Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp517486pxf; Thu, 8 Apr 2021 07:45:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMHlk0qQZOkMss8aDklo8U/VLOxSgAOSv3cVlz4d9yiQuLWqiN+74oflW17GeRQjp7UrBf X-Received: by 2002:a17:906:b1c1:: with SMTP id bv1mr10911259ejb.24.1617893126798; Thu, 08 Apr 2021 07:45:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617893126; cv=none; d=google.com; s=arc-20160816; b=FHXhLXm1EomkmNtlk7PQThaUO62MY3ULF1FbyV+eELGzhmovGu2OwQ9wOl571bGTTG IpSG19ESsseAzQRYIG9qLH4x4FzpO4Tv7w7G7c/YUIDfOoTeLzzeMo7sks0P+wpayZLa 1uuIO33T22p5+Uhn5EmR8Z+Oaj9Uh8UxoX1PhWZd7U3XJZwU90i9QyGZHfG4ufjY2lQq hP29aSIQ0TJnyvPhEf34yEbSVptbYMHpcXeI97hMa8Kp4cZL1z6OAelX5E6UMjlBDQIf 88ckFQIDhLPvTe9GnR1w3j7qOyVSe60NBrZfEZAmN+YP9E5HJYzoaJejHCnsUaUQxEcw wQ2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=pfprswARZ4odhvhZpzsdc6CTE0mR3gUSzWfF2cwF86E=; b=o2UJ1P+acfRfYJsBwcdD1iK1LvPEF0BymFPD7+b9vNML3NH07e+bUyy6alTh00uenW 9AZoROMRzgBSh7T3BeA1h8MHPADpNuKId8fdZjVC3iFbufnSQXNhn+f+2Z+IwmpCiqXh yu3wKn2SLiYdYCGb9fGxSnRwjLzfNSPLjaiTO1+Kj2NeUwQJfbHVfGaxPXonizytZBNd /yOrmixq5MhqebpmDauIwydMxCJ7qy+JrKXUqrt2oLa4JUZT3HvNaiF1+kXSygMmNd50 JnJLkBtQ8nCbfQPxH2gpW+ydLuNHGgK0ZHAqREx0MsusaMJxmQg3rLXNa9QXIlNNhfJ/ /9kQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=asM+pgqk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v18si17147028ejj.84.2021.04.08.07.45.02; Thu, 08 Apr 2021 07:45:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=asM+pgqk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231630AbhDHOoM (ORCPT + 99 others); Thu, 8 Apr 2021 10:44:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231370AbhDHOoL (ORCPT ); Thu, 8 Apr 2021 10:44:11 -0400 Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5C480C061760; Thu, 8 Apr 2021 07:44:00 -0700 (PDT) Received: by mail-qt1-x835.google.com with SMTP id u8so1539570qtq.12; Thu, 08 Apr 2021 07:44:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=pfprswARZ4odhvhZpzsdc6CTE0mR3gUSzWfF2cwF86E=; b=asM+pgqko9tpznmMELqwovipzQFNaj7aH+HFclpVxRgbqgmxlK/HrYGKAZbT38RZ8z oKzFMYcooI/4jfil/BYH6SM9FsIYpgNY+3CBHn02hPKMBnB+wi8E+eBrQ0XoQZKqQEL4 lBDia8TepvMEu6/cT14OqCJ/i00mcH25BsB3wn4WoRQCy9rH5/DG4S/luQXNz59PZ4wl E5D7VP5/6eW/Y0TeOQpj02v4HPOM4M7ys97o0Dcwa0eS4CNJg+riUeCDOySoEr8IuwfQ Y6PAgySABtHiClaROSkGikAQM3pNPE8L/1osWNNov6AQddy/FGem8hpTnEz3fX+whGBD pwbQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=pfprswARZ4odhvhZpzsdc6CTE0mR3gUSzWfF2cwF86E=; b=GqWQMSNTxm7MfrVSmBG4mhPQpjRcTflBVVtGTKqzYXOFoeuBF527KLJjyHU9iztlzg Z8E8yrMQdBqYFkjBXENSmUmXXD+ZF0S239COmwDi/oQzFFmjsT1P4mx4Je5PqxuWdJ/N SnyraJs8KcZQqwFSHp3U3ATIDdALblYP4QiQKEK+F7BlXv8+y+WhX0BH/kKZHo5N+qx9 9NgviBuxWTzl2vM9/b83SrIb2knu2ozjf94u+B6vMZkdqGSa3cvZIU1Q5AbQyDnxtS+K AFZbRBWj2Z3z/UubvOHuKYM8kEU07vAnEFht/w3FqxS6fMSmGXktcJ3THHSMua0UYnz2 gobw== X-Gm-Message-State: AOAM533M+5XNo6mCsPuF3JEtI80CTFhCQEGh/QqgN0cBbq9fYXLWnkLi B/cRQOJbSOR89knUgOtCVsjogAZ+AcI= X-Received: by 2002:ac8:5ed2:: with SMTP id s18mr2194566qtx.260.1617893039598; Thu, 08 Apr 2021 07:43:59 -0700 (PDT) Received: from localhost.localdomain (c-67-187-90-124.hsd1.ky.comcast.net. [67.187.90.124]) by smtp.gmail.com with ESMTPSA id z6sm1004761qkc.73.2021.04.08.07.43.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 08 Apr 2021 07:43:58 -0700 (PDT) From: frowand.list@gmail.com To: Rob Herring , Guenter Roeck Cc: Pantelis Antoniou , devicetree@vger.kernel.org, Geert Uytterhoeven , linux-kernel@vger.kernel.org Subject: [PATCH v2 1/1] of: unittest: overlay: ensure proper alignment of copied FDT Date: Thu, 8 Apr 2021 09:43:49 -0500 Message-Id: <20210408144349.2215143-1-frowand.list@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand The Devicetree standard specifies an 8 byte alignment of the FDT. Code in libfdt expects this alignment for an FDT image in memory. kmemdup() returns 4 byte alignment on openrisc. Replace kmemdup() with kmalloc(), align pointer, memcpy() to get proper alignment. The 4 byte alignment exposed a related bug which triggered a crash on openrisc with: commit 79edff12060f ("scripts/dtc: Update to upstream version v1.6.0-51-g183df9e9c2b9") as reported in: https://lore.kernel.org/lkml/20210327224116.69309-1-linux@roeck-us.net/ Reported-by: Guenter Roeck Signed-off-by: Frank Rowand --- Please review carefully, I am not yet fully awake... changes since version 1: - use pointer from kmalloc() for kfree() instead of using pointer that has been modified for FDT alignment drivers/of/of_private.h | 2 ++ drivers/of/overlay.c | 28 +++++++++++++++++----------- drivers/of/unittest.c | 12 +++++++++--- 3 files changed, 28 insertions(+), 14 deletions(-) diff --git a/drivers/of/of_private.h b/drivers/of/of_private.h index d9e6a324de0a..d717efbd637d 100644 --- a/drivers/of/of_private.h +++ b/drivers/of/of_private.h @@ -8,6 +8,8 @@ * Copyright (C) 1996-2005 Paul Mackerras. */ +#define FDT_ALIGN_SIZE 8 + /** * struct alias_prop - Alias property in 'aliases' node * @link: List node to link the structure in aliases_lookup list diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c index 50bbe0edf538..e0397d70d531 100644 --- a/drivers/of/overlay.c +++ b/drivers/of/overlay.c @@ -57,7 +57,7 @@ struct fragment { * struct overlay_changeset * @id: changeset identifier * @ovcs_list: list on which we are located - * @fdt: FDT that was unflattened to create @overlay_tree + * @fdt: base of memory allocated to hold aligned FDT that was unflattened to create @overlay_tree * @overlay_tree: expanded device tree that contains the fragment nodes * @count: count of fragment structures * @fragments: fragment nodes in the overlay expanded device tree @@ -719,8 +719,8 @@ static struct device_node *find_target(struct device_node *info_node) /** * init_overlay_changeset() - initialize overlay changeset from overlay tree * @ovcs: Overlay changeset to build - * @fdt: the FDT that was unflattened to create @tree - * @tree: Contains all the overlay fragments and overlay fixup nodes + * @fdt: base of memory allocated to hold aligned FDT that was unflattened to create @tree + * @tree: Contains the overlay fragments and overlay fixup nodes * * Initialize @ovcs. Populate @ovcs->fragments with node information from * the top level of @tree. The relevant top level nodes are the fragment @@ -873,7 +873,8 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) * internal documentation * * of_overlay_apply() - Create and apply an overlay changeset - * @fdt: the FDT that was unflattened to create @tree + * @fdt_align: the FDT that was unflattened to create @tree, aligned + * @fdt: base of memory allocated to hold *@fdt_align * @tree: Expanded overlay device tree * @ovcs_id: Pointer to overlay changeset id * @@ -912,8 +913,8 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) * id is returned to *ovcs_id. */ -static int of_overlay_apply(const void *fdt, struct device_node *tree, - int *ovcs_id) +static int of_overlay_apply(const void *fdt_align, const void *fdt, + struct device_node *tree, int *ovcs_id) { struct overlay_changeset *ovcs; int ret = 0, ret_revert, ret_tmp; @@ -953,7 +954,7 @@ static int of_overlay_apply(const void *fdt, struct device_node *tree, /* * after overlay_notify(), ovcs->overlay_tree related pointers may have * leaked to drivers, so can not kfree() tree, aka ovcs->overlay_tree; - * and can not free fdt, aka ovcs->fdt + * and can not free memory containing aligned fdt, aka ovcs->fdt */ ret = overlay_notify(ovcs, OF_OVERLAY_PRE_APPLY); if (ret) { @@ -1014,7 +1015,8 @@ static int of_overlay_apply(const void *fdt, struct device_node *tree, int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, int *ovcs_id) { - const void *new_fdt; + void *new_fdt; + void *new_fdt_align; int ret; u32 size; struct device_node *overlay_root; @@ -1036,18 +1038,22 @@ int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, * Must create permanent copy of FDT because of_fdt_unflatten_tree() * will create pointers to the passed in FDT in the unflattened tree. */ - new_fdt = kmemdup(overlay_fdt, size, GFP_KERNEL); + size += FDT_ALIGN_SIZE; + new_fdt = kmalloc(size, GFP_KERNEL); if (!new_fdt) return -ENOMEM; - of_fdt_unflatten_tree(new_fdt, NULL, &overlay_root); + new_fdt_align = PTR_ALIGN(new_fdt, FDT_ALIGN_SIZE); + memcpy(new_fdt_align, overlay_fdt, size); + + of_fdt_unflatten_tree(new_fdt_align, NULL, &overlay_root); if (!overlay_root) { pr_err("unable to unflatten overlay_fdt\n"); ret = -EINVAL; goto out_free_new_fdt; } - ret = of_overlay_apply(new_fdt, overlay_root, ovcs_id); + ret = of_overlay_apply(new_fdt_align, new_fdt, overlay_root, ovcs_id); if (ret < 0) { /* * new_fdt and overlay_root now belong to the overlay diff --git a/drivers/of/unittest.c b/drivers/of/unittest.c index eb100627c186..29081a8b32e6 100644 --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -22,6 +22,7 @@ #include #include #include +#include #include #include @@ -1408,6 +1409,7 @@ static void attach_node_and_children(struct device_node *np) static int __init unittest_data_add(void) { void *unittest_data; + void *unittest_data_align; struct device_node *unittest_data_node, *np; /* * __dtb_testcases_begin[] and __dtb_testcases_end[] are magically @@ -1415,7 +1417,7 @@ static int __init unittest_data_add(void) */ extern uint8_t __dtb_testcases_begin[]; extern uint8_t __dtb_testcases_end[]; - const int size = __dtb_testcases_end - __dtb_testcases_begin; + u32 size = __dtb_testcases_end - __dtb_testcases_begin; int rc; if (!size) { @@ -1425,11 +1427,15 @@ static int __init unittest_data_add(void) } /* creating copy */ - unittest_data = kmemdup(__dtb_testcases_begin, size, GFP_KERNEL); + size += FDT_ALIGN_SIZE; + unittest_data = kmalloc(size, GFP_KERNEL); if (!unittest_data) return -ENOMEM; - of_fdt_unflatten_tree(unittest_data, NULL, &unittest_data_node); + unittest_data_align = PTR_ALIGN(unittest_data, FDT_ALIGN_SIZE); + memcpy(unittest_data_align, __dtb_testcases_begin, size); + + of_fdt_unflatten_tree(unittest_data_align, NULL, &unittest_data_node); if (!unittest_data_node) { pr_warn("%s: No tree to attach; not running tests\n", __func__); kfree(unittest_data); -- Frank Rowand