Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3027901pxb; Mon, 18 Oct 2021 06:54:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvmUNUmJH0ANvFSdlsdty8M/KwA8ifAXa2jAIjNrQKJfZjqCsOkcMjOnyW0eBJc3FtCexa X-Received: by 2002:a65:5082:: with SMTP id r2mr23699146pgp.353.1634565285057; Mon, 18 Oct 2021 06:54:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634565285; cv=none; d=google.com; s=arc-20160816; b=nLS7t5Pyod6z3Z6bLkUMAjX2vicwrPcbVEMfLXqbIdvQ3r2HkzNw+QudJ0CeJCkGla TevByfmitHUe1gVDyNLsg+Hy7K1NtJVDMh6FdjEc97CcQnrnImmVWl81Y3I+l5A9RElW +hchSwvZRVp2unMWqdtwM/Ux+1wKAEy0xmQFbltJJTDFLc5e5yxkstS101ngmKw1L+BJ 3kqjFxUqTa+5UCrDk6QeRzG/gmcf3rT7pw2t1j6RB93VsbYBk56yd1Mj4YlE2mAtT/PG AKQoNm6W1cyiD24UGJLdW4pPLtOJZpBuYf4n7jOUqytyj0wOmG/9ncVIlFL4aCs/sNMe MErQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yV8irPMyouvTP9illx+YWWiAnHmLLiLi5o6gUB8AoY4=; b=lkfo5PbxosyVbJt0FbRNljl6lIGJoqXntUZUdAeTR2irtbMrDiAruAu65KSLRgqS0K OSRmX5Yjxxa0qQiY4zV9LGYflQxCYu1LYouB4OHbUUFGUjAUu9GIXUlUozYntwRLQvvd qIvj8X0LEozrVWzb2mh7+Pqn+h23/QIXJLNs6duc3UX9wJ3ZoNGPKaNDxn2aB6ILdcjc /zS1iYj28RWWCA6ijWA2eHqDxMdrmq2zdofssk3DvZfFI41KVqihJAl0HHuHD5gxZVBg sug2ncjAUHywJm8+bSQkPQONpBM8agvjFMVBQ+6r4Jm2U4pm6c0rP1om20aEia6pBH7K 1e3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1AEspQNM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a6si24786949plh.349.2021.10.18.06.54.32; Mon, 18 Oct 2021 06:54:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1AEspQNM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234313AbhJRNzn (ORCPT + 99 others); Mon, 18 Oct 2021 09:55:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:57702 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234305AbhJRNxS (ORCPT ); Mon, 18 Oct 2021 09:53:18 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A4380619E3; Mon, 18 Oct 2021 13:39:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1634564346; bh=sgW5ZkClT+J3pInbPkm7Hh5gn59WyocXS3nyO84HWpc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1AEspQNMw/x5eBYZ+8tZWrC/YuMI5haXGOlz1iv+pISs1LrwMIppUG+nta0wxQZDs IUk3B+tS6eQdX83uqb+z+ixsuFGv48QiWdPMhbsDhtezkkkW//n+kObWUE5okIiH/R gtWYhVOixgmWGWVNsyJXeDZddc07gjabCH+XVxFY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Srinivas Kandagatla Subject: [PATCH 5.14 054/151] misc: fastrpc: Add missing lock before accessing find_vma() Date: Mon, 18 Oct 2021 15:23:53 +0200 Message-Id: <20211018132342.455163854@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211018132340.682786018@linuxfoundation.org> References: <20211018132340.682786018@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Srinivas Kandagatla commit f9a470db2736b01538ad193c316eb3f26be37d58 upstream. fastrpc driver is using find_vma() without any protection, as a result we see below warning due to recent patch 5b78ed24e8ec ("mm/pagemap: add mmap_assert_locked() annotations to find_vma*()") which added mmap_assert_locked() in find_vma() function. This bug went un-noticed in previous versions. Fix this issue by adding required protection while calling find_vma(). CPU: 0 PID: 209746 Comm: benchmark_model Not tainted 5.15.0-rc2-00445-ge14fe2bf817a-dirty #969 Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT) pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : find_vma+0x64/0xd0 lr : find_vma+0x60/0xd0 sp : ffff8000158ebc40 ... Call trace: find_vma+0x64/0xd0 fastrpc_internal_invoke+0x570/0xda8 fastrpc_device_ioctl+0x3e0/0x928 __arm64_sys_ioctl+0xac/0xf0 invoke_syscall+0x44/0x100 el0_svc_common.constprop.3+0x70/0xf8 do_el0_svc+0x24/0x88 el0_svc+0x3c/0x138 el0t_64_sync_handler+0x90/0xb8 el0t_64_sync+0x180/0x184 Fixes: 80f3afd72bd4 ("misc: fastrpc: consider address offset before sending to DSP") Cc: stable@vger.kernel.org Signed-off-by: Srinivas Kandagatla Link: https://lore.kernel.org/r/20210922154326.8927-1-srinivas.kandagatla@linaro.org Signed-off-by: Greg Kroah-Hartman --- drivers/misc/fastrpc.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/misc/fastrpc.c +++ b/drivers/misc/fastrpc.c @@ -814,10 +814,12 @@ static int fastrpc_get_args(u32 kernel, rpra[i].pv = (u64) ctx->args[i].ptr; pages[i].addr = ctx->maps[i]->phys; + mmap_read_lock(current->mm); vma = find_vma(current->mm, ctx->args[i].ptr); if (vma) pages[i].addr += ctx->args[i].ptr - vma->vm_start; + mmap_read_unlock(current->mm); pg_start = (ctx->args[i].ptr & PAGE_MASK) >> PAGE_SHIFT; pg_end = ((ctx->args[i].ptr + len - 1) & PAGE_MASK) >>