555DfDUE6kGnSNsqCRpVoc3wD3ZspNfNjXOQTA0o=; b=he76RKOlGtpJHEPwvz2LR8VHNqkht9yO3/bS5e4Gc9HaMEM6zKlYwhEZENqqRRfTje NQvxryMNPJlGqZ5ia239AoAX56Fx84/0zLzzopOhK3XkoJGFhSTfySUpyNVjIolEGAov EAvAQobMf0sBzmPxkR8upRHG/agg7eIzIFXiEngRsVySBxSG6ECDOAMjrnhW08e0TNyb WtnlBV1iq4k63rcmHBuujQnVLD16UQvCP/OLaX7q0GKp2YUN+g9hWxjrl6eaUQIgRtD2 xZVJDyKLugyJ6pTNKaXxKNrxuINFBXV9nOiA/FMPkQ02A8eD+3bIEtyX/sVeMz7M86Ec 1CYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=jwWWXwsL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g25si1000321otj.198.2020.01.29.02.57.09; Wed, 29 Jan 2020 02:57:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=jwWWXwsL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726339AbgA2K4U (ORCPT + 99 others); Wed, 29 Jan 2020 05:56:20 -0500 Received: from hqnvemgate24.nvidia.com ([216.228.121.143]:3592 "EHLO hqnvemgate24.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726069AbgA2K4U (ORCPT ); Wed, 29 Jan 2020 05:56:20 -0500 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqnvemgate24.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Wed, 29 Jan 2020 02:55:28 -0800 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Wed, 29 Jan 2020 02:56:18 -0800 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Wed, 29 Jan 2020 02:56:18 -0800 Received: from [10.21.133.51] (172.20.13.39) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 29 Jan 2020 10:56:16 +0000 Subject: Re: [PATCH v5 01/14] dmaengine: tegra-apb: Fix use-after-free To: Dmitry Osipenko , Laxman Dewangan , Vinod Koul , Dan Williams , Thierry Reding , =?UTF-8?B?TWljaGHFgiBNaXJvc8WCYXc=?= CC: , , References: <20200123230325.3037-1-digetx@gmail.com> <20200123230325.3037-2-digetx@gmail.com> From: Jon Hunter Message-ID: <858021de-62fd-2d21-7152-42af4e3a04b2@nvidia.com> Date: Wed, 29 Jan 2020 10:56:15 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <20200123230325.3037-2-digetx@gmail.com> X-Originating-IP: [172.20.13.39] X-ClientProxiedBy: HQMAIL107.nvidia.com (172.20.187.13) To HQMAIL107.nvidia.com (172.20.187.13) Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1580295328; bh=Fje555DfDUE6kGnSNsqCRpVoc3wD3ZspNfNjXOQTA0o=; h=X-PGP-Universal:Subject:To:CC:References:From:Message-ID:Date: User-Agent:MIME-Version:In-Reply-To:X-Originating-IP: X-ClientProxiedBy:Content-Type:Content-Language: Content-Transfer-Encoding; b=jwWWXwsLS3RIOIH3Updt2zyJEIjVb4v51V8oCPlpr/+Dcyc13CfyZIm99/xTSJNK/ pgKyRgJIx4S+QswHhyMhvP6oPIZqSo90hPdGb/0qnpPYbZK4A3wC06sJyqhLLZLYgu LTcJW0KdCO+oSMV11EgmTFZAn1w4B3HfQt1f92tzcCauaXIIjPsicqMoHAlgT7f8sq 09SUShHGsSKPNNuTFCCM9ObcTWZNbPmxnKBdVcN77CSnBJSCAV2pv4k2QZ2cT7pXHr TUSUZ6AJx5vAmNYMD3D+jG666sRgpIxTYRabIlHZwdX07hpDfYDkeFEIT1VrtNcrNW LOaP9fBXVRaZQ== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/01/2020 23:03, Dmitry Osipenko wrote: > I was doing some experiments with I2C and noticed that Tegra APB DMA > driver crashes sometime after I2C DMA transfer termination. The crash > happens because tegra_dma_terminate_all() bails out immediately if pending > list is empty, thus it doesn't release the half-completed descriptors > which are getting re-used before ISR tasklet kicks-in. > > tegra-i2c 7000c400.i2c: DMA transfer timeout > elants_i2c 0-0010: elants_i2c_irq: failed to read data: -110 > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 142 at lib/list_debug.c:45 __list_del_entry_valid+0x45/0xac > list_del corruption, ddbaac44->next is LIST_POISON1 (00000100) > Modules linked in: > CPU: 0 PID: 142 Comm: kworker/0:2 Not tainted 5.5.0-rc2-next-20191220-00175-gc3605715758d-dirty #538 > Hardware name: NVIDIA Tegra SoC (Flattened Device Tree) > Workqueue: events_freezable_power_ thermal_zone_device_check > [] (unwind_backtrace) from [] (show_stack+0x11/0x14) > [] (show_stack) from [] (dump_stack+0x85/0x94) > [] (dump_stack) from [] (__warn+0xc1/0xc4) > [] (__warn) from [] (warn_slowpath_fmt+0x61/0x78) > [] (warn_slowpath_fmt) from [] (__list_del_entry_valid+0x45/0xac) > [] (__list_del_entry_valid) from [] (tegra_dma_tasklet+0x5b/0x154) > [] (tegra_dma_tasklet) from [] (tasklet_action_common.constprop.0+0x41/0x7c) > [] (tasklet_action_common.constprop.0) from [] (__do_softirq+0xd3/0x2a8) > [] (__do_softirq) from [] (irq_exit+0x7b/0x98) > [] (irq_exit) from [] (__handle_domain_irq+0x45/0x80) > [] (__handle_domain_irq) from [] (gic_handle_irq+0x45/0x7c) > [] (gic_handle_irq) from [] (__irq_svc+0x65/0x94) > Exception stack(0xde2ebb90 to 0xde2ebbd8) > > Cc: > Signed-off-by: Dmitry Osipenko > --- > drivers/dma/tegra20-apb-dma.c | 4 ---- > 1 file changed, 4 deletions(-) > > diff --git a/drivers/dma/tegra20-apb-dma.c b/drivers/dma/tegra20-apb-dma.c > index 3a45079d11ec..319f31d27014 100644 > --- a/drivers/dma/tegra20-apb-dma.c > +++ b/drivers/dma/tegra20-apb-dma.c > @@ -756,10 +756,6 @@ static int tegra_dma_terminate_all(struct dma_chan *dc) > bool was_busy; > > spin_lock_irqsave(&tdc->lock, flags); > - if (list_empty(&tdc->pending_sg_req)) { > - spin_unlock_irqrestore(&tdc->lock, flags); > - return 0; > - } > > if (!tdc->busy) > goto skip_dma_stop; Acked-by: Jon Hunter I think that we should mark this one for stable. Cheers Jon -- nvpublic