Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp94055pxb; Mon, 13 Sep 2021 13:55:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3RpvaU2P6NeyUU4CEL8fSgE1e1dwEH6KbNetzmQluW6vGWyHIDJAZzirPKdhY+4acuF+Y X-Received: by 2002:a17:906:468a:: with SMTP id a10mr14768909ejr.523.1631566523136; Mon, 13 Sep 2021 13:55:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631566523; cv=none; d=google.com; s=arc-20160816; b=C8WbDc3KgMExYqg5LvkDuObrkrYQXw3rr5f5eVQ8uGAlFDJBddmvyXn6p3pp4YhlRH UcgeTGRo/IRxkXpo8yjfcmjl+JZr2msN4Hoi3/sU46Tgb0QA/Cv9gM1/mB14EPHD2Mgu QNEDGLtavMVoV52KMt7judGXzFeKur/zzBOvtD7BH+E1T6wLUuh27+Qf38s2BGgclRKD 5SV7h1Ug6aCHrkgVn8SiJrIRfU8j1xEAi9gRo+vdZUfrf2MiqsQaZWxwGtAyIEtuRCQl mG2wIt9V19vuk839Gha8KsNNPgN11KyJmMShWAhUEUn2qrGYSFJwKe7tKRhT5e3F2nht gnhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ph+AeDjZgM6HvojEDdmY0083iXWXxdhhm+8jp2pu7Hs=; b=drlkLvfDsiV5Hx2GWgdiCxhYQGzpHZFn/QIPVkO4cBWwMjauNhcwjK1j1mGkprqSRI n+qKJmmwbY+sOyDuGbqntubkMoIdMUXTDUzKM+t0byMWwsgM0obM/RNefHLCNRpmKDJM 5B4wdQFo93nvWnDYZRBeaozj2wDvTa4uqy/iDDw1BkcgaPE/LRMTNp+BQYcUo1LIp4OH HTkbrHueI0TH5Iqze4ETgfj6r9uGNLyHoOV6m4Zk0O7Dws5x/RpejeP0Vl5kc5BhNuEU jbld9E1yLkgoaLLBDVqFaPiGaH2/zQ5aXAT3htl2qAgYz1mBc4AM+jwKh6KgH1WJZhli J5YQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DT3qEcTh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd8si9289548ejb.751.2021.09.13.13.54.59; Mon, 13 Sep 2021 13:55:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DT3qEcTh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245215AbhIMNyW (ORCPT + 99 others); Mon, 13 Sep 2021 09:54:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:34744 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244863AbhIMNuz (ORCPT ); Mon, 13 Sep 2021 09:50:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E15F76137C; Mon, 13 Sep 2021 13:33:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540027; bh=W9yqL3arC6UNFr/fcNYw4yJx9lC/1tDau6WWaigkSJ0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DT3qEcThb+GTRE/am0kk/ObA1Y4bG1oom6RLHqOkiPv/j9CGj+hO+9UrOC/U9UX9U s0ZJYUW/SL6BYr4RKzt26lgBCpn+7obqO9PhtWqrr1Wum4uD1JjEQmDkXtv/thN7vC 8y2P74y+wiFIwKVBPbvSrtTJm/Hg1nSo9xa23mT4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sean Anderson , Richard Weinberger , Herbert Xu , Sasha Levin Subject: [PATCH 5.13 004/300] crypto: mxs-dcp - Check for DMA mapping errors Date: Mon, 13 Sep 2021 15:11:05 +0200 Message-Id: <20210913131109.425960338@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131109.253835823@linuxfoundation.org> References: <20210913131109.253835823@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Anderson [ Upstream commit df6313d707e575a679ada3313358289af24454c0 ] After calling dma_map_single(), we must also call dma_mapping_error(). This fixes the following warning when compiling with CONFIG_DMA_API_DEBUG: [ 311.241478] WARNING: CPU: 0 PID: 428 at kernel/dma/debug.c:1027 check_unmap+0x79c/0x96c [ 311.249547] DMA-API: mxs-dcp 2280000.crypto: device driver failed to check map error[device address=0x00000000860cb080] [size=32 bytes] [mapped as single] Signed-off-by: Sean Anderson Reviewed-by: Richard Weinberger Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/mxs-dcp.c | 45 +++++++++++++++++++++++++++++++--------- 1 file changed, 35 insertions(+), 10 deletions(-) diff --git a/drivers/crypto/mxs-dcp.c b/drivers/crypto/mxs-dcp.c index d6a7784d2988..f397cc5bf102 100644 --- a/drivers/crypto/mxs-dcp.c +++ b/drivers/crypto/mxs-dcp.c @@ -170,15 +170,19 @@ static struct dcp *global_sdcp; static int mxs_dcp_start_dma(struct dcp_async_ctx *actx) { + int dma_err; struct dcp *sdcp = global_sdcp; const int chan = actx->chan; uint32_t stat; unsigned long ret; struct dcp_dma_desc *desc = &sdcp->coh->desc[actx->chan]; - dma_addr_t desc_phys = dma_map_single(sdcp->dev, desc, sizeof(*desc), DMA_TO_DEVICE); + dma_err = dma_mapping_error(sdcp->dev, desc_phys); + if (dma_err) + return dma_err; + reinit_completion(&sdcp->completion[chan]); /* Clear status register. */ @@ -216,18 +220,29 @@ static int mxs_dcp_start_dma(struct dcp_async_ctx *actx) static int mxs_dcp_run_aes(struct dcp_async_ctx *actx, struct skcipher_request *req, int init) { + dma_addr_t key_phys, src_phys, dst_phys; struct dcp *sdcp = global_sdcp; struct dcp_dma_desc *desc = &sdcp->coh->desc[actx->chan]; struct dcp_aes_req_ctx *rctx = skcipher_request_ctx(req); int ret; - dma_addr_t key_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_key, - 2 * AES_KEYSIZE_128, - DMA_TO_DEVICE); - dma_addr_t src_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_in_buf, - DCP_BUF_SZ, DMA_TO_DEVICE); - dma_addr_t dst_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_out_buf, - DCP_BUF_SZ, DMA_FROM_DEVICE); + key_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_key, + 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); + ret = dma_mapping_error(sdcp->dev, key_phys); + if (ret) + return ret; + + src_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_in_buf, + DCP_BUF_SZ, DMA_TO_DEVICE); + ret = dma_mapping_error(sdcp->dev, src_phys); + if (ret) + goto err_src; + + dst_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_out_buf, + DCP_BUF_SZ, DMA_FROM_DEVICE); + ret = dma_mapping_error(sdcp->dev, dst_phys); + if (ret) + goto err_dst; if (actx->fill % AES_BLOCK_SIZE) { dev_err(sdcp->dev, "Invalid block size!\n"); @@ -265,10 +280,12 @@ static int mxs_dcp_run_aes(struct dcp_async_ctx *actx, ret = mxs_dcp_start_dma(actx); aes_done_run: + dma_unmap_single(sdcp->dev, dst_phys, DCP_BUF_SZ, DMA_FROM_DEVICE); +err_dst: + dma_unmap_single(sdcp->dev, src_phys, DCP_BUF_SZ, DMA_TO_DEVICE); +err_src: dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); - dma_unmap_single(sdcp->dev, src_phys, DCP_BUF_SZ, DMA_TO_DEVICE); - dma_unmap_single(sdcp->dev, dst_phys, DCP_BUF_SZ, DMA_FROM_DEVICE); return ret; } @@ -557,6 +574,10 @@ static int mxs_dcp_run_sha(struct ahash_request *req) dma_addr_t buf_phys = dma_map_single(sdcp->dev, sdcp->coh->sha_in_buf, DCP_BUF_SZ, DMA_TO_DEVICE); + ret = dma_mapping_error(sdcp->dev, buf_phys); + if (ret) + return ret; + /* Fill in the DMA descriptor. */ desc->control0 = MXS_DCP_CONTROL0_DECR_SEMAPHORE | MXS_DCP_CONTROL0_INTERRUPT | @@ -589,6 +610,10 @@ static int mxs_dcp_run_sha(struct ahash_request *req) if (rctx->fini) { digest_phys = dma_map_single(sdcp->dev, sdcp->coh->sha_out_buf, DCP_SHA_PAY_SZ, DMA_FROM_DEVICE); + ret = dma_mapping_error(sdcp->dev, digest_phys); + if (ret) + goto done_run; + desc->control0 |= MXS_DCP_CONTROL0_HASH_TERM; desc->payload = digest_phys; } -- 2.30.2