Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp422996pxx; Wed, 28 Oct 2020 08:02:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJydJc/T2Xqu3oEgc4UOHpcxFkQ1dO6gFAFhzaL4lE9JKCr9UpH60mI10obbiNvca2I2mrVE X-Received: by 2002:adf:9069:: with SMTP id h96mr9952500wrh.358.1603897365537; Wed, 28 Oct 2020 08:02:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603897365; cv=none; d=google.com; s=arc-20160816; b=FlKsMWUjhgGUWJAGpJoFfO9U4VpfbhXmdKV5HvCxNcdx82aB6zw/mw5gpFBICbYB/X KIHXIevVH1wEkfzzDhVlMYYOdnSfShsVMlPgEGMGF/5cDHFnIpbaNEh3aoZ1Gepotqjj zkk7F2AePthah1Oj9mk8ZFGuPJ1HPr6OjfLoQqft++PY5EAprFhKuvLBySKej4a9ExSj HFfj0L9wW6OdvJ7Ifn1u8nGDGpN3zAaZv3ZyBwiuPG2nL9KdLZgdtjqbXK85/60GacYk K+EE7ooOferMN+EMAT8SNYidsJ04RYZ7BU/2/8aG9E45kolP9RVQiw/6UNingcwQF1ye Brwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3CYx1PNz4pomEOJyCzsa+2I1fFnfTjkTt8hf2U/EDgs=; b=NYvEkXN9WmteaswS5liKnxil0dIg5GFQSBt07YfM1jm1lH7KsmlOnzcnrkcEKkcgs+ 3AaPHMKnMS+7QuKJ2PSeaHb14B+KsD+qMy/syRh8EajZX/7wb2SEm8ECvQ3aTn+cW7i4 ShO/lt0VN6RA19nfO0M+rnFMgDRWQh7/iCEUF8bemKgIQ7YGUKR4ca4aV5bKR0bhAfe2 HrNfB1ETrPfkwkMt5qRTJX9gDESUjejkEHrAOFSiJZSVbGH97qCX9KSpxyRsd3ygrKgO j0Wwg+JN0MM+TxTvJSrMzSRcUc/82ogNze2+QuVivNZbbqZABaJkVOqqcMCfmENzk0tv ATxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UGC9zfrd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s16si2897729edy.300.2020.10.28.08.02.21; Wed, 28 Oct 2020 08:02:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UGC9zfrd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1796647AbgJ0Q1J (ORCPT + 99 others); Tue, 27 Oct 2020 12:27:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:53498 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1802953AbgJ0PwA (ORCPT ); Tue, 27 Oct 2020 11:52:00 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 67FA92065C; Tue, 27 Oct 2020 15:51:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813918; bh=e9gFAd3d1UGX/iB+qJTkyB+hli31VQmIr5s1g7wzTAI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UGC9zfrdZ09zPH6WHM6WXDxg/DE9Uls19Hhh5mGjM65SX+SKdD3GQ+FFFvl+kUy8m BsU8ffxQi8upON9JZOQsDW7FVvSQvp2ARzwo9CQD2rfM4w6qZKrOsDY/is41Dbx9br yF/Hb+4QiNVHGuGh+ahe5FeDVKIbMWx8MgyHjDFg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sherry Sun , Joakim Zhang , Sasha Levin Subject: [PATCH 5.9 683/757] misc: vop: add round_up(x,4) for vring_size to avoid kernel panic Date: Tue, 27 Oct 2020 14:55:33 +0100 Message-Id: <20201027135522.579183319@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sherry Sun [ Upstream commit cc1a2679865a94b83804822996eed010a50a7c1d ] Since struct _mic_vring_info and vring are allocated together and follow vring, if the vring_size() is not four bytes aligned, which will cause the start address of struct _mic_vring_info is not four byte aligned. For example, when vring entries is 128, the vring_size() will be 5126 bytes. The _mic_vring_info struct layout in ddr looks like: 0x90002400: 00000000 00390000 EE010000 0000C0FF Here 0x39 is the avail_idx member, and 0xC0FFEE01 is the magic member. When EP use ioread32(magic) to reads the magic in RC's share memory, it will cause kernel panic on ARM64 platform due to the cross-byte io read. Here read magic in user space use le32toh(vr0->info->magic) will meet the same issue. So add round_up(x,4) for vring_size, then the struct _mic_vring_info will store in this way: 0x90002400: 00000000 00000000 00000039 C0FFEE01 Which will avoid kernel panic when read magic in struct _mic_vring_info. Signed-off-by: Sherry Sun Signed-off-by: Joakim Zhang Link: https://lore.kernel.org/r/20200929091106.24624-4-sherry.sun@nxp.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/misc/mic/vop/vop_main.c | 2 +- drivers/misc/mic/vop/vop_vringh.c | 4 ++-- samples/mic/mpssd/mpssd.c | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/misc/mic/vop/vop_main.c b/drivers/misc/mic/vop/vop_main.c index 55e7f21e51f44..6722c726b2590 100644 --- a/drivers/misc/mic/vop/vop_main.c +++ b/drivers/misc/mic/vop/vop_main.c @@ -320,7 +320,7 @@ static struct virtqueue *vop_find_vq(struct virtio_device *dev, /* First assign the vring's allocated in host memory */ vqconfig = _vop_vq_config(vdev->desc) + index; memcpy_fromio(&config, vqconfig, sizeof(config)); - _vr_size = vring_size(le16_to_cpu(config.num), MIC_VIRTIO_RING_ALIGN); + _vr_size = round_up(vring_size(le16_to_cpu(config.num), MIC_VIRTIO_RING_ALIGN), 4); vr_size = PAGE_ALIGN(_vr_size + sizeof(struct _mic_vring_info)); va = vpdev->hw_ops->remap(vpdev, le64_to_cpu(config.address), vr_size); if (!va) diff --git a/drivers/misc/mic/vop/vop_vringh.c b/drivers/misc/mic/vop/vop_vringh.c index d069947b09345..7014ffe88632e 100644 --- a/drivers/misc/mic/vop/vop_vringh.c +++ b/drivers/misc/mic/vop/vop_vringh.c @@ -296,7 +296,7 @@ static int vop_virtio_add_device(struct vop_vdev *vdev, num = le16_to_cpu(vqconfig[i].num); mutex_init(&vvr->vr_mutex); - vr_size = PAGE_ALIGN(vring_size(num, MIC_VIRTIO_RING_ALIGN) + + vr_size = PAGE_ALIGN(round_up(vring_size(num, MIC_VIRTIO_RING_ALIGN), 4) + sizeof(struct _mic_vring_info)); vr->va = (void *) __get_free_pages(GFP_KERNEL | __GFP_ZERO, @@ -308,7 +308,7 @@ static int vop_virtio_add_device(struct vop_vdev *vdev, goto err; } vr->len = vr_size; - vr->info = vr->va + vring_size(num, MIC_VIRTIO_RING_ALIGN); + vr->info = vr->va + round_up(vring_size(num, MIC_VIRTIO_RING_ALIGN), 4); vr->info->magic = cpu_to_le32(MIC_MAGIC + vdev->virtio_id + i); vr_addr = dma_map_single(&vpdev->dev, vr->va, vr_size, DMA_BIDIRECTIONAL); diff --git a/samples/mic/mpssd/mpssd.c b/samples/mic/mpssd/mpssd.c index a11bf6c5b53b4..cd3f16a6f5caf 100644 --- a/samples/mic/mpssd/mpssd.c +++ b/samples/mic/mpssd/mpssd.c @@ -403,9 +403,9 @@ mic_virtio_copy(struct mic_info *mic, int fd, static inline unsigned _vring_size(unsigned int num, unsigned long align) { - return ((sizeof(struct vring_desc) * num + sizeof(__u16) * (3 + num) + return _ALIGN_UP(((sizeof(struct vring_desc) * num + sizeof(__u16) * (3 + num) + align - 1) & ~(align - 1)) - + sizeof(__u16) * 3 + sizeof(struct vring_used_elem) * num; + + sizeof(__u16) * 3 + sizeof(struct vring_used_elem) * num, 4); } /* -- 2.25.1