Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2148107iof; Tue, 7 Jun 2022 21:21:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz+l72DdFxpm4dq4KIcovQRGNRVHrWWFQmJmowG718xZIeoUUYaSETfbd83M3Uh/4+HB/XU X-Received: by 2002:a63:480c:0:b0:3fa:7277:bf34 with SMTP id v12-20020a63480c000000b003fa7277bf34mr28521814pga.35.1654662067801; Tue, 07 Jun 2022 21:21:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654662067; cv=none; d=google.com; s=arc-20160816; b=wFaGqFkAmpw1GCXk4Wqym9l/a+axBzVHmWhRYKu0+N3BYA9MJW8KukYvf03ETF+dfY IWWhYOEmHOzgr2QilYGSuHbG3GwtbxjSskEBYHRhckqKYGT+jbWJAEA37ljCIw/AvVa5 Gwg0xL5FJ1X6bvap3DqWBkc070geaMJiM/SMXHQn9JOHErHXtRMYoNR2dpuO213gEKAu eJUdEgZ6HpiEzUQkUyaj/Qen3riHvepVTK5GqvFaLYA549w3iTjfeU7E4KoYE8vXnX3U 8Jau375/peQnUFom/QalV9dRObB1O3otnowOT6nsLQthf6K/yzOH0ZVFUgRC7Ca7tWag f2lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=PTdmYDYQtaJrowq+CO1r9NBKL5iWIOZcs9cyzc3ahus=; b=iveu4ZPwohZl8yUHPAA61E3hN7/6+MrZ/GRsDDC8vjXQrPci1y4QDTHrW5oxMWeCPB wCtFn0yfHDl05ltcf5IIFWKWBSHBA3zYY10V0sbpxBcSww1EpcgObBXhpGucpW9boGdz GyWoamgU0LL6ubHs6kPFengfdlksnFEFFGIo0HnVWXlCOQw7oigFrFe2F9Yr+ueEBlE+ qtz2vZtmNKcJpwy14rcT3A6Q9vMKFafaoekpAPKLBPe0JXzVhiAvtkwFXIGARXIqQs/7 Jv0ez5XfgqVVxz89qG6FyqAmzJE57xzjBjrHhAKp/X8rN1MXNXJ9Me7Vd19iU6/ldmj3 1XfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cybernetics.com header.s=mail header.b="eFhH/8oZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cybernetics.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id y185-20020a638ac2000000b003fcd244d732si22254930pgd.760.2022.06.07.21.21.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:21:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@cybernetics.com header.s=mail header.b="eFhH/8oZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cybernetics.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 50F09172C21; Tue, 7 Jun 2022 20:52:06 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1382157AbiFGVqj (ORCPT + 99 others); Tue, 7 Jun 2022 17:46:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51806 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1379038AbiFGUwt (ORCPT ); Tue, 7 Jun 2022 16:52:49 -0400 Received: from mail.cybernetics.com (mail.cybernetics.com [173.71.130.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5AADF6C0FD for ; Tue, 7 Jun 2022 11:43:42 -0700 (PDT) X-ASG-Debug-ID: 1654627420-1cf43917f3396640001-xx1T2L Received: from cybernetics.com ([10.10.4.126]) by mail.cybernetics.com with ESMTP id 6i000wcOepKFgepC; Tue, 07 Jun 2022 14:43:40 -0400 (EDT) X-Barracuda-Envelope-From: tonyb@cybernetics.com X-ASG-Whitelist: Client DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=cybernetics.com; s=mail; bh=PTdmYDYQtaJrowq+CO1r9NBKL5iWIOZcs9cyzc3ahus=; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References:Cc:To:From: Content-Language:Subject:MIME-Version:Date:Message-ID; b=eFhH/8oZoQRI6kwNblqq GO5bRSb+r01mmH471kRl9m4M/4VIu+CfaebGobYNsjfg2fnazTi3XAKgI8m7tUKWYNLACdWIB6xn1 VaxxNPgygaNxZbPv24YRGmXC9TWyOMflOFNoBQif05lIe4+grirAT5xh3/y5RRsrnZO8H3xzgs= Received: from [10.157.2.224] (HELO [192.168.200.1]) by cybernetics.com (CommuniGate Pro SMTP 7.1.1) with ESMTPS id 11859449; Tue, 07 Jun 2022 14:43:40 -0400 Message-ID: <568967ea-13a7-4a09-6846-0891032e6cfe@cybernetics.com> Date: Tue, 7 Jun 2022 14:43:39 -0400 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: [PATCH v6 06/11] dmapool: debug: prevent endless loop in case of corruption Content-Language: en-US X-ASG-Orig-Subj: [PATCH v6 06/11] dmapool: debug: prevent endless loop in case of corruption From: Tony Battersby To: linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: iommu@lists.linux-foundation.org, kernel-team@fb.com, Matthew Wilcox , Keith Busch , Andy Shevchenko , Robin Murphy , Tony Lindgren References: <340ff8ef-9ff5-7175-c234-4132bbdfc5f7@cybernetics.com> In-Reply-To: <340ff8ef-9ff5-7175-c234-4132bbdfc5f7@cybernetics.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Barracuda-Connect: UNKNOWN[10.10.4.126] X-Barracuda-Start-Time: 1654627420 X-Barracuda-URL: https://10.10.4.122:443/cgi-mod/mark.cgi X-Barracuda-BRTS-Status: 1 X-Virus-Scanned: by bsmtpd at cybernetics.com X-Barracuda-Scan-Msg-Size: 1849 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Prevent a possible endless loop with DMAPOOL_DEBUG enabled if a buggy driver corrupts DMA pool memory. Signed-off-by: Tony Battersby --- mm/dmapool.c | 37 ++++++++++++++++++++++++++++++------- 1 file changed, 30 insertions(+), 7 deletions(-) diff --git a/mm/dmapool.c b/mm/dmapool.c index d3e5a6151fb4..facdb3571976 100644 --- a/mm/dmapool.c +++ b/mm/dmapool.c @@ -417,16 +417,39 @@ void dma_pool_free(struct dma_pool *pool, void *vaddr, dma_addr_t dma) } { unsigned int chain = page->offset; + unsigned int free_blks = 0; + while (chain < pool->allocation) { - if (chain != offset) { - chain = *(int *)(page->vaddr + chain); - continue; + if (unlikely(chain == offset)) { + spin_unlock_irqrestore(&pool->lock, flags); + dev_err(pool->dev, + "%s %s, dma %pad already free\n", + __func__, pool->name, &dma); + return; } - spin_unlock_irqrestore(&pool->lock, flags); - dev_err(pool->dev, "%s %s, dma %pad already free\n", - __func__, pool->name, &dma); - return; + + /* + * A buggy driver could corrupt the freelist by + * use-after-free, buffer overflow, etc. Besides + * checking for corruption, this also prevents an + * endless loop in case corruption causes a circular + * loop in the freelist. + */ + if (unlikely(++free_blks + page->in_use > + pool->blks_per_alloc)) { + freelist_corrupt: + spin_unlock_irqrestore(&pool->lock, flags); + dev_err(pool->dev, + "%s %s, freelist corrupted\n", + __func__, pool->name); + return; + } + + chain = *(int *)(page->vaddr + chain); } + if (unlikely(free_blks + page->in_use != + pool->blks_per_alloc)) + goto freelist_corrupt; } memset(vaddr, POOL_POISON_FREED, pool->size); #endif -- 2.25.1