Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp1121022pxx; Tue, 27 Oct 2020 08:43:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYDoFg+6AY6lu9Nfx1V3qLd29t46iTmvsau0IUeEjtldkSvT3FQD8dEQ8OlFfgIezbxdj4 X-Received: by 2002:a17:906:6a47:: with SMTP id n7mr2966285ejs.306.1603813429944; Tue, 27 Oct 2020 08:43:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603813429; cv=none; d=google.com; s=arc-20160816; b=EHvRE6uZE1dKN0VOJo5uK5cFbwbg7ZECjJh5Jk1vKKpl7y1OM1wGU3qQIR22rL5czP +jr576Y4hSjVkKzLzvPwSs6pqO36iapA+7Xh8x2DBd/wpX0sm+SzbGeKGJSR6GrhZLJW ZGt1SqVwETcePq1U5AU6bfS7sv4JZpfXULi1Gb9dhlc2RuKu221GFDLGelPBkMlF9FXg G4bIWMSHUm/qh+zTocASynWST4A5QAtywocgbLwJFJ4jpAkot1kxsL98D/pvgmMmNdRA 3IdzzKJZ3cAELQ79DviGcZRJvxxh2BIxgDBLfZAAvMsolDubmrmCXMXaCiwvunYReeWL BKww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kZtQgcrZZlJmrtKTdhoXsj8SiLnUtR+PnmxLuvOJh/M=; b=fxVLgoeUnydDWm9JeS32hBJS0asREgA2CPRDQxBZ4Zsgfcpg9WjmoyvpT43Po80n7g cEyBLEm87OgWwt4LeCx3kENFmgxlyCO6gUY3pfIMVlWv+jEJUb6oy/ujGK+ZqOhoYS0W vQDQ/u/U+osWMp9m4XgsuUWvTFsc1beUMcbIooP8O8XGggaxWb1NYhPo28arOwgFXA+x Yo5hZTuSgvHz3Fk2MFCL+tRgCjHelKEP+BIbzgVDqhc4mFIG9SecsbLgdE6NaSh/iiN0 Yf2F7gbwlhVs15Y3FzW2GWVMQmwHiEs6gZ52XQNNIsJMQDGsLDCoDG02+U4RdopqJQah FFeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iWnZKTEM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d12si1245551ejt.9.2020.10.27.08.43.24; Tue, 27 Oct 2020 08:43:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iWnZKTEM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1764155AbgJ0Oq0 (ORCPT + 99 others); Tue, 27 Oct 2020 10:46:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:46172 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1764089AbgJ0OqQ (ORCPT ); Tue, 27 Oct 2020 10:46:16 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 00F0A20773; Tue, 27 Oct 2020 14:46:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603809975; bh=sadgl+KzUIy3pjWtmX0s7IkRTm41gEm5jderOKHO7Gs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iWnZKTEM7hpIxZH+UI8ewHiM4TUxAPdP2Gu3K7TbcLfRy7tjxE68859bHzx6Frxp0 YitMPglM7PsHInFI+WY3033Ad4IlTs4pbVA0Kx8KBQ87HfxTLZx+BtVboiaBl5sf5W 75IaNi9PPzd22nwQFCeM2+L8OWozlDHr1p8GrCJA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sherry Sun , Joakim Zhang , Sasha Levin Subject: [PATCH 5.4 355/408] misc: vop: add round_up(x,4) for vring_size to avoid kernel panic Date: Tue, 27 Oct 2020 14:54:53 +0100 Message-Id: <20201027135511.487225765@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135455.027547757@linuxfoundation.org> References: <20201027135455.027547757@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sherry Sun [ Upstream commit cc1a2679865a94b83804822996eed010a50a7c1d ] Since struct _mic_vring_info and vring are allocated together and follow vring, if the vring_size() is not four bytes aligned, which will cause the start address of struct _mic_vring_info is not four byte aligned. For example, when vring entries is 128, the vring_size() will be 5126 bytes. The _mic_vring_info struct layout in ddr looks like: 0x90002400: 00000000 00390000 EE010000 0000C0FF Here 0x39 is the avail_idx member, and 0xC0FFEE01 is the magic member. When EP use ioread32(magic) to reads the magic in RC's share memory, it will cause kernel panic on ARM64 platform due to the cross-byte io read. Here read magic in user space use le32toh(vr0->info->magic) will meet the same issue. So add round_up(x,4) for vring_size, then the struct _mic_vring_info will store in this way: 0x90002400: 00000000 00000000 00000039 C0FFEE01 Which will avoid kernel panic when read magic in struct _mic_vring_info. Signed-off-by: Sherry Sun Signed-off-by: Joakim Zhang Link: https://lore.kernel.org/r/20200929091106.24624-4-sherry.sun@nxp.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/misc/mic/vop/vop_main.c | 2 +- drivers/misc/mic/vop/vop_vringh.c | 4 ++-- samples/mic/mpssd/mpssd.c | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/misc/mic/vop/vop_main.c b/drivers/misc/mic/vop/vop_main.c index 85942f6717c57..8aadc6055df17 100644 --- a/drivers/misc/mic/vop/vop_main.c +++ b/drivers/misc/mic/vop/vop_main.c @@ -320,7 +320,7 @@ static struct virtqueue *vop_find_vq(struct virtio_device *dev, /* First assign the vring's allocated in host memory */ vqconfig = _vop_vq_config(vdev->desc) + index; memcpy_fromio(&config, vqconfig, sizeof(config)); - _vr_size = vring_size(le16_to_cpu(config.num), MIC_VIRTIO_RING_ALIGN); + _vr_size = round_up(vring_size(le16_to_cpu(config.num), MIC_VIRTIO_RING_ALIGN), 4); vr_size = PAGE_ALIGN(_vr_size + sizeof(struct _mic_vring_info)); va = vpdev->hw_ops->remap(vpdev, le64_to_cpu(config.address), vr_size); if (!va) diff --git a/drivers/misc/mic/vop/vop_vringh.c b/drivers/misc/mic/vop/vop_vringh.c index d069947b09345..7014ffe88632e 100644 --- a/drivers/misc/mic/vop/vop_vringh.c +++ b/drivers/misc/mic/vop/vop_vringh.c @@ -296,7 +296,7 @@ static int vop_virtio_add_device(struct vop_vdev *vdev, num = le16_to_cpu(vqconfig[i].num); mutex_init(&vvr->vr_mutex); - vr_size = PAGE_ALIGN(vring_size(num, MIC_VIRTIO_RING_ALIGN) + + vr_size = PAGE_ALIGN(round_up(vring_size(num, MIC_VIRTIO_RING_ALIGN), 4) + sizeof(struct _mic_vring_info)); vr->va = (void *) __get_free_pages(GFP_KERNEL | __GFP_ZERO, @@ -308,7 +308,7 @@ static int vop_virtio_add_device(struct vop_vdev *vdev, goto err; } vr->len = vr_size; - vr->info = vr->va + vring_size(num, MIC_VIRTIO_RING_ALIGN); + vr->info = vr->va + round_up(vring_size(num, MIC_VIRTIO_RING_ALIGN), 4); vr->info->magic = cpu_to_le32(MIC_MAGIC + vdev->virtio_id + i); vr_addr = dma_map_single(&vpdev->dev, vr->va, vr_size, DMA_BIDIRECTIONAL); diff --git a/samples/mic/mpssd/mpssd.c b/samples/mic/mpssd/mpssd.c index a11bf6c5b53b4..cd3f16a6f5caf 100644 --- a/samples/mic/mpssd/mpssd.c +++ b/samples/mic/mpssd/mpssd.c @@ -403,9 +403,9 @@ mic_virtio_copy(struct mic_info *mic, int fd, static inline unsigned _vring_size(unsigned int num, unsigned long align) { - return ((sizeof(struct vring_desc) * num + sizeof(__u16) * (3 + num) + return _ALIGN_UP(((sizeof(struct vring_desc) * num + sizeof(__u16) * (3 + num) + align - 1) & ~(align - 1)) - + sizeof(__u16) * 3 + sizeof(struct vring_used_elem) * num; + + sizeof(__u16) * 3 + sizeof(struct vring_used_elem) * num, 4); } /* -- 2.25.1