Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp673039ybh; Tue, 10 Mar 2020 06:15:06 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvFBBYrwiCvTGAKaupmiKI2uvYN+PlVAAPn+ZEP7owv237/ZqZNbFGjCywRzdkW7E9SeOKW X-Received: by 2002:a9d:12cc:: with SMTP id g70mr7719318otg.115.1583846106278; Tue, 10 Mar 2020 06:15:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583846106; cv=none; d=google.com; s=arc-20160816; b=MIxhtxqwQc7h84wZLqv4KlRjwkpmf/u5eYXv+yuDEcDNpk7NLX/gGpOe2o0yRRMZLw Kt810dCC2GHbUv/Z4GMsMFmt9FxLD9BwpGnMqkcknucseF/vYb+WPOa0Osm3abGpSHuD 74K7Re9EqM2meF5KnWLXCohVRQpQtcSG1CHckdyYKWsFd29v9ZZl35fDe/FKU47g73PG b80BPoHoC3XhpYqG7XK9gwsW6JWRAakmZI0oIQvU8EzB2BaIWCWYW4NQ0XSxNq9iq6ri tFtErw1xguf3jMmgVpFqmuhQqucIO7gthoX84NYLWZJTvveietjd0Vgn3AGQup+dvVbV xSCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tRB86k7LX1IEZGJbHB/bflNFQnwOC2IpMdLDiKkYNL0=; b=p6ljz7k4QQAkBGfvLY9aXjROzLREDmvjVfR/a1478mbAm1xtmzS1zedwfwSE2PF6UD JtcPWVgIg7gJk7ed//tg2kpfMrLQYh7vGghHT/ST2dubHU2dN8cpzO7yPOMu65vk675t UahQt/yQOB2HXOgqq850d+l+2cmpoM+PH0zkB+NHf8R9gnCC/RUkupiiifEmIaEfoTWi TnuPWahOUsCGGeRwFu0WQfFsqyIaRn6zwogA7H6kbRpZZ9knuifyahi7p1XUDo2xO/Yl lleb5XuANatCvW3X+RXytTJgA8reGdEnJrsaPQszfZPa92W+fEolGENfgEkQb/RSZ2eu LflA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rS4TV/Ut"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e2si3029949otr.30.2020.03.10.06.14.54; Tue, 10 Mar 2020 06:15:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rS4TV/Ut"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731724AbgCJNNe (ORCPT + 99 others); Tue, 10 Mar 2020 09:13:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:36336 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731706AbgCJNNa (ORCPT ); Tue, 10 Mar 2020 09:13:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7EC752468C; Tue, 10 Mar 2020 13:13:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583846010; bh=wC77etyBiKYYQHOAZrOrA0Scj9oufkW+m+ephETmwQQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rS4TV/UtR/6Bwnmnydl341gePyXi+zJPqaxxAUT3HnRsG3zWfwcxV3AcdKbPZYt8J wHEq5gzT/MWBBwwZlKroiRC2e1TWyKhFRqkFi/cmWuKWDwa5b4w8ALo+gJ4KQ7R1EO aA5PPgMV1UUAm20Bi2WlrxQVvklCmsI65vj2OrqU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dmitry Osipenko , Jon Hunter , Vinod Koul Subject: [PATCH 4.19 53/86] dmaengine: tegra-apb: Fix use-after-free Date: Tue, 10 Mar 2020 13:45:17 +0100 Message-Id: <20200310124533.657078801@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200310124530.808338541@linuxfoundation.org> References: <20200310124530.808338541@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dmitry Osipenko commit 94788af4ed039476ff3527b0e6a12c1dc42cb022 upstream. I was doing some experiments with I2C and noticed that Tegra APB DMA driver crashes sometime after I2C DMA transfer termination. The crash happens because tegra_dma_terminate_all() bails out immediately if pending list is empty, and thus, it doesn't release the half-completed descriptors which are getting re-used before ISR tasklet kicks-in. tegra-i2c 7000c400.i2c: DMA transfer timeout elants_i2c 0-0010: elants_i2c_irq: failed to read data: -110 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 142 at lib/list_debug.c:45 __list_del_entry_valid+0x45/0xac list_del corruption, ddbaac44->next is LIST_POISON1 (00000100) Modules linked in: CPU: 0 PID: 142 Comm: kworker/0:2 Not tainted 5.5.0-rc2-next-20191220-00175-gc3605715758d-dirty #538 Hardware name: NVIDIA Tegra SoC (Flattened Device Tree) Workqueue: events_freezable_power_ thermal_zone_device_check [] (unwind_backtrace) from [] (show_stack+0x11/0x14) [] (show_stack) from [] (dump_stack+0x85/0x94) [] (dump_stack) from [] (__warn+0xc1/0xc4) [] (__warn) from [] (warn_slowpath_fmt+0x61/0x78) [] (warn_slowpath_fmt) from [] (__list_del_entry_valid+0x45/0xac) [] (__list_del_entry_valid) from [] (tegra_dma_tasklet+0x5b/0x154) [] (tegra_dma_tasklet) from [] (tasklet_action_common.constprop.0+0x41/0x7c) [] (tasklet_action_common.constprop.0) from [] (__do_softirq+0xd3/0x2a8) [] (__do_softirq) from [] (irq_exit+0x7b/0x98) [] (irq_exit) from [] (__handle_domain_irq+0x45/0x80) [] (__handle_domain_irq) from [] (gic_handle_irq+0x45/0x7c) [] (gic_handle_irq) from [] (__irq_svc+0x65/0x94) Exception stack(0xde2ebb90 to 0xde2ebbd8) Signed-off-by: Dmitry Osipenko Acked-by: Jon Hunter Cc: Link: https://lore.kernel.org/r/20200209163356.6439-2-digetx@gmail.com Signed-off-by: Vinod Koul Signed-off-by: Greg Kroah-Hartman --- drivers/dma/tegra20-apb-dma.c | 4 ---- 1 file changed, 4 deletions(-) --- a/drivers/dma/tegra20-apb-dma.c +++ b/drivers/dma/tegra20-apb-dma.c @@ -756,10 +756,6 @@ static int tegra_dma_terminate_all(struc bool was_busy; spin_lock_irqsave(&tdc->lock, flags); - if (list_empty(&tdc->pending_sg_req)) { - spin_unlock_irqrestore(&tdc->lock, flags); - return 0; - } if (!tdc->busy) goto skip_dma_stop;